Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
New Order.exe

Overview

General Information

Sample name:New Order.exe
Analysis ID:1509979
MD5:8d1627dd83de9ad6ea38b9b3d7e232fc
SHA1:6108d6e669d30d0586335dfd2f7126c138cf3ab1
SHA256:699ab96ab77fb83fb6468bfc51531a91899fe94048e526ae232fb6fe9ac52290
Tags:exe
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • New Order.exe (PID: 6188 cmdline: "C:\Users\user\Desktop\New Order.exe" MD5: 8D1627DD83DE9AD6EA38B9B3D7E232FC)
    • New Order.exe (PID: 7108 cmdline: "C:\Users\user\Desktop\New Order.exe" MD5: 8D1627DD83DE9AD6EA38B9B3D7E232FC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "192.3.64.152:2559:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-TS121V", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.4507004290.0000000000B67000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6c4a8:$a1: Remcos restarted by watchdog!
        • 0x6ca20:$a3: %02i:%02i:%02i:%03i
        00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmpREMCOS_RAT_variantsunknownunknown
        • 0x664fc:$str_a1: C:\Windows\System32\cmd.exe
        • 0x66478:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x66478:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x66978:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x671a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x6656c:$str_b2: Executing file:
        • 0x675ec:$str_b3: GetDirectListeningPort
        • 0x66f98:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x67118:$str_b7: \update.vbs
        • 0x66594:$str_b9: Downloaded file:
        • 0x66580:$str_b10: Downloading file:
        • 0x66624:$str_b12: Failed to upload file:
        • 0x675b4:$str_b13: StartForward
        • 0x675d4:$str_b14: StopForward
        • 0x67070:$str_b15: fso.DeleteFile "
        • 0x67004:$str_b16: On Error Resume Next
        • 0x670a0:$str_b17: fso.DeleteFolder "
        • 0x66614:$str_b18: Uploaded file:
        • 0x665d4:$str_b19: Unable to delete:
        • 0x67038:$str_b20: while fso.FileExists("
        • 0x66ab1:$str_c0: [Firefox StoredLogins not found]
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        3.2.New Order.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
          3.2.New Order.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            3.2.New Order.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x6aaa8:$a1: Remcos restarted by watchdog!
            • 0x6b020:$a3: %02i:%02i:%02i:%03i
            3.2.New Order.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
            • 0x64afc:$str_a1: C:\Windows\System32\cmd.exe
            • 0x64a78:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x64a78:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x64f78:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
            • 0x657a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
            • 0x64b6c:$str_b2: Executing file:
            • 0x65bec:$str_b3: GetDirectListeningPort
            • 0x65598:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
            • 0x65718:$str_b7: \update.vbs
            • 0x64b94:$str_b9: Downloaded file:
            • 0x64b80:$str_b10: Downloading file:
            • 0x64c24:$str_b12: Failed to upload file:
            • 0x65bb4:$str_b13: StartForward
            • 0x65bd4:$str_b14: StopForward
            • 0x65670:$str_b15: fso.DeleteFile "
            • 0x65604:$str_b16: On Error Resume Next
            • 0x656a0:$str_b17: fso.DeleteFolder "
            • 0x64c14:$str_b18: Uploaded file:
            • 0x64bd4:$str_b19: Unable to delete:
            • 0x65638:$str_b20: while fso.FileExists("
            • 0x650b1:$str_c0: [Firefox StoredLogins not found]
            3.2.New Order.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
            • 0x649e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
            • 0x6497c:$s1: CoGetObject
            • 0x64990:$s1: CoGetObject
            • 0x649ac:$s1: CoGetObject
            • 0x6e938:$s1: CoGetObject
            • 0x6493c:$s2: Elevation:Administrator!new:
            Click to see the 27 entries

            Stealing of Sensitive Information

            barindex
            Source: Registry Key setAuthor: Joe Security: Data: Details: DA 76 22 27 90 A5 F3 EE 3C 26 53 C2 B0 E9 C9 81 3F 2B 13 12 FF 34 BD 93 9B CD 9A 50 7F F9 7F E9 19 89 9F 48 D0 DE A9 3D D5 CC C4 F8 68 D7 3E 73 AB E0 B5 08 5F 23 62 BB 16 75 4B 20 CD E9 6F A8 C9 17 9B E3 7C 64 B4 0D DF 08 C1 8D , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\New Order.exe, ProcessId: 7108, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-TS121V\exepath
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-12T12:02:00.155845+020020365941Malware Command and Control Activity Detected192.168.2.549706192.3.64.1522559TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-12T12:02:01.538657+020028033043Unknown Traffic192.168.2.549707178.237.33.5080TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000003.00000002.4507004290.0000000000B67000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "192.3.64.152:2559:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-TS121V", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
            Source: http://geoplugin.net/json.gpVirustotal: Detection: 5%Perma Link
            Source: 192.3.64.152Virustotal: Detection: 8%Perma Link
            Source: New Order.exeReversingLabs: Detection: 31%
            Source: New Order.exeVirustotal: Detection: 36%Perma Link
            Source: Yara matchFile source: 3.2.New Order.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.35f0670.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.New Order.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.3764eb0.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.36aaa90.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.3764eb0.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.35f0670.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.4507004290.0000000000B67000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2048014848.0000000003529000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 6188, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 7108, type: MEMORYSTR
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: New Order.exeJoe Sandbox ML: detected
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,3_2_00433837
            Source: New Order.exe, 00000000.00000002.2048014848.0000000003529000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_9a444dce-8

            Exploits

            barindex
            Source: Yara matchFile source: 3.2.New Order.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.35f0670.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.New Order.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.3764eb0.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.36aaa90.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.3764eb0.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.35f0670.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2048014848.0000000003529000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 6188, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 7108, type: MEMORYSTR

            Privilege Escalation

            barindex
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_004074FD _wcslen,CoGetObject,3_2_004074FD
            Source: New Order.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: New Order.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: UxqX.pdbSHA256 source: New Order.exe
            Source: Binary string: UxqX.pdb source: New Order.exe
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_00409253
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,3_2_0041C291
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,3_2_0040C34D
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_00409665
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0044E879 FindFirstFileExA,3_2_0044E879
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,3_2_0040880C
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040783C FindFirstFileW,FindNextFileW,3_2_0040783C
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00419AF5
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040BB30
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040BD37
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00407C97

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49706 -> 192.3.64.152:2559
            Source: Malware configuration extractorURLs: 192.3.64.152
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
            Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
            Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49707 -> 178.237.33.50:80
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownTCP traffic detected without corresponding DNS query: 192.3.64.152
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,3_2_0041B380
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: geoplugin.net
            Source: New Order.exe, 00000003.00000002.4507004290.0000000000BA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
            Source: New Order.exe, 00000003.00000002.4507004290.0000000000BA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
            Source: New Order.exe, 00000000.00000002.2048014848.0000000003529000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
            Source: New Order.exe, 00000003.00000002.4507004290.0000000000B67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpS
            Source: New Order.exe, 00000003.00000002.4507004290.0000000000B67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
            Source: New Order.exe, 00000003.00000002.4507004290.0000000000BA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,000000003_2_0040A2B8
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,3_2_0040B70E
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004168C1
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,3_2_0040B70E
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,3_2_0040A3E0

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 3.2.New Order.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.35f0670.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.New Order.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.3764eb0.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.36aaa90.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.3764eb0.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.35f0670.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.4507004290.0000000000B67000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2048014848.0000000003529000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 6188, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 7108, type: MEMORYSTR

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0041C9E2 SystemParametersInfoW,3_2_0041C9E2

            System Summary

            barindex
            Source: 3.2.New Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 3.2.New Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 3.2.New Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 0.2.New Order.exe.35f0670.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.New Order.exe.35f0670.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 0.2.New Order.exe.35f0670.4.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 3.2.New Order.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 3.2.New Order.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 3.2.New Order.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 0.2.New Order.exe.3764eb0.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.New Order.exe.3764eb0.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 0.2.New Order.exe.3764eb0.5.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 0.2.New Order.exe.3764eb0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.New Order.exe.3764eb0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 0.2.New Order.exe.35f0670.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 0.2.New Order.exe.35f0670.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 00000000.00000002.2048014848.0000000003529000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: Process Memory Space: New Order.exe PID: 6188, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: Process Memory Space: New Order.exe PID: 7108, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: initial sampleStatic PE information: Filename: New Order.exe
            Source: C:\Users\user\Desktop\New Order.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,3_2_004167B4
            Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_00CFD3640_2_00CFD364
            Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06CCA6580_2_06CCA658
            Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06CCC5700_2_06CCC570
            Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06CCAEC80_2_06CCAEC8
            Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06CCCE480_2_06CCCE48
            Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06CCCE380_2_06CCCE38
            Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06CC0D900_2_06CC0D90
            Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06CCAA810_2_06CCAA81
            Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_070114400_2_07011440
            Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_070104D80_2_070104D8
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0043E0CC3_2_0043E0CC
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0041F0FA3_2_0041F0FA
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_004541593_2_00454159
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_004381683_2_00438168
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_004461F03_2_004461F0
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0043E2FB3_2_0043E2FB
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0045332B3_2_0045332B
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0042739D3_2_0042739D
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_004374E63_2_004374E6
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0043E5583_2_0043E558
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_004387703_2_00438770
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_004378FE3_2_004378FE
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_004339463_2_00433946
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0044D9C93_2_0044D9C9
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00427A463_2_00427A46
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0041DB623_2_0041DB62
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00427BAF3_2_00427BAF
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00437D333_2_00437D33
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00435E5E3_2_00435E5E
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00426E0E3_2_00426E0E
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0043DE9D3_2_0043DE9D
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00413FCA3_2_00413FCA
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00436FEA3_2_00436FEA
            Source: C:\Users\user\Desktop\New Order.exeCode function: String function: 00434E10 appears 54 times
            Source: C:\Users\user\Desktop\New Order.exeCode function: String function: 00402093 appears 50 times
            Source: C:\Users\user\Desktop\New Order.exeCode function: String function: 00434770 appears 41 times
            Source: C:\Users\user\Desktop\New Order.exeCode function: String function: 00401E65 appears 34 times
            Source: New Order.exe, 00000000.00000002.2047087558.00000000025BC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs New Order.exe
            Source: New Order.exe, 00000000.00000000.2036714320.00000000001F4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUxqX.exeB vs New Order.exe
            Source: New Order.exe, 00000000.00000002.2046190527.00000000006DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs New Order.exe
            Source: New Order.exe, 00000000.00000002.2047087558.0000000002521000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs New Order.exe
            Source: New Order.exe, 00000000.00000002.2049959459.0000000005010000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs New Order.exe
            Source: New Order.exe, 00000000.00000002.2048014848.0000000003529000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs New Order.exe
            Source: New Order.exe, 00000000.00000002.2051640001.0000000007730000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs New Order.exe
            Source: New Order.exe, 00000000.00000002.2047087558.00000000025A7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs New Order.exe
            Source: New Order.exeBinary or memory string: OriginalFilenameUxqX.exeB vs New Order.exe
            Source: New Order.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 3.2.New Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 3.2.New Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 3.2.New Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 0.2.New Order.exe.35f0670.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.New Order.exe.35f0670.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 0.2.New Order.exe.35f0670.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 3.2.New Order.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 3.2.New Order.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 3.2.New Order.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 0.2.New Order.exe.3764eb0.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.New Order.exe.3764eb0.5.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 0.2.New Order.exe.3764eb0.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 0.2.New Order.exe.3764eb0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.New Order.exe.3764eb0.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 0.2.New Order.exe.35f0670.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 0.2.New Order.exe.35f0670.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 00000000.00000002.2048014848.0000000003529000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: Process Memory Space: New Order.exe PID: 6188, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: Process Memory Space: New Order.exe PID: 7108, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: New Order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, PdFcqsUpb8VX2gR1AQ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, PdFcqsUpb8VX2gR1AQ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, vhTi702710KgEncajW.csSecurity API names: _0020.SetAccessControl
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, vhTi702710KgEncajW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, vhTi702710KgEncajW.csSecurity API names: _0020.AddAccessRule
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, vhTi702710KgEncajW.csSecurity API names: _0020.SetAccessControl
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, vhTi702710KgEncajW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, vhTi702710KgEncajW.csSecurity API names: _0020.AddAccessRule
            Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@3/2@1/2
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,3_2_00417952
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,3_2_0040F474
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,3_2_0041B4A8
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_0041AA4A
            Source: C:\Users\user\Desktop\New Order.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New Order.exe.logJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-TS121V
            Source: C:\Users\user\Desktop\New Order.exeMutant created: NULL
            Source: New Order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: New Order.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\New Order.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: New Order.exeReversingLabs: Detection: 31%
            Source: New Order.exeVirustotal: Detection: 36%
            Source: unknownProcess created: C:\Users\user\Desktop\New Order.exe "C:\Users\user\Desktop\New Order.exe"
            Source: C:\Users\user\Desktop\New Order.exeProcess created: C:\Users\user\Desktop\New Order.exe "C:\Users\user\Desktop\New Order.exe"
            Source: C:\Users\user\Desktop\New Order.exeProcess created: C:\Users\user\Desktop\New Order.exe "C:\Users\user\Desktop\New Order.exe"Jump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\New Order.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: New Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: New Order.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: New Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: UxqX.pdbSHA256 source: New Order.exe
            Source: Binary string: UxqX.pdb source: New Order.exe

            Data Obfuscation

            barindex
            Source: New Order.exe, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, vhTi702710KgEncajW.cs.Net Code: sCvY5j3HQl System.Reflection.Assembly.Load(byte[])
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, vhTi702710KgEncajW.cs.Net Code: sCvY5j3HQl System.Reflection.Assembly.Load(byte[])
            Source: New Order.exeStatic PE information: 0xD7C73E1E [Mon Sep 18 23:43:26 2084 UTC]
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,3_2_0041CB50
            Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06CC21DA push cs; iretd 0_2_06CC21DB
            Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_07010FE0 push 0000005Dh; ret 0_2_07010FD9
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00457106 push ecx; ret 3_2_00457119
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0045B11A push esp; ret 3_2_0045B141
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0045E54D push esi; ret 3_2_0045E556
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00457A28 push eax; ret 3_2_00457A46
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00434E56 push ecx; ret 3_2_00434E69
            Source: New Order.exeStatic PE information: section name: .text entropy: 7.913160519011415
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, MxKfu79GL8fwEqkyal.csHigh entropy of concatenated method names: 'SmDLUXpJ0U', 'zPpL3KCMoN', 'YdBLkdx1ti', 'HwwLFJlM64', 'il9LTXvAMV', 'AjDL8vPXyG', 'K8oLD8Tya3', 'DlHLAh0Xul', 'EJQLKwAg2Q', 'bVMLsyc2wO'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, uYk6ox1d3n646BSdsU.csHigh entropy of concatenated method names: 'qur5hWtBH', 'pKfW3yJxF', 'wopOO7UQ1', 'cDelgbEJL', 'IpZ3MLhtU', 'DVfB2bBWe', 'xKnp3CrvyPw3hgytkE', 'kraKboiHiEBCkC2lZo', 'uAOoGGvPy', 'pF2efWWi9'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, DmmQO2MSKriapIQuNb.csHigh entropy of concatenated method names: 'A2mnGvUPdG', 'PgWnv6RlRC', 'yMan5marsw', 'lsCnW53Ztf', 'XFknZ6dB3j', 'SfenODj3CC', 'eExnlrK22I', 'gwdnUpyQyg', 'D4tn3ZHv1R', 'xVFnByojMA'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, YpFTObmRscKUgiX6EA.csHigh entropy of concatenated method names: 'iyPokHeHsk', 'jEwoFUlWAw', 'E76op7M6Ba', 'nW7oTelU5P', 'baMoSW4l5g', 'R1uo8q0ICe', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, xkH9TGgO8jpLBDdpwK.csHigh entropy of concatenated method names: 'iLucPZD0C8', 'Md5ct305Fb', 'SlUcYXREBj', 'geAcuiWZwA', 'nwVcJXo82G', 'ygvcqWGep7', 'Cn1cydDFgQ', 'Eijo4GxcKC', 'TnIoXZ56YX', 'df6omkM1b9'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, WSbg6s6qXjSkJFqtVL.csHigh entropy of concatenated method names: 'MKbraaB1qu', 'Du9rfh0wCE', 'ToString', 'uyGruWIjpw', 'qbHrJS3dTY', 'b3qrNFewnJ', 'G1krqJFNSl', 'Y2YryDf9tp', 'I03rnMvjRT', 'HZFr2N224S'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, iBJUKNPtvrqrIkkTpag.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bSBeSsPr8B', 'vToednEWCU', 'Xy5einDkGa', 'ytEe6L8Ogk', 'z2FeQovm1n', 'LCMe05ESL8', 'FXLe4eZkqN'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, lXbmmA3F1hZgIrRK4L.csHigh entropy of concatenated method names: 'pbQNWR1EKN', 'EfrNO2m6ol', 'acvNUPRA3v', 'sV9N3OCcjW', 'BSuNx11KEJ', 'DdLNbuuONf', 'XsyNrLbRuK', 'bthNoqFNas', 'F70Nc7bYoY', 'Mj0NeLH66N'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, FcOS9kk8Sv7dpZbnjM.csHigh entropy of concatenated method names: 'qODy7ADhq9', 'J9LyJABlLk', 'B1Dyq1yJXH', 'DEdynm3dWP', 'wEQy2nGjV5', 'L3VqQxj15R', 'G1Nq0etQw1', 'T5Fq4gAO0o', 'YRTqX50rqW', 'p0aqmINehv'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, AXJHv7D4dVlcso69v8.csHigh entropy of concatenated method names: 'hhDnu3uZNZ', 'c5EnNkhDM2', 'Etunyg2QAU', 'ruDygj3u5F', 'ktWyzk8BvM', 'YBbnIB7REr', 'ItdnPLP1WK', 'mnhn11ctbZ', 'nBUntZmlNJ', 'WQPnY4ccfF'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, efuV1wRAOELiRuYcvl.csHigh entropy of concatenated method names: 'Iaeyi1G37m', 'zhYy63ZomB', 'ckGyQmAFGB', 'ToString', 'Ad1y0Qq3cq', 'LsKy4e79O2', 'jZi6VsNiyKQLuljM9hX', 'LJD5vwNMtFH5fNBhrjo'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, YoZ48OifMMV7WF9gFX.csHigh entropy of concatenated method names: 'ToString', 'tHfbsMxhBp', 'HpRbFbHyUo', 'cFubphcgDq', 'gMrbTxBahF', 'SCnb8UPb1A', 'zB8bRIV0Lq', 'iBCbDYN3eh', 'KJYbA9lRYn', 'jLfbMfdku4'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, zIhXTCX9S3RFeYASMD.csHigh entropy of concatenated method names: 'vQ9ouAeT1q', 'UHroJEbRfQ', 'eCpoNy4qTR', 'eSqoqNeFM8', 'ClpoyaWujH', 'i27on3ckn1', 'bkNo267wdC', 'bhyoC0x4lr', 'FpKoaCFHqI', 'UURofq9ogW'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, gUio050vGnHsTy3pig.csHigh entropy of concatenated method names: 'y6qrXIQu3I', 'lvgrg0tflw', 'KJroI6fL4N', 'pQJoPEMxTT', 'zgOrsTCsJk', 'qfgrEiTyVE', 'RUxr9FLNkn', 'UcarSKVbD1', 'fslrdNfeL7', 'vuPrifOv2f'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, Tl87btJO1cip9HLLAd.csHigh entropy of concatenated method names: 'Dispose', 'lJXPmGESZS', 'uNb1FMiIjI', 'G4f99PRH10', 'C5IPghXTC9', 'R3RPzFeYAS', 'ProcessDialogKey', 'MDg1IpFTOb', 'Ksc1PKUgiX', 'TEA11GkH9T'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, vhTi702710KgEncajW.csHigh entropy of concatenated method names: 'TZst7DyN44', 'b5etumaIjn', 'KmqtJLcs9A', 'G4ctN65pRA', 'LN6tqt6hXj', 'R8AtyNXNdK', 'Oc3tngAtEX', 'HB1t2LckNW', 'IJytC8H9Ki', 'oVDtaKIlY4'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, IKgp5kN8aysfMldBDo.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'W3I1mWDCZQ', 'CXI1gyIyZI', 'RGh1z7I1XQ', 'KavtIEMhaF', 'yoEtPxdZMw', 'Dtut11CngW', 'CEptt6L5Ej', 'pkv4gVZ03kdb10wh8QD'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, mJbr1dPI9i2g7wbGM60.csHigh entropy of concatenated method names: 'oMqcG6nU39', 'lXxcvAVlWI', 'tXLc5Zqqa5', 'CJJcWd6Ck7', 'RUicZfLSGw', 'ryLcO883kR', 'eMPclVVqeF', 'DgVcUhgY86', 'eDnc3NZX96', 'dpicBnSGK0'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, EPVKK5Y8OqBxwrwhqd.csHigh entropy of concatenated method names: 'PQEPndFcqs', 'Hb8P2VX2gR', 'MF1PahZgIr', 'KK4PfLfTUn', 'LluPxrMBcO', 'Q9kPb8Sv7d', 'Ma74tn4AuuFvmmjjFu', 'Cqg8FaFNrMrRwONdUl', 'lwTPPRD3Mv', 'pxOPtNv6yc'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, PdFcqsUpb8VX2gR1AQ.csHigh entropy of concatenated method names: 'sBrJSZT4RN', 'I64JdOHo6m', 'UcnJiunAx6', 'pRRJ6AgmMN', 'NSoJQ0rPKR', 'MqqJ0D5VY2', 'msLJ47QAfT', 'drIJXXILGn', 'kouJmeL6Kp', 'WEkJggeP1Z'
            Source: 0.2.New Order.exe.7730000.7.raw.unpack, zqPbBqSfWIhkvgla5N.csHigh entropy of concatenated method names: 'gitxKbAYHX', 'lNrxETKWJr', 'XSBxSX0kL4', 'v4Ixd5g7Eb', 'hbrxFxLbL7', 'AWMxpYQv6a', 'lpgxT8Mpgn', 'Hbrx8YtuTk', 'VQBxRUU6Vu', 'KvExDS3Quo'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, MxKfu79GL8fwEqkyal.csHigh entropy of concatenated method names: 'SmDLUXpJ0U', 'zPpL3KCMoN', 'YdBLkdx1ti', 'HwwLFJlM64', 'il9LTXvAMV', 'AjDL8vPXyG', 'K8oLD8Tya3', 'DlHLAh0Xul', 'EJQLKwAg2Q', 'bVMLsyc2wO'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, uYk6ox1d3n646BSdsU.csHigh entropy of concatenated method names: 'qur5hWtBH', 'pKfW3yJxF', 'wopOO7UQ1', 'cDelgbEJL', 'IpZ3MLhtU', 'DVfB2bBWe', 'xKnp3CrvyPw3hgytkE', 'kraKboiHiEBCkC2lZo', 'uAOoGGvPy', 'pF2efWWi9'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, DmmQO2MSKriapIQuNb.csHigh entropy of concatenated method names: 'A2mnGvUPdG', 'PgWnv6RlRC', 'yMan5marsw', 'lsCnW53Ztf', 'XFknZ6dB3j', 'SfenODj3CC', 'eExnlrK22I', 'gwdnUpyQyg', 'D4tn3ZHv1R', 'xVFnByojMA'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, YpFTObmRscKUgiX6EA.csHigh entropy of concatenated method names: 'iyPokHeHsk', 'jEwoFUlWAw', 'E76op7M6Ba', 'nW7oTelU5P', 'baMoSW4l5g', 'R1uo8q0ICe', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, xkH9TGgO8jpLBDdpwK.csHigh entropy of concatenated method names: 'iLucPZD0C8', 'Md5ct305Fb', 'SlUcYXREBj', 'geAcuiWZwA', 'nwVcJXo82G', 'ygvcqWGep7', 'Cn1cydDFgQ', 'Eijo4GxcKC', 'TnIoXZ56YX', 'df6omkM1b9'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, WSbg6s6qXjSkJFqtVL.csHigh entropy of concatenated method names: 'MKbraaB1qu', 'Du9rfh0wCE', 'ToString', 'uyGruWIjpw', 'qbHrJS3dTY', 'b3qrNFewnJ', 'G1krqJFNSl', 'Y2YryDf9tp', 'I03rnMvjRT', 'HZFr2N224S'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, iBJUKNPtvrqrIkkTpag.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bSBeSsPr8B', 'vToednEWCU', 'Xy5einDkGa', 'ytEe6L8Ogk', 'z2FeQovm1n', 'LCMe05ESL8', 'FXLe4eZkqN'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, lXbmmA3F1hZgIrRK4L.csHigh entropy of concatenated method names: 'pbQNWR1EKN', 'EfrNO2m6ol', 'acvNUPRA3v', 'sV9N3OCcjW', 'BSuNx11KEJ', 'DdLNbuuONf', 'XsyNrLbRuK', 'bthNoqFNas', 'F70Nc7bYoY', 'Mj0NeLH66N'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, FcOS9kk8Sv7dpZbnjM.csHigh entropy of concatenated method names: 'qODy7ADhq9', 'J9LyJABlLk', 'B1Dyq1yJXH', 'DEdynm3dWP', 'wEQy2nGjV5', 'L3VqQxj15R', 'G1Nq0etQw1', 'T5Fq4gAO0o', 'YRTqX50rqW', 'p0aqmINehv'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, AXJHv7D4dVlcso69v8.csHigh entropy of concatenated method names: 'hhDnu3uZNZ', 'c5EnNkhDM2', 'Etunyg2QAU', 'ruDygj3u5F', 'ktWyzk8BvM', 'YBbnIB7REr', 'ItdnPLP1WK', 'mnhn11ctbZ', 'nBUntZmlNJ', 'WQPnY4ccfF'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, efuV1wRAOELiRuYcvl.csHigh entropy of concatenated method names: 'Iaeyi1G37m', 'zhYy63ZomB', 'ckGyQmAFGB', 'ToString', 'Ad1y0Qq3cq', 'LsKy4e79O2', 'jZi6VsNiyKQLuljM9hX', 'LJD5vwNMtFH5fNBhrjo'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, YoZ48OifMMV7WF9gFX.csHigh entropy of concatenated method names: 'ToString', 'tHfbsMxhBp', 'HpRbFbHyUo', 'cFubphcgDq', 'gMrbTxBahF', 'SCnb8UPb1A', 'zB8bRIV0Lq', 'iBCbDYN3eh', 'KJYbA9lRYn', 'jLfbMfdku4'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, zIhXTCX9S3RFeYASMD.csHigh entropy of concatenated method names: 'vQ9ouAeT1q', 'UHroJEbRfQ', 'eCpoNy4qTR', 'eSqoqNeFM8', 'ClpoyaWujH', 'i27on3ckn1', 'bkNo267wdC', 'bhyoC0x4lr', 'FpKoaCFHqI', 'UURofq9ogW'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, gUio050vGnHsTy3pig.csHigh entropy of concatenated method names: 'y6qrXIQu3I', 'lvgrg0tflw', 'KJroI6fL4N', 'pQJoPEMxTT', 'zgOrsTCsJk', 'qfgrEiTyVE', 'RUxr9FLNkn', 'UcarSKVbD1', 'fslrdNfeL7', 'vuPrifOv2f'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, Tl87btJO1cip9HLLAd.csHigh entropy of concatenated method names: 'Dispose', 'lJXPmGESZS', 'uNb1FMiIjI', 'G4f99PRH10', 'C5IPghXTC9', 'R3RPzFeYAS', 'ProcessDialogKey', 'MDg1IpFTOb', 'Ksc1PKUgiX', 'TEA11GkH9T'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, vhTi702710KgEncajW.csHigh entropy of concatenated method names: 'TZst7DyN44', 'b5etumaIjn', 'KmqtJLcs9A', 'G4ctN65pRA', 'LN6tqt6hXj', 'R8AtyNXNdK', 'Oc3tngAtEX', 'HB1t2LckNW', 'IJytC8H9Ki', 'oVDtaKIlY4'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, IKgp5kN8aysfMldBDo.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'W3I1mWDCZQ', 'CXI1gyIyZI', 'RGh1z7I1XQ', 'KavtIEMhaF', 'yoEtPxdZMw', 'Dtut11CngW', 'CEptt6L5Ej', 'pkv4gVZ03kdb10wh8QD'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, mJbr1dPI9i2g7wbGM60.csHigh entropy of concatenated method names: 'oMqcG6nU39', 'lXxcvAVlWI', 'tXLc5Zqqa5', 'CJJcWd6Ck7', 'RUicZfLSGw', 'ryLcO883kR', 'eMPclVVqeF', 'DgVcUhgY86', 'eDnc3NZX96', 'dpicBnSGK0'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, EPVKK5Y8OqBxwrwhqd.csHigh entropy of concatenated method names: 'PQEPndFcqs', 'Hb8P2VX2gR', 'MF1PahZgIr', 'KK4PfLfTUn', 'LluPxrMBcO', 'Q9kPb8Sv7d', 'Ma74tn4AuuFvmmjjFu', 'Cqg8FaFNrMrRwONdUl', 'lwTPPRD3Mv', 'pxOPtNv6yc'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, PdFcqsUpb8VX2gR1AQ.csHigh entropy of concatenated method names: 'sBrJSZT4RN', 'I64JdOHo6m', 'UcnJiunAx6', 'pRRJ6AgmMN', 'NSoJQ0rPKR', 'MqqJ0D5VY2', 'msLJ47QAfT', 'drIJXXILGn', 'kouJmeL6Kp', 'WEkJggeP1Z'
            Source: 0.2.New Order.exe.36aaa90.3.raw.unpack, zqPbBqSfWIhkvgla5N.csHigh entropy of concatenated method names: 'gitxKbAYHX', 'lNrxETKWJr', 'XSBxSX0kL4', 'v4Ixd5g7Eb', 'hbrxFxLbL7', 'AWMxpYQv6a', 'lpgxT8Mpgn', 'Hbrx8YtuTk', 'VQBxRUU6Vu', 'KvExDS3Quo'
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00406EB0 ShellExecuteW,URLDownloadToFileW,3_2_00406EB0
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_0041AA4A
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,3_2_0041CB50
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 6188, type: MEMORYSTR
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040F7A7 Sleep,ExitProcess,3_2_0040F7A7
            Source: C:\Users\user\Desktop\New Order.exeMemory allocated: CF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeMemory allocated: 2520000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeMemory allocated: 4520000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeMemory allocated: 78F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeMemory allocated: 88F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeMemory allocated: 8AC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeMemory allocated: 9AC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,3_2_0041A748
            Source: C:\Users\user\Desktop\New Order.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\New Order.exeWindow / User API: threadDelayed 3349Jump to behavior
            Source: C:\Users\user\Desktop\New Order.exeWindow / User API: threadDelayed 6643Jump to behavior
            Source: C:\Users\user\Desktop\New Order.exe TID: 7120Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\New Order.exe TID: 6512Thread sleep count: 3349 > 30Jump to behavior
            Source: C:\Users\user\Desktop\New Order.exe TID: 6512Thread sleep time: -10047000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\New Order.exe TID: 6512Thread sleep count: 6643 > 30Jump to behavior
            Source: C:\Users\user\Desktop\New Order.exe TID: 6512Thread sleep time: -19929000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_00409253
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,3_2_0041C291
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,3_2_0040C34D
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_00409665
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0044E879 FindFirstFileExA,3_2_0044E879
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,3_2_0040880C
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040783C FindFirstFileW,FindNextFileW,3_2_0040783C
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00419AF5
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040BB30
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040BD37
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00407C97
            Source: C:\Users\user\Desktop\New Order.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: New Order.exe, 00000003.00000002.4507004290.0000000000B67000.00000004.00000020.00020000.00000000.sdmp, New Order.exe, 00000003.00000002.4507004290.0000000000BE1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: New Order.exe, 00000003.00000002.4507004290.0000000000BE1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW<l
            Source: C:\Users\user\Desktop\New Order.exeAPI call chain: ExitProcess graph end nodegraph_3-48796
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_004349F9
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,3_2_0041CB50
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_004432B5 mov eax, dword ptr fs:[00000030h]3_2_004432B5
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00412077 GetProcessHeap,HeapFree,3_2_00412077
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_004349F9
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00434B47 SetUnhandledExceptionFilter,3_2_00434B47
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0043BB22
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00434FDC
            Source: C:\Users\user\Desktop\New Order.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\New Order.exeMemory written: C:\Users\user\Desktop\New Order.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe3_2_004120F7
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00419627 mouse_event,3_2_00419627
            Source: C:\Users\user\Desktop\New Order.exeProcess created: C:\Users\user\Desktop\New Order.exe "C:\Users\user\Desktop\New Order.exe"Jump to behavior
            Source: New Order.exe, 00000003.00000002.4507004290.0000000000BC7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: New Order.exe, 00000003.00000002.4507004290.0000000000BC7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerB0
            Source: New Order.exe, 00000003.00000002.4507004290.0000000000BC7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerI0
            Source: New Order.exe, 00000003.00000002.4507004290.0000000000B67000.00000004.00000020.00020000.00000000.sdmp, New Order.exe, 00000003.00000002.4507004290.0000000000BA2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00434C52 cpuid 3_2_00434C52
            Source: C:\Users\user\Desktop\New Order.exeCode function: GetLocaleInfoA,3_2_0040F8D1
            Source: C:\Users\user\Desktop\New Order.exeCode function: EnumSystemLocalesW,3_2_00452036
            Source: C:\Users\user\Desktop\New Order.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_004520C3
            Source: C:\Users\user\Desktop\New Order.exeCode function: GetLocaleInfoW,3_2_00452313
            Source: C:\Users\user\Desktop\New Order.exeCode function: EnumSystemLocalesW,3_2_00448404
            Source: C:\Users\user\Desktop\New Order.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_0045243C
            Source: C:\Users\user\Desktop\New Order.exeCode function: GetLocaleInfoW,3_2_00452543
            Source: C:\Users\user\Desktop\New Order.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_00452610
            Source: C:\Users\user\Desktop\New Order.exeCode function: GetLocaleInfoW,3_2_004488ED
            Source: C:\Users\user\Desktop\New Order.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,3_2_00451CD8
            Source: C:\Users\user\Desktop\New Order.exeCode function: EnumSystemLocalesW,3_2_00451F50
            Source: C:\Users\user\Desktop\New Order.exeCode function: EnumSystemLocalesW,3_2_00451F9B
            Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Users\user\Desktop\New Order.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00404F51 GetLocalTime,CreateEventA,CreateThread,3_2_00404F51
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_0041B60D GetComputerNameExW,GetUserNameW,3_2_0041B60D
            Source: C:\Users\user\Desktop\New Order.exeCode function: 3_2_00449190 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,3_2_00449190
            Source: C:\Users\user\Desktop\New Order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 3.2.New Order.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.35f0670.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.New Order.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.3764eb0.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.36aaa90.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.3764eb0.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.35f0670.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.4507004290.0000000000B67000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2048014848.0000000003529000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 6188, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 7108, type: MEMORYSTR
            Source: C:\Users\user\Desktop\New Order.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data3_2_0040BA12
            Source: C:\Users\user\Desktop\New Order.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\3_2_0040BB30
            Source: C:\Users\user\Desktop\New Order.exeCode function: \key3.db3_2_0040BB30

            Remote Access Functionality

            barindex
            Source: C:\Users\user\Desktop\New Order.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-TS121VJump to behavior
            Source: Yara matchFile source: 3.2.New Order.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.35f0670.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.New Order.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.3764eb0.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.36aaa90.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.3764eb0.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.New Order.exe.35f0670.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.4507004290.0000000000B67000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2048014848.0000000003529000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 6188, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 7108, type: MEMORYSTR
            Source: C:\Users\user\Desktop\New Order.exeCode function: cmd.exe3_2_0040569A
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            12
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Command and Scripting Interpreter
            1
            Windows Service
            1
            Bypass User Account Control
            1
            Deobfuscate/Decode Files or Information
            111
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol111
            Input Capture
            2
            Encrypted Channel
            Exfiltration Over Bluetooth1
            Defacement
            Email AddressesDNS ServerDomain Accounts2
            Service Execution
            Logon Script (Windows)1
            Access Token Manipulation
            3
            Obfuscated Files or Information
            2
            Credentials In Files
            1
            System Service Discovery
            SMB/Windows Admin Shares3
            Clipboard Data
            1
            Remote Access Software
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            Windows Service
            12
            Software Packing
            NTDS2
            File and Directory Discovery
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script122
            Process Injection
            1
            Timestomp
            LSA Secrets33
            System Information Discovery
            SSHKeylogging12
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            DLL Side-Loading
            Cached Domain Credentials21
            Security Software Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Bypass User Account Control
            DCSync31
            Virtualization/Sandbox Evasion
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            Masquerading
            Proc Filesystem2
            Process Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt31
            Virtualization/Sandbox Evasion
            /etc/passwd and /etc/shadow1
            Application Window Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
            Access Token Manipulation
            Network Sniffing1
            System Owner/User Discovery
            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd122
            Process Injection
            Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            New Order.exe32%ReversingLabs
            New Order.exe36%VirustotalBrowse
            New Order.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            geoplugin.net1%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://geoplugin.net/json.gpS0%Avira URL Cloudsafe
            http://geoplugin.net/json.gp0%Avira URL Cloudsafe
            http://geoplugin.net/json.gp/C0%Avira URL Cloudsafe
            http://geoplugin.net/json.gpl0%Avira URL Cloudsafe
            http://geoplugin.net/0%Avira URL Cloudsafe
            192.3.64.1520%Avira URL Cloudsafe
            http://geoplugin.net/json.gpSystem320%Avira URL Cloudsafe
            http://geoplugin.net/json.gp5%VirustotalBrowse
            http://geoplugin.net/1%VirustotalBrowse
            http://geoplugin.net/json.gpl0%VirustotalBrowse
            http://geoplugin.net/json.gpSystem321%VirustotalBrowse
            http://geoplugin.net/json.gpS0%VirustotalBrowse
            192.3.64.1528%VirustotalBrowse
            http://geoplugin.net/json.gp/C0%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            geoplugin.net
            178.237.33.50
            truefalseunknown
            NameMaliciousAntivirus DetectionReputation
            http://geoplugin.net/json.gpfalse
            • 5%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            192.3.64.152true
            • 8%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://geoplugin.net/json.gpSNew Order.exe, 00000003.00000002.4507004290.0000000000B67000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://geoplugin.net/New Order.exe, 00000003.00000002.4507004290.0000000000BA2000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://geoplugin.net/json.gp/CNew Order.exe, 00000000.00000002.2048014848.0000000003529000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://geoplugin.net/json.gplNew Order.exe, 00000003.00000002.4507004290.0000000000BA2000.00000004.00000020.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://geoplugin.net/json.gpSystem32New Order.exe, 00000003.00000002.4507004290.0000000000B67000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            178.237.33.50
            geoplugin.netNetherlands
            8455ATOM86-ASATOM86NLfalse
            192.3.64.152
            unknownUnited States
            36352AS-COLOCROSSINGUStrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1509979
            Start date and time:2024-09-12 12:01:07 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 7m 43s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:6
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:New Order.exe
            Detection:MAL
            Classification:mal100.rans.troj.spyw.expl.evad.winEXE@3/2@1/2
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 98%
            • Number of executed functions: 62
            • Number of non-executed functions: 203
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            06:01:58API Interceptor5509107x Sleep call for process: New Order.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            178.237.33.50rfq_last_quater_product_purchase_order_import_list_12_06_2024_000000120924.batGet hashmaliciousGuLoader, RemcosBrowse
            • geoplugin.net/json.gp
            Quote best offer 20240911.exeGet hashmaliciousRemcosBrowse
            • geoplugin.net/json.gp
            RFQ-00000947i_pdf.exeGet hashmaliciousRemcosBrowse
            • geoplugin.net/json.gp
            PO#0774.exeGet hashmaliciousRemcosBrowse
            • geoplugin.net/json.gp
            (Draft) - SO# L539-SE2409060 Cut off #Uff19-15 - CHR# 487700191.scr.exeGet hashmaliciousRemcosBrowse
            • geoplugin.net/json.gp
            xnHel.rtfGet hashmaliciousRemcosBrowse
            • geoplugin.net/json.gp
            INV_00983.xlsGet hashmaliciousRemcosBrowse
            • geoplugin.net/json.gp
            rfq_last_quater_product_purchase_order_import_list_11_06_2024_000000110924.cmdGet hashmaliciousGuLoader, RemcosBrowse
            • geoplugin.net/json.gp
            ORDER DATASHEET.batGet hashmaliciousRemcos, GuLoaderBrowse
            • geoplugin.net/json.gp
            rfq_final_product_purchase_order_import_list_10_09_2024_00000024.cmdGet hashmaliciousGuLoader, RemcosBrowse
            • geoplugin.net/json.gp
            192.3.64.152SecuriteInfo.com.Trojan.PackedNET.3042.4675.2937.exeGet hashmaliciousRemcosBrowse
              Quote.exeGet hashmaliciousRemcosBrowse
                SecuriteInfo.com.Win32.PWSX-gen.3135.16188.exeGet hashmaliciousRemcosBrowse
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  geoplugin.netrfq_last_quater_product_purchase_order_import_list_12_06_2024_000000120924.batGet hashmaliciousGuLoader, RemcosBrowse
                  • 178.237.33.50
                  Quote best offer 20240911.exeGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  RFQ-00000947i_pdf.exeGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  PO#0774.exeGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  (Draft) - SO# L539-SE2409060 Cut off #Uff19-15 - CHR# 487700191.scr.exeGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  xnHel.rtfGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  INV_00983.xlsGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  rfq_last_quater_product_purchase_order_import_list_11_06_2024_000000110924.cmdGet hashmaliciousGuLoader, RemcosBrowse
                  • 178.237.33.50
                  ORDER DATASHEET.batGet hashmaliciousRemcos, GuLoaderBrowse
                  • 178.237.33.50
                  rfq_final_product_purchase_order_import_list_10_09_2024_00000024.cmdGet hashmaliciousGuLoader, RemcosBrowse
                  • 178.237.33.50
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  AS-COLOCROSSINGUSPO#4502968189 Packinglist for confirmation.ex.exeGet hashmaliciousRedLineBrowse
                  • 198.12.90.244
                  mlnZfOifRX.elfGet hashmaliciousOkiruBrowse
                  • 198.23.232.31
                  https://storage.googleapis.com/tf3no4swz21zlasg/75752b9.html#FDm8vwZK.aspx?fRl9xNccwwPcczDyScdcNRddcH77xncsXcbbb4XGet hashmaliciousUnknownBrowse
                  • 192.210.198.234
                  INV_00983.xlsGet hashmaliciousRemcosBrowse
                  • 192.3.101.254
                  SecuriteInfo.com.Linux.Mirai.5075.8943.20322.elfGet hashmaliciousUnknownBrowse
                  • 192.3.165.37
                  Orden-de-Compra-OC_17407.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                  • 107.175.229.146
                  fab50e82-0506-dce9-c04c-1f869804c09e.emlGet hashmaliciousUnknownBrowse
                  • 192.227.173.31
                  http://whats.met-esm.top/Get hashmaliciousUnknownBrowse
                  • 172.245.112.197
                  RFQ_0230909024SEPT.xla.xlsxGet hashmaliciousRemcosBrowse
                  • 192.3.101.29
                  GN31O4pSQN.exeGet hashmaliciousRemcosBrowse
                  • 192.3.243.155
                  ATOM86-ASATOM86NLrfq_last_quater_product_purchase_order_import_list_12_06_2024_000000120924.batGet hashmaliciousGuLoader, RemcosBrowse
                  • 178.237.33.50
                  Quote best offer 20240911.exeGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  RFQ-00000947i_pdf.exeGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  PO#0774.exeGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  (Draft) - SO# L539-SE2409060 Cut off #Uff19-15 - CHR# 487700191.scr.exeGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  xnHel.rtfGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  INV_00983.xlsGet hashmaliciousRemcosBrowse
                  • 178.237.33.50
                  rfq_last_quater_product_purchase_order_import_list_11_06_2024_000000110924.cmdGet hashmaliciousGuLoader, RemcosBrowse
                  • 178.237.33.50
                  ORDER DATASHEET.batGet hashmaliciousRemcos, GuLoaderBrowse
                  • 178.237.33.50
                  rfq_final_product_purchase_order_import_list_10_09_2024_00000024.cmdGet hashmaliciousGuLoader, RemcosBrowse
                  • 178.237.33.50
                  No context
                  No context
                  Process:C:\Users\user\Desktop\New Order.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1216
                  Entropy (8bit):5.34331486778365
                  Encrypted:false
                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                  Process:C:\Users\user\Desktop\New Order.exe
                  File Type:JSON data
                  Category:dropped
                  Size (bytes):962
                  Entropy (8bit):5.013811273052389
                  Encrypted:false
                  SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                  MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                  SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                  SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                  SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):7.908351998189738
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  • Win32 Executable (generic) a (10002005/4) 49.78%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  • DOS Executable Generic (2002/1) 0.01%
                  File name:New Order.exe
                  File size:921'088 bytes
                  MD5:8d1627dd83de9ad6ea38b9b3d7e232fc
                  SHA1:6108d6e669d30d0586335dfd2f7126c138cf3ab1
                  SHA256:699ab96ab77fb83fb6468bfc51531a91899fe94048e526ae232fb6fe9ac52290
                  SHA512:f9a30622d1b643e954375ef6a81f9273cfa1bd1dd93a18b97aaf24fcd1f489950fe54d7516129efb7418445beee029663306e65f78d3adda30eb4fdbb3f43ac9
                  SSDEEP:24576:ISaWiW60OWtDBDtOBXT7GN+QXvADJz2sGamXP+Pr:ISf605tm7GQQNL
                  TLSH:52151274BBB8EB95C9E507704535D27123B2BE8DD220D30A5FEAACF7392A7115820673
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....>................0..............#... ...@....@.. ....................................@................................
                  Icon Hash:00928e8e8686b000
                  Entrypoint:0x4e23f2
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0xD7C73E1E [Mon Sep 18 23:43:26 2084 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xe239d0x4f.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xe40000x5bc.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xe60000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0xe07400x70.text
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000xe03f80xe0400d73ace912ab61d184e1bae19a9d0ca74False0.9465655919035675data7.913160519011415IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0xe40000x5bc0x6005897015475da72f5e06da842f2dc56b1False0.4251302083333333data4.115871791696573IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0xe60000xc0x20090c51a89085c4f57e9cbdec1ec3cb243False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_VERSION0xe40900x32cdata0.43226600985221675
                  RT_MANIFEST0xe43cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                  DLLImport
                  mscoree.dll_CorExeMain
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2024-09-12T12:02:00.155845+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549706192.3.64.1522559TCP
                  2024-09-12T12:02:01.538657+02002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549707178.237.33.5080TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Sep 12, 2024 12:01:59.475826979 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:01:59.507572889 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:01:59.507653952 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:01:59.512727022 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:01:59.517540932 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:02:00.102688074 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:02:00.155844927 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:02:00.231667995 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:02:00.236166954 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:02:00.241405010 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:02:00.241486073 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:02:00.246448994 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:02:00.743207932 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:02:00.744930029 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:02:00.749986887 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:02:00.854599953 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:02:00.906024933 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:02:00.910413980 CEST4970780192.168.2.5178.237.33.50
                  Sep 12, 2024 12:02:00.915347099 CEST8049707178.237.33.50192.168.2.5
                  Sep 12, 2024 12:02:00.915429115 CEST4970780192.168.2.5178.237.33.50
                  Sep 12, 2024 12:02:00.915518045 CEST4970780192.168.2.5178.237.33.50
                  Sep 12, 2024 12:02:00.920675993 CEST8049707178.237.33.50192.168.2.5
                  Sep 12, 2024 12:02:01.538429976 CEST8049707178.237.33.50192.168.2.5
                  Sep 12, 2024 12:02:01.538656950 CEST4970780192.168.2.5178.237.33.50
                  Sep 12, 2024 12:02:01.547080994 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:02:01.552040100 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:02:02.537904024 CEST8049707178.237.33.50192.168.2.5
                  Sep 12, 2024 12:02:02.538228035 CEST4970780192.168.2.5178.237.33.50
                  Sep 12, 2024 12:02:15.371491909 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:02:15.373332977 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:02:15.378566980 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:02:45.473628998 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:02:45.478004932 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:02:45.483031988 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:03:15.568286896 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:03:15.573000908 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:03:15.578048944 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:03:45.888746023 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:03:45.893125057 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:03:45.898238897 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:03:50.890799046 CEST4970780192.168.2.5178.237.33.50
                  Sep 12, 2024 12:03:51.203018904 CEST4970780192.168.2.5178.237.33.50
                  Sep 12, 2024 12:03:51.812484026 CEST4970780192.168.2.5178.237.33.50
                  Sep 12, 2024 12:03:53.015587091 CEST4970780192.168.2.5178.237.33.50
                  Sep 12, 2024 12:03:55.421828032 CEST4970780192.168.2.5178.237.33.50
                  Sep 12, 2024 12:04:00.234366894 CEST4970780192.168.2.5178.237.33.50
                  Sep 12, 2024 12:04:09.843821049 CEST4970780192.168.2.5178.237.33.50
                  Sep 12, 2024 12:04:15.780910969 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:04:15.784288883 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:04:15.790225029 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:04:45.849647999 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:04:45.851246119 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:04:45.857965946 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:05:15.910701990 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:05:15.913466930 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:05:15.918512106 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:05:46.007018089 CEST255949706192.3.64.152192.168.2.5
                  Sep 12, 2024 12:05:46.008363008 CEST497062559192.168.2.5192.3.64.152
                  Sep 12, 2024 12:05:46.013297081 CEST255949706192.3.64.152192.168.2.5
                  TimestampSource PortDest PortSource IPDest IP
                  Sep 12, 2024 12:02:00.898068905 CEST6246753192.168.2.51.1.1.1
                  Sep 12, 2024 12:02:00.905246019 CEST53624671.1.1.1192.168.2.5
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Sep 12, 2024 12:02:00.898068905 CEST192.168.2.51.1.1.10x524eStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Sep 12, 2024 12:02:00.905246019 CEST1.1.1.1192.168.2.50x524eNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                  • geoplugin.net
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.549707178.237.33.50807108C:\Users\user\Desktop\New Order.exe
                  TimestampBytes transferredDirectionData
                  Sep 12, 2024 12:02:00.915518045 CEST71OUTGET /json.gp HTTP/1.1
                  Host: geoplugin.net
                  Cache-Control: no-cache
                  Sep 12, 2024 12:02:01.538429976 CEST1170INHTTP/1.1 200 OK
                  date: Thu, 12 Sep 2024 10:02:01 GMT
                  server: Apache
                  content-length: 962
                  content-type: application/json; charset=utf-8
                  cache-control: public, max-age=300
                  access-control-allow-origin: *
                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                  Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:06:01:58
                  Start date:12/09/2024
                  Path:C:\Users\user\Desktop\New Order.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\New Order.exe"
                  Imagebase:0x110000
                  File size:921'088 bytes
                  MD5 hash:8D1627DD83DE9AD6EA38B9B3D7E232FC
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2048014848.0000000003529000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2048014848.0000000003529000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2048014848.0000000003529000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                  Reputation:low
                  Has exited:true

                  Target ID:3
                  Start time:06:01:58
                  Start date:12/09/2024
                  Path:C:\Users\user\Desktop\New Order.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\New Order.exe"
                  Imagebase:0x590000
                  File size:921'088 bytes
                  MD5 hash:8D1627DD83DE9AD6EA38B9B3D7E232FC
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.4507004290.0000000000B67000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                  • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                  • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  Reputation:low
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:10.7%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:180
                    Total number of Limit Nodes:8
                    execution_graph 28085 7010a40 28086 7010bcb 28085->28086 28087 7010a66 28085->28087 28087->28086 28090 7010cc0 PostMessageW 28087->28090 28092 7010cb8 28087->28092 28091 7010d2c 28090->28091 28091->28087 28093 7010cc0 PostMessageW 28092->28093 28094 7010d2c 28093->28094 28094->28087 28101 6ccdb28 28102 6ccdbe7 28101->28102 28103 6ccdb3b 28101->28103 28103->28102 28106 6cce408 28103->28106 28111 6cce3f9 28103->28111 28107 6cce41d 28106->28107 28116 6cce448 28107->28116 28127 6cce438 28107->28127 28108 6cce42f 28108->28102 28112 6cce41d 28111->28112 28114 6cce448 10 API calls 28112->28114 28115 6cce438 10 API calls 28112->28115 28113 6cce42f 28113->28102 28114->28113 28115->28113 28118 6cce462 28116->28118 28117 6cce486 28117->28108 28138 6cceb0d 28118->28138 28143 6cce9d2 28118->28143 28148 6cce887 28118->28148 28154 6ccea17 28118->28154 28159 6ccea54 28118->28159 28163 6ccebcf 28118->28163 28167 6cce95e 28118->28167 28173 6cceb5e 28118->28173 28128 6cce448 28127->28128 28130 6cceb0d 2 API calls 28128->28130 28131 6cceb5e 2 API calls 28128->28131 28132 6cce95e 2 API calls 28128->28132 28133 6ccebcf 2 API calls 28128->28133 28134 6ccea54 2 API calls 28128->28134 28135 6ccea17 2 API calls 28128->28135 28136 6cce887 2 API calls 28128->28136 28137 6cce9d2 2 API calls 28128->28137 28129 6cce486 28129->28108 28130->28129 28131->28129 28132->28129 28133->28129 28134->28129 28135->28129 28136->28129 28137->28129 28139 6cceb13 28138->28139 28177 6ccd358 28139->28177 28181 6ccd350 28139->28181 28140 6ccf252 28144 6cce9dc 28143->28144 28185 6ccd508 28144->28185 28189 6ccd501 28144->28189 28145 6ccf385 28150 6cce894 28148->28150 28149 6cce908 28149->28117 28150->28149 28193 6ccd695 28150->28193 28197 6ccd6a0 28150->28197 28155 6ccea2c 28154->28155 28201 6ccd418 28155->28201 28205 6ccd410 28155->28205 28156 6ccf136 28160 6ccea6e 28159->28160 28209 6ccf640 28160->28209 28164 6ccebee 28163->28164 28166 6ccf640 2 API calls 28164->28166 28165 6ccebb2 28165->28117 28166->28165 28169 6cce894 28167->28169 28168 6cce908 28168->28117 28169->28168 28171 6ccd695 CreateProcessA 28169->28171 28172 6ccd6a0 CreateProcessA 28169->28172 28170 6cce993 28171->28170 28172->28170 28174 6cceb64 28173->28174 28176 6ccf640 2 API calls 28174->28176 28175 6ccebb2 28175->28117 28176->28175 28178 6ccd398 VirtualAllocEx 28177->28178 28180 6ccd3d5 28178->28180 28180->28140 28182 6ccd358 VirtualAllocEx 28181->28182 28184 6ccd3d5 28182->28184 28184->28140 28186 6ccd553 ReadProcessMemory 28185->28186 28188 6ccd597 28186->28188 28188->28145 28190 6ccd553 ReadProcessMemory 28189->28190 28192 6ccd597 28190->28192 28192->28145 28194 6ccd6a0 CreateProcessA 28193->28194 28196 6ccd8eb 28194->28196 28198 6ccd729 CreateProcessA 28197->28198 28200 6ccd8eb 28198->28200 28202 6ccd460 WriteProcessMemory 28201->28202 28204 6ccd4b7 28202->28204 28204->28156 28206 6ccd418 WriteProcessMemory 28205->28206 28208 6ccd4b7 28206->28208 28208->28156 28210 6ccf655 28209->28210 28214 6cccd98 28210->28214 28218 6cccd91 28210->28218 28211 6ccebb2 28211->28117 28215 6cccdd8 ResumeThread 28214->28215 28217 6ccce09 28215->28217 28217->28211 28219 6cccd98 ResumeThread 28218->28219 28221 6ccce09 28219->28221 28221->28211 28222 cf4668 28223 cf467a 28222->28223 28224 cf4686 28223->28224 28228 cf4779 28223->28228 28233 cf4204 28224->28233 28226 cf46a5 28229 cf479d 28228->28229 28237 cf4879 28229->28237 28241 cf4888 28229->28241 28234 cf420f 28233->28234 28249 cf5c6c 28234->28249 28236 cf7048 28236->28226 28238 cf48af 28237->28238 28240 cf498c 28238->28240 28245 cf44e4 28238->28245 28243 cf48af 28241->28243 28242 cf498c 28242->28242 28243->28242 28244 cf44e4 CreateActCtxA 28243->28244 28244->28242 28246 cf5918 CreateActCtxA 28245->28246 28248 cf59db 28246->28248 28250 cf5c77 28249->28250 28253 cf5c8c 28250->28253 28252 cf70ed 28252->28236 28254 cf5c97 28253->28254 28257 cf5cbc 28254->28257 28256 cf71c2 28256->28252 28258 cf5cc7 28257->28258 28261 cf5cec 28258->28261 28260 cf72c5 28260->28256 28262 cf5cf7 28261->28262 28264 cf85cb 28262->28264 28267 cfac79 28262->28267 28263 cf8609 28263->28260 28264->28263 28271 cfcd61 28264->28271 28276 cfaca0 28267->28276 28281 cfacb0 28267->28281 28268 cfac8e 28268->28264 28272 cfcd91 28271->28272 28273 cfcdb5 28272->28273 28295 cfcf1c 28272->28295 28299 cfcf20 28272->28299 28273->28263 28277 cfacb0 28276->28277 28285 cfada8 28277->28285 28290 cfad97 28277->28290 28278 cfacbf 28278->28268 28283 cfada8 GetModuleHandleW 28281->28283 28284 cfad97 GetModuleHandleW 28281->28284 28282 cfacbf 28282->28268 28283->28282 28284->28282 28286 cfaddc 28285->28286 28287 cfadb9 28285->28287 28286->28278 28287->28286 28288 cfafe0 GetModuleHandleW 28287->28288 28289 cfb00d 28288->28289 28289->28278 28291 cfadb9 28290->28291 28292 cfaddc 28290->28292 28291->28292 28293 cfafe0 GetModuleHandleW 28291->28293 28292->28278 28294 cfb00d 28293->28294 28294->28278 28297 cfcf2d 28295->28297 28296 cfcf67 28296->28273 28297->28296 28303 cfb780 28297->28303 28300 cfcf2d 28299->28300 28301 cfcf67 28300->28301 28302 cfb780 2 API calls 28300->28302 28301->28273 28302->28301 28305 cfb78b 28303->28305 28306 cfdcd2 28305->28306 28309 cfd084 28305->28309 28307 cf5cec 2 API calls 28306->28307 28308 cfdce7 28306->28308 28307->28308 28308->28296 28310 cfd08f 28309->28310 28311 cf5cec 2 API calls 28310->28311 28312 cfdce7 28311->28312 28312->28305 28313 cfd438 28314 cfd47e GetCurrentProcess 28313->28314 28316 cfd4c9 28314->28316 28317 cfd4d0 GetCurrentThread 28314->28317 28316->28317 28318 cfd50d GetCurrentProcess 28317->28318 28319 cfd506 28317->28319 28320 cfd543 28318->28320 28319->28318 28321 cfd56b GetCurrentThreadId 28320->28321 28322 cfd59c 28321->28322 28323 7011a78 CloseHandle 28324 7011adf 28323->28324 28095 6ccd280 28096 6ccd2c5 Wow64SetThreadContext 28095->28096 28098 6ccd30d 28096->28098 28099 cfd680 DuplicateHandle 28100 cfd716 28099->28100
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051582871.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7010000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4a2483ad6f92ce177314427130bf6b734af742ba849c6875b0cb7e38c051b469
                    • Instruction ID: 7fefb14edd2b7242699ff8d25a3133bb9d1248b3b8ff3b6e5dc3475a5793e6a3
                    • Opcode Fuzzy Hash: 4a2483ad6f92ce177314427130bf6b734af742ba849c6875b0cb7e38c051b469
                    • Instruction Fuzzy Hash: FED1BEB07017498FDB59DB79C450BAEB7FAAF89300F14856ED24ACB691DB34E801CB52

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 294 cfd429-cfd4c7 GetCurrentProcess 298 cfd4c9-cfd4cf 294->298 299 cfd4d0-cfd504 GetCurrentThread 294->299 298->299 300 cfd50d-cfd541 GetCurrentProcess 299->300 301 cfd506-cfd50c 299->301 303 cfd54a-cfd565 call cfd608 300->303 304 cfd543-cfd549 300->304 301->300 307 cfd56b-cfd59a GetCurrentThreadId 303->307 304->303 308 cfd59c-cfd5a2 307->308 309 cfd5a3-cfd605 307->309 308->309
                    APIs
                    • GetCurrentProcess.KERNEL32 ref: 00CFD4B6
                    • GetCurrentThread.KERNEL32 ref: 00CFD4F3
                    • GetCurrentProcess.KERNEL32 ref: 00CFD530
                    • GetCurrentThreadId.KERNEL32 ref: 00CFD589
                    Memory Dump Source
                    • Source File: 00000000.00000002.2046744260.0000000000CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_cf0000_New Order.jbxd
                    Similarity
                    • API ID: Current$ProcessThread
                    • String ID:
                    • API String ID: 2063062207-0
                    • Opcode ID: fb4b6664ae8d532b52b3305f3057e89307673ccb0980aaa8ab3ca33c575c6368
                    • Instruction ID: c317aa7c084bc725f65a554e43a09205b7fe01a4fdac347643489114df538466
                    • Opcode Fuzzy Hash: fb4b6664ae8d532b52b3305f3057e89307673ccb0980aaa8ab3ca33c575c6368
                    • Instruction Fuzzy Hash: F9517BB09003498FDB44DFA9D548BAEBFF1EF88304F20C05DE119A7261D738A945CB66

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 316 cfd438-cfd4c7 GetCurrentProcess 320 cfd4c9-cfd4cf 316->320 321 cfd4d0-cfd504 GetCurrentThread 316->321 320->321 322 cfd50d-cfd541 GetCurrentProcess 321->322 323 cfd506-cfd50c 321->323 325 cfd54a-cfd565 call cfd608 322->325 326 cfd543-cfd549 322->326 323->322 329 cfd56b-cfd59a GetCurrentThreadId 325->329 326->325 330 cfd59c-cfd5a2 329->330 331 cfd5a3-cfd605 329->331 330->331
                    APIs
                    • GetCurrentProcess.KERNEL32 ref: 00CFD4B6
                    • GetCurrentThread.KERNEL32 ref: 00CFD4F3
                    • GetCurrentProcess.KERNEL32 ref: 00CFD530
                    • GetCurrentThreadId.KERNEL32 ref: 00CFD589
                    Memory Dump Source
                    • Source File: 00000000.00000002.2046744260.0000000000CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_cf0000_New Order.jbxd
                    Similarity
                    • API ID: Current$ProcessThread
                    • String ID:
                    • API String ID: 2063062207-0
                    • Opcode ID: 9df68fcb1a7516884af3466d3b0c1b439a1ce6b804fc84b2fd11ef17fd29b888
                    • Instruction ID: 4fa5296944018e9bec4016e6714e3209ed527720c3c47797ccbbd074551c44af
                    • Opcode Fuzzy Hash: 9df68fcb1a7516884af3466d3b0c1b439a1ce6b804fc84b2fd11ef17fd29b888
                    • Instruction Fuzzy Hash: 8C5169B09003098FDB54DFA9D548BAEBBF5EF48304F20C059E119A7360D778A985CB66

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 481 6ccd695-6ccd735 484 6ccd76e-6ccd78e 481->484 485 6ccd737-6ccd741 481->485 492 6ccd7c7-6ccd7f6 484->492 493 6ccd790-6ccd79a 484->493 485->484 486 6ccd743-6ccd745 485->486 487 6ccd768-6ccd76b 486->487 488 6ccd747-6ccd751 486->488 487->484 490 6ccd755-6ccd764 488->490 491 6ccd753 488->491 490->490 495 6ccd766 490->495 491->490 501 6ccd82f-6ccd8e9 CreateProcessA 492->501 502 6ccd7f8-6ccd802 492->502 493->492 494 6ccd79c-6ccd79e 493->494 496 6ccd7a0-6ccd7aa 494->496 497 6ccd7c1-6ccd7c4 494->497 495->487 499 6ccd7ac 496->499 500 6ccd7ae-6ccd7bd 496->500 497->492 499->500 500->500 503 6ccd7bf 500->503 513 6ccd8eb-6ccd8f1 501->513 514 6ccd8f2-6ccd978 501->514 502->501 504 6ccd804-6ccd806 502->504 503->497 506 6ccd808-6ccd812 504->506 507 6ccd829-6ccd82c 504->507 508 6ccd814 506->508 509 6ccd816-6ccd825 506->509 507->501 508->509 509->509 511 6ccd827 509->511 511->507 513->514 524 6ccd988-6ccd98c 514->524 525 6ccd97a-6ccd97e 514->525 527 6ccd99c-6ccd9a0 524->527 528 6ccd98e-6ccd992 524->528 525->524 526 6ccd980 525->526 526->524 529 6ccd9b0-6ccd9b4 527->529 530 6ccd9a2-6ccd9a6 527->530 528->527 531 6ccd994 528->531 533 6ccd9c6-6ccd9cd 529->533 534 6ccd9b6-6ccd9bc 529->534 530->529 532 6ccd9a8 530->532 531->527 532->529 535 6ccd9cf-6ccd9de 533->535 536 6ccd9e4 533->536 534->533 535->536 538 6ccd9e5 536->538 538->538
                    APIs
                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06CCD8D6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: 16f9cb0f17a67669e3570459caef5ab89076ff8627323e3fa211915852cf4adf
                    • Instruction ID: adfba51456bfc7cdeb6b4e3c68e7848c725f88ff16e5883df05456463bdf9a55
                    • Opcode Fuzzy Hash: 16f9cb0f17a67669e3570459caef5ab89076ff8627323e3fa211915852cf4adf
                    • Instruction Fuzzy Hash: 68A15D71D00219CFEB64DF68C841BEDBBB2BF44310F14856EE84AA7244DB74AA85CF91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 539 6ccd6a0-6ccd735 541 6ccd76e-6ccd78e 539->541 542 6ccd737-6ccd741 539->542 549 6ccd7c7-6ccd7f6 541->549 550 6ccd790-6ccd79a 541->550 542->541 543 6ccd743-6ccd745 542->543 544 6ccd768-6ccd76b 543->544 545 6ccd747-6ccd751 543->545 544->541 547 6ccd755-6ccd764 545->547 548 6ccd753 545->548 547->547 552 6ccd766 547->552 548->547 558 6ccd82f-6ccd8e9 CreateProcessA 549->558 559 6ccd7f8-6ccd802 549->559 550->549 551 6ccd79c-6ccd79e 550->551 553 6ccd7a0-6ccd7aa 551->553 554 6ccd7c1-6ccd7c4 551->554 552->544 556 6ccd7ac 553->556 557 6ccd7ae-6ccd7bd 553->557 554->549 556->557 557->557 560 6ccd7bf 557->560 570 6ccd8eb-6ccd8f1 558->570 571 6ccd8f2-6ccd978 558->571 559->558 561 6ccd804-6ccd806 559->561 560->554 563 6ccd808-6ccd812 561->563 564 6ccd829-6ccd82c 561->564 565 6ccd814 563->565 566 6ccd816-6ccd825 563->566 564->558 565->566 566->566 568 6ccd827 566->568 568->564 570->571 581 6ccd988-6ccd98c 571->581 582 6ccd97a-6ccd97e 571->582 584 6ccd99c-6ccd9a0 581->584 585 6ccd98e-6ccd992 581->585 582->581 583 6ccd980 582->583 583->581 586 6ccd9b0-6ccd9b4 584->586 587 6ccd9a2-6ccd9a6 584->587 585->584 588 6ccd994 585->588 590 6ccd9c6-6ccd9cd 586->590 591 6ccd9b6-6ccd9bc 586->591 587->586 589 6ccd9a8 587->589 588->584 589->586 592 6ccd9cf-6ccd9de 590->592 593 6ccd9e4 590->593 591->590 592->593 595 6ccd9e5 593->595 595->595
                    APIs
                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06CCD8D6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: 8ee475d2551a82369816b5a22ddee86a5095e23c5b6f48ef6c853ef3a5231303
                    • Instruction ID: 6a1f95288bfc2b2f9327a2d46eeb42429f10f252738087fbd2b7245767e460ae
                    • Opcode Fuzzy Hash: 8ee475d2551a82369816b5a22ddee86a5095e23c5b6f48ef6c853ef3a5231303
                    • Instruction Fuzzy Hash: 5E914C71D00219CFEB64DF68C851BEDBBB2BF44314F14856EE80AA7244DB74AA85CF91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 596 cfada8-cfadb7 597 cfadb9-cfadc6 call cfa100 596->597 598 cfade3-cfade7 596->598 605 cfaddc 597->605 606 cfadc8 597->606 600 cfadfb-cfae3c 598->600 601 cfade9-cfadf3 598->601 607 cfae3e-cfae46 600->607 608 cfae49-cfae57 600->608 601->600 605->598 651 cfadce call cfb031 606->651 652 cfadce call cfb040 606->652 607->608 609 cfae7b-cfae7d 608->609 610 cfae59-cfae5e 608->610 612 cfae80-cfae87 609->612 613 cfae69 610->613 614 cfae60-cfae67 call cfa10c 610->614 611 cfadd4-cfadd6 611->605 615 cfaf18-cfafd8 611->615 617 cfae89-cfae91 612->617 618 cfae94-cfae9b 612->618 619 cfae6b-cfae79 613->619 614->619 646 cfafda-cfafdd 615->646 647 cfafe0-cfb00b GetModuleHandleW 615->647 617->618 620 cfae9d-cfaea5 618->620 621 cfaea8-cfaeaa call cfa11c 618->621 619->612 620->621 625 cfaeaf-cfaeb1 621->625 627 cfaebe-cfaec3 625->627 628 cfaeb3-cfaebb 625->628 629 cfaec5-cfaecc 627->629 630 cfaee1-cfaeee 627->630 628->627 629->630 632 cfaece-cfaede call cfa12c call cfa13c 629->632 637 cfaf11-cfaf17 630->637 638 cfaef0-cfaf0e 630->638 632->630 638->637 646->647 648 cfb00d-cfb013 647->648 649 cfb014-cfb028 647->649 648->649 651->611 652->611
                    APIs
                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00CFAFFE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2046744260.0000000000CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_cf0000_New Order.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID:
                    • API String ID: 4139908857-0
                    • Opcode ID: fff91f447c4237d3d56f6e7fe0bb44d56a9e2eeedd7927fdf6858c4d8e38469d
                    • Instruction ID: 3f07d8240ae8609691dbc12a19b5b304cbddf162c4588b055dce14d3fc33d814
                    • Opcode Fuzzy Hash: fff91f447c4237d3d56f6e7fe0bb44d56a9e2eeedd7927fdf6858c4d8e38469d
                    • Instruction Fuzzy Hash: 8F7166B0A00B098FD764DF69D4407AABBF5FF88300F00892DE55AD7A50DB35E946CB92

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 653 cf590d-cf59d9 CreateActCtxA 655 cf59db-cf59e1 653->655 656 cf59e2-cf5a3c 653->656 655->656 663 cf5a3e-cf5a41 656->663 664 cf5a4b-cf5a4f 656->664 663->664 665 cf5a51-cf5a5d 664->665 666 cf5a60 664->666 665->666 668 cf5a61 666->668 668->668
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 00CF59C9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2046744260.0000000000CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_cf0000_New Order.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: b046589cc8beac39256d5bc237e85e91c581fad97e9e2b7bf199a8e2683b3f94
                    • Instruction ID: cd46555ad97dc6b1d5f7cb0ba48712a72f27056eed4db5b86accdf369748bd5b
                    • Opcode Fuzzy Hash: b046589cc8beac39256d5bc237e85e91c581fad97e9e2b7bf199a8e2683b3f94
                    • Instruction Fuzzy Hash: 1B41E2B0C0061DCBDB24CFA9C884BDEBBF5BF49304F24806AD518AB251D7B56946CF91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 669 cf44e4-cf59d9 CreateActCtxA 672 cf59db-cf59e1 669->672 673 cf59e2-cf5a3c 669->673 672->673 680 cf5a3e-cf5a41 673->680 681 cf5a4b-cf5a4f 673->681 680->681 682 cf5a51-cf5a5d 681->682 683 cf5a60 681->683 682->683 685 cf5a61 683->685 685->685
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 00CF59C9
                    Memory Dump Source
                    • Source File: 00000000.00000002.2046744260.0000000000CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_cf0000_New Order.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: 27f787c2c9dfd82cede31919cb4048d26b60d8e59f2977d6b014035a8d0ded9c
                    • Instruction ID: 7c512c4c3ca545ed2aa2114ea9bcb6f692de9aa6e46e39eae49c9e7bb110f160
                    • Opcode Fuzzy Hash: 27f787c2c9dfd82cede31919cb4048d26b60d8e59f2977d6b014035a8d0ded9c
                    • Instruction Fuzzy Hash: 7F4102B0C0071DCBDB24CFA9C884B9DBBF5BF48704F20806AD608AB251DBB56946CF91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 686 6ccd410-6ccd466 689 6ccd468-6ccd474 686->689 690 6ccd476-6ccd4b5 WriteProcessMemory 686->690 689->690 692 6ccd4be-6ccd4ee 690->692 693 6ccd4b7-6ccd4bd 690->693 693->692
                    APIs
                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06CCD4A8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: 2f128e538cd9cb4c5b364ee4d90a9b12293f6e0f8732cd3bb2693d194bbfccbb
                    • Instruction ID: 76001f354312f1a319a192e47339d01aa7b623b448bac7e4eb067d5fef38f36f
                    • Opcode Fuzzy Hash: 2f128e538cd9cb4c5b364ee4d90a9b12293f6e0f8732cd3bb2693d194bbfccbb
                    • Instruction Fuzzy Hash: 4C2128B19003599FDB10DFA9C885BEEBBF5FF48320F50842DE959A7240D778A945CBA0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 697 6ccd418-6ccd466 699 6ccd468-6ccd474 697->699 700 6ccd476-6ccd4b5 WriteProcessMemory 697->700 699->700 702 6ccd4be-6ccd4ee 700->702 703 6ccd4b7-6ccd4bd 700->703 703->702
                    APIs
                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06CCD4A8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: 659fe4670929fb7aaf99ca69f78f30c8697d407bee539e1d3e3805a213bba1ec
                    • Instruction ID: 9e3187a21d778e66f24aebb4e651aa6e8702d1f05bf90cec1c580fe86aaa2077
                    • Opcode Fuzzy Hash: 659fe4670929fb7aaf99ca69f78f30c8697d407bee539e1d3e3805a213bba1ec
                    • Instruction Fuzzy Hash: B22127B19003099FDB10DFA9C885BEEBBF5FF48320F108429E919A7240D778A944CBA0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 707 6ccd278-6ccd2cb 710 6ccd2cd-6ccd2d9 707->710 711 6ccd2db-6ccd2de 707->711 710->711 712 6ccd2e5-6ccd30b Wow64SetThreadContext 711->712 713 6ccd30d-6ccd313 712->713 714 6ccd314-6ccd344 712->714 713->714
                    APIs
                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06CCD2FE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID: ContextThreadWow64
                    • String ID:
                    • API String ID: 983334009-0
                    • Opcode ID: 233093c16cf78c84363b469d81cf82f4403c0d8c79683615e7544fbb44d77f4f
                    • Instruction ID: d9133fc0bc7cd925d701c73a6debba129b713de3801d6b219f0fccf22e681698
                    • Opcode Fuzzy Hash: 233093c16cf78c84363b469d81cf82f4403c0d8c79683615e7544fbb44d77f4f
                    • Instruction Fuzzy Hash: 312114B19006098FDB10DFAAC8857EEBBF5FF48324F54842DD45AA7240DB78A945CBA0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 718 6ccd501-6ccd595 ReadProcessMemory 721 6ccd59e-6ccd5ce 718->721 722 6ccd597-6ccd59d 718->722 722->721
                    APIs
                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06CCD588
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID: MemoryProcessRead
                    • String ID:
                    • API String ID: 1726664587-0
                    • Opcode ID: 09b50c4d0c8a33a6dcf39b9ecea4c246d874da27709141c071cd2742d40e60bb
                    • Instruction ID: 9623c70b82843be3e80899d7d6cd7ca5453a3b755cb7a48efe24fd1ea3f7d782
                    • Opcode Fuzzy Hash: 09b50c4d0c8a33a6dcf39b9ecea4c246d874da27709141c071cd2742d40e60bb
                    • Instruction Fuzzy Hash: 832116B1D002499FDB10DFAAC885AEEBBF5FF48310F508429E519A7240D7799941CBA0
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00CFD707
                    Memory Dump Source
                    • Source File: 00000000.00000002.2046744260.0000000000CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_cf0000_New Order.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: 66d1f55aebbcbf906b20dc646eb1f0355203a7a6f5fa3c547d383c5970619815
                    • Instruction ID: 035ba68cc1ee31fa1ec8afbbc052b43eb2d8350c9968ce8cacded7a1730301fd
                    • Opcode Fuzzy Hash: 66d1f55aebbcbf906b20dc646eb1f0355203a7a6f5fa3c547d383c5970619815
                    • Instruction Fuzzy Hash: FC2123B5900248DFDB10CFAAD984AEEBFF5FB48310F14841AE918A7350D378A940CFA1
                    APIs
                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06CCD588
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID: MemoryProcessRead
                    • String ID:
                    • API String ID: 1726664587-0
                    • Opcode ID: 9fd6f448b869b1072ff20254fb3fab36879e1ce5d3fdb865cae2cb58afd4a243
                    • Instruction ID: 70117334d35cfd0e9c69df32bc2c56faa5b090b3703b12ecd7e691ba1398651f
                    • Opcode Fuzzy Hash: 9fd6f448b869b1072ff20254fb3fab36879e1ce5d3fdb865cae2cb58afd4a243
                    • Instruction Fuzzy Hash: 962128B1C003499FDB10DFAAC885AEEFBF5FF48310F508429E519A7240C738A941CBA0
                    APIs
                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06CCD2FE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID: ContextThreadWow64
                    • String ID:
                    • API String ID: 983334009-0
                    • Opcode ID: e281641c57cb47ae7aa47c5f09f2675029275f40cb1579cbc8d342b288504d6c
                    • Instruction ID: 5668072cf485cec6703e7454bb40c41d59635117882c5a375241a45c61403178
                    • Opcode Fuzzy Hash: e281641c57cb47ae7aa47c5f09f2675029275f40cb1579cbc8d342b288504d6c
                    • Instruction Fuzzy Hash: CB2104B1D002098FDB10DFAAC4857EEBBF4EF48324F14842ED51AA7240DB78A945CBA1
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00CFD707
                    Memory Dump Source
                    • Source File: 00000000.00000002.2046744260.0000000000CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_cf0000_New Order.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: e601afcdd8fc34c020c6ea0c1658e4ce2f157194ead8ee6173009098c9e44825
                    • Instruction ID: 90122a98df4b99849227b2d879e9c7beff1c1c434b1452dfca67a88c57efa725
                    • Opcode Fuzzy Hash: e601afcdd8fc34c020c6ea0c1658e4ce2f157194ead8ee6173009098c9e44825
                    • Instruction Fuzzy Hash: 5421F5B59002089FDB10CF9AD584AEEFFF9FB48310F14841AE919A7350D378A940CFA1
                    APIs
                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06CCD3C6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 7ebf4ddd7f0d727fc542d01c30a0fb3612a6aeddcbffe6b3f38f846fcb15df66
                    • Instruction ID: 16869d19363750246cba0b4274a92676f925db021280484dbbbf23f337cd5e48
                    • Opcode Fuzzy Hash: 7ebf4ddd7f0d727fc542d01c30a0fb3612a6aeddcbffe6b3f38f846fcb15df66
                    • Instruction Fuzzy Hash: 521117758002499FDB20DFAAD845AEFBFF5FF88320F148819E51AA7250C779A540CFA1
                    APIs
                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06CCD3C6
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 545a675fe0924e45a3b9f58006ded1caa11020823559daf1cf885901efb24d8e
                    • Instruction ID: 0d02b6c914614849e1353728022cb4313fa5612a2b3a42839171b881ebc1d223
                    • Opcode Fuzzy Hash: 545a675fe0924e45a3b9f58006ded1caa11020823559daf1cf885901efb24d8e
                    • Instruction Fuzzy Hash: 26113A758002499FDB10DFAAD845ADEFFF5FF88320F148819E519A7250C779A540CFA0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: e2f57efb5d977807af8fd3c208267328e29e4c15b95c44d2311490bb66695a28
                    • Instruction ID: fcb15b123753b1ab46f5ac4a7a5d9d771f5a0f497eb54299a1459547dac768b7
                    • Opcode Fuzzy Hash: e2f57efb5d977807af8fd3c208267328e29e4c15b95c44d2311490bb66695a28
                    • Instruction Fuzzy Hash: 561107B1D002498BDB20DFAAC4457DEFBF5EB88324F24881DD519A7240C779A545CBA4
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: 0afb3a840986900f315f1beab927a276c7a09755d9a0dba1cc478e09109c3dc1
                    • Instruction ID: 495933b3601e9cf1c079726734e438cfcd5ae303a3326628c57ea6cf4575b7a1
                    • Opcode Fuzzy Hash: 0afb3a840986900f315f1beab927a276c7a09755d9a0dba1cc478e09109c3dc1
                    • Instruction Fuzzy Hash: 351136B1D002488FDB20DFAAC4457EEFBF5EF88324F24881DD519A7240CB79A945CBA4
                    APIs
                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00CFAFFE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2046744260.0000000000CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_cf0000_New Order.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID:
                    • API String ID: 4139908857-0
                    • Opcode ID: 5850d9757bc19efb0e53d5cfbce70207e87129885568d96210b0ddc0bfd87e1c
                    • Instruction ID: b961ce5b6b2224a2c4a2104995f83eb1824a47be7bd23a2e606266d521cdeff6
                    • Opcode Fuzzy Hash: 5850d9757bc19efb0e53d5cfbce70207e87129885568d96210b0ddc0bfd87e1c
                    • Instruction Fuzzy Hash: CA11E0B5C006498FDB10DF9AC444BDEFBF4EF88314F14841AD529A7610D379A945CFA5
                    APIs
                    • PostMessageW.USER32(?,?,?,?), ref: 07010D1D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051582871.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7010000_New Order.jbxd
                    Similarity
                    • API ID: MessagePost
                    • String ID:
                    • API String ID: 410705778-0
                    • Opcode ID: 6e1bf1f3506d2a27899aedd482d2841decf01c5ed2e991fbf18336f168fba5bb
                    • Instruction ID: c52dec4427332ee0a1641c7b111ac2f6509c44badfcd49db28362633b40401dd
                    • Opcode Fuzzy Hash: 6e1bf1f3506d2a27899aedd482d2841decf01c5ed2e991fbf18336f168fba5bb
                    • Instruction Fuzzy Hash: C311E3B58002499FDB10DF99D885BDEBBF8FB48320F208859E559A7200C379A584CFA1
                    APIs
                    • PostMessageW.USER32(?,?,?,?), ref: 07010D1D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051582871.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7010000_New Order.jbxd
                    Similarity
                    • API ID: MessagePost
                    • String ID:
                    • API String ID: 410705778-0
                    • Opcode ID: a292c11e0ccc26d285531bfcc99433712758687a7845ec6732bc521a0cf3404a
                    • Instruction ID: c777c069295c2f3dbb96a8201e48396a545ab252adeffa4211de72e53c4780d3
                    • Opcode Fuzzy Hash: a292c11e0ccc26d285531bfcc99433712758687a7845ec6732bc521a0cf3404a
                    • Instruction Fuzzy Hash: A801E2B08003499FDB10DF9AC989B9EBFF8FB08310F108809E559A7350C378A984CFA5
                    APIs
                    • CloseHandle.KERNELBASE(?), ref: 07011AD0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051582871.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7010000_New Order.jbxd
                    Similarity
                    • API ID: CloseHandle
                    • String ID:
                    • API String ID: 2962429428-0
                    • Opcode ID: 44c1c1efc1eb5dde37e1f4725a1777d57d5b591456910dd2bb6ef723bffc8fec
                    • Instruction ID: 97d3d872aab48a48bf0bc6bcf2a131c7ccf0939eba6d4e2e898dacd730f10fde
                    • Opcode Fuzzy Hash: 44c1c1efc1eb5dde37e1f4725a1777d57d5b591456910dd2bb6ef723bffc8fec
                    • Instruction Fuzzy Hash: B31128B58006499FDB20DF9AC445BDEBFF4FB48320F14841AD559A7240D339A544CFA5
                    APIs
                    • CloseHandle.KERNELBASE(?), ref: 07011AD0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051582871.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7010000_New Order.jbxd
                    Similarity
                    • API ID: CloseHandle
                    • String ID:
                    • API String ID: 2962429428-0
                    • Opcode ID: 54669d5b410c26c5ea44086f1edc0c326e2b312b7a7e699accef12b3cc754261
                    • Instruction ID: 8e30782b31d5b1aebab00437d4a6f991b8df520ced6d79c75bea7b1b0ecc4792
                    • Opcode Fuzzy Hash: 54669d5b410c26c5ea44086f1edc0c326e2b312b7a7e699accef12b3cc754261
                    • Instruction Fuzzy Hash: D21133B18006498FDB20DF9AC445BDEBBF4EB48320F10881AD558A7240D338A944CFA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.2046507897.00000000009BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009BD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_9bd000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ffaf94f0b29d2f5471db3cab4c61ecbd58dee724bc69aa2868dde5cade619935
                    • Instruction ID: 6579c1986e03eb053d8bb87a90db85ddb28ce605173cd83b8075435642749d9c
                    • Opcode Fuzzy Hash: ffaf94f0b29d2f5471db3cab4c61ecbd58dee724bc69aa2868dde5cade619935
                    • Instruction Fuzzy Hash: 15213A71500204DFDB05DF14DAC0F66BF6AFB98334F20C569D9090B2A6D33AE856D7A2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2046551269.00000000009CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009CD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_9cd000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ed5395a959e71e99559a44b03792beb2c0791562c65afa29843148f7fa886e74
                    • Instruction ID: 7199d36ec1351bc3e73a6340c44de0074f60a4fa00768905f33880675fff5386
                    • Opcode Fuzzy Hash: ed5395a959e71e99559a44b03792beb2c0791562c65afa29843148f7fa886e74
                    • Instruction Fuzzy Hash: B921D371904204DFDB14DF28D584F26BB69FB88314F20C97DD94A4B296C33AD807CA62
                    Memory Dump Source
                    • Source File: 00000000.00000002.2046551269.00000000009CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009CD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_9cd000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0ab26b40f8d7907f9d41b171f17199e49fcc0204fc96879a48b0e20e61f60622
                    • Instruction ID: d63a47d18d52a71f538c65e0ac15bac4c54e0c9691a3e1c241cee1ad8a75f16d
                    • Opcode Fuzzy Hash: 0ab26b40f8d7907f9d41b171f17199e49fcc0204fc96879a48b0e20e61f60622
                    • Instruction Fuzzy Hash: C8210471904204EFDB05DF24D9C0F26BBA9FB88314F24C97DE9594B296C33AD806CB62
                    Memory Dump Source
                    • Source File: 00000000.00000002.2046551269.00000000009CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009CD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_9cd000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3dc52b5a5c04ba4c84ff75de9bc55e698e0ecc7d293bfd7d2594d242add037be
                    • Instruction ID: 14a953de07a138b2f7a922358491c28a9039f29354c69619faf2d4058e8f26cd
                    • Opcode Fuzzy Hash: 3dc52b5a5c04ba4c84ff75de9bc55e698e0ecc7d293bfd7d2594d242add037be
                    • Instruction Fuzzy Hash: 792150755093809FDB12CF24D994B15BF71EB46314F28C5EED8498B6A7C33A980ACB62
                    Memory Dump Source
                    • Source File: 00000000.00000002.2046507897.00000000009BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009BD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_9bd000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                    • Instruction ID: 8eee7bba2a2b453e639eff6a52bf490a129f9a7b6e03ca2d63053d4a9d6210c6
                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                    • Instruction Fuzzy Hash: 3F112672404240CFDB02CF00D6C4B56BF72FB94324F24C6A9D9090B266C33AE85ACBA2
                    Memory Dump Source
                    • Source File: 00000000.00000002.2046551269.00000000009CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009CD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_9cd000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                    • Instruction ID: 5173cae72fee6c5d1689385ad1618ebe3abb28ce17091782b0cc814363391f94
                    • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                    • Instruction Fuzzy Hash: A4118B76904280DFDB16CF14D9C4B15BBA1FB84314F24C6AED8494B696C33AD84ACB62
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051582871.0000000007010000.00000040.00000800.00020000.00000000.sdmp, Offset: 07010000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7010000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID: PH]q$PH]q
                    • API String ID: 0-1166926398
                    • Opcode ID: b04d654da49cdce7a3fbe47c6ac9e1eb7ad4b2f4f91f799b7468db2d52b1508f
                    • Instruction ID: 54947e37be067dce3a171265c48a5d777ef8386109b9280e3b10197ecd6be3a1
                    • Opcode Fuzzy Hash: b04d654da49cdce7a3fbe47c6ac9e1eb7ad4b2f4f91f799b7468db2d52b1508f
                    • Instruction Fuzzy Hash: DBD1A0B4B00605CFDB48DF69C598AA9B7F1BF89701F2581A9E445AB371DB31AD80CF60
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID: Gcr
                    • API String ID: 0-3530800716
                    • Opcode ID: 696b8e9690141aead74ac2b348471bb7718f008cf6546982a365ec228a3db227
                    • Instruction ID: 00dd8bd154ab8f5e9aed6e9ab5c8aa711914b6f09323dea63c27d0f34d4941d0
                    • Opcode Fuzzy Hash: 696b8e9690141aead74ac2b348471bb7718f008cf6546982a365ec228a3db227
                    • Instruction Fuzzy Hash: CAE13C74E001198FCB14DFA9C5849AEFBB2FF89315F248169E414AB356D731AD82CFA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 103aa6d56e15213cd4e12eff36ed24810bbf45087219b5213c2c5c77f6e3b8f5
                    • Instruction ID: e2480b07ab2fb33f5d2c2479ec906a6d55a57b4d700c792e31410c0e0b252a7b
                    • Opcode Fuzzy Hash: 103aa6d56e15213cd4e12eff36ed24810bbf45087219b5213c2c5c77f6e3b8f5
                    • Instruction Fuzzy Hash: F7E10A74E001198FCB14DFA9C5849AEFBB2FF89315F248169E414AB35AD731AD42CFA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ad8811d47703ea37ddaec85b1fc3959718e56af6d84df7d9e521418dcedd2ba4
                    • Instruction ID: 6cfdab08e4ea9ba8c2de13d17da9c84fe5905136214ee5310ecb7ed3ffd66a38
                    • Opcode Fuzzy Hash: ad8811d47703ea37ddaec85b1fc3959718e56af6d84df7d9e521418dcedd2ba4
                    • Instruction Fuzzy Hash: CEE11B74E001198FCB14DFA9C5809AEFBF2FF89315F248169E458AB356D731A982CF64
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3e17dc96048b71c19de10629e2edd4d7621e9d95e3d06b99deaac57fd3fe461e
                    • Instruction ID: 62a44634bf3d02b9a4392e9ac9c8351d9b941010ead93bf838f105b55eb222d7
                    • Opcode Fuzzy Hash: 3e17dc96048b71c19de10629e2edd4d7621e9d95e3d06b99deaac57fd3fe461e
                    • Instruction Fuzzy Hash: 23E12C74E001598FCB14DFA9C5819AEFBB2FF89315F248169E414AB356D730AD82CFA4
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2f9c03b79d8be24c0aa66066d12184a810f5fcdc74998276a59e1c7a04b1cabd
                    • Instruction ID: 5ad54000eb90641880b3fbb320a5072e6f83ebb1763886041ca393abda7e007d
                    • Opcode Fuzzy Hash: 2f9c03b79d8be24c0aa66066d12184a810f5fcdc74998276a59e1c7a04b1cabd
                    • Instruction Fuzzy Hash: A0E10B74E002198FCB14DFA9C5809AEFBB2FF89315F248169E515AB356D730AD42CFA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2046744260.0000000000CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_cf0000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7c118129ccee7ed6f57fb08a354cf53676db2ffec78a103a5342b548c7c8fc3a
                    • Instruction ID: bd2721b52ae9ec024c336abb719ae2a06bf30927036a16d33ea6ee3156028c7f
                    • Opcode Fuzzy Hash: 7c118129ccee7ed6f57fb08a354cf53676db2ffec78a103a5342b548c7c8fc3a
                    • Instruction Fuzzy Hash: C4A17E36E002098FCF05DFB5C8409AEB7B2FF85304B15857EEA11AB266DB71E916DB41
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7f4ab5c0a113aebddd4541d98b33e22268d6bb596874eacc27aa5824eab1b471
                    • Instruction ID: 2fcc22071c3b4b8c9a5fa3fa08987760401771c070c9d7b7a0b3f4aa3875d5e3
                    • Opcode Fuzzy Hash: 7f4ab5c0a113aebddd4541d98b33e22268d6bb596874eacc27aa5824eab1b471
                    • Instruction Fuzzy Hash: 98510A74E002198FDB14CFA9C5819AEFBF2BF89315F24C169D418A7316D7319A42CFA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.2051096781.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6cc0000_New Order.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b1603a4534c0b1c58bfaa8820c8d69e442398aef98479d3c60081c659586f726
                    • Instruction ID: 56ccf9d2403656aa0af3d07fc315adc10aa0f9dda4e7d19a7f7c8760e49765b8
                    • Opcode Fuzzy Hash: b1603a4534c0b1c58bfaa8820c8d69e442398aef98479d3c60081c659586f726
                    • Instruction Fuzzy Hash: 851196B1E11B189BEB58CF6B8C0078AFAF3AFC9310F04C1AAD408AA254EB3019458F51

                    Execution Graph

                    Execution Coverage:4%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:5.4%
                    Total number of Nodes:1311
                    Total number of Limit Nodes:59
                    execution_graph 47258 434887 47259 434893 ___DestructExceptionObject 47258->47259 47285 434596 47259->47285 47261 43489a 47263 4348c3 47261->47263 47583 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 47261->47583 47271 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47263->47271 47584 444251 5 API calls TranslatorGuardHandler 47263->47584 47265 4348dc 47266 4348e2 ___DestructExceptionObject 47265->47266 47585 4441f5 5 API calls TranslatorGuardHandler 47265->47585 47268 434962 47296 434b14 47268->47296 47271->47268 47586 4433e7 36 API calls 5 library calls 47271->47586 47278 434984 47279 43498e 47278->47279 47588 44341f 28 API calls _abort 47278->47588 47280 434997 47279->47280 47589 4433c2 28 API calls _abort 47279->47589 47590 43470d 13 API calls 2 library calls 47280->47590 47284 43499f 47284->47266 47286 43459f 47285->47286 47591 434c52 IsProcessorFeaturePresent 47286->47591 47288 4345ab 47592 438f31 10 API calls 4 library calls 47288->47592 47290 4345b0 47295 4345b4 47290->47295 47593 4440bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47290->47593 47292 4345bd 47293 4345cb 47292->47293 47594 438f5a 8 API calls 3 library calls 47292->47594 47293->47261 47295->47261 47595 436e90 47296->47595 47299 434968 47300 4441a2 47299->47300 47597 44f059 47300->47597 47302 434971 47305 40e9c5 47302->47305 47303 4441ab 47303->47302 47601 446815 36 API calls 47303->47601 47603 41cb50 LoadLibraryA GetProcAddress 47305->47603 47307 40e9e1 GetModuleFileNameW 47608 40f3c3 47307->47608 47309 40e9fd 47623 4020f6 47309->47623 47312 4020f6 28 API calls 47313 40ea1b 47312->47313 47629 41be1b 47313->47629 47317 40ea2d 47655 401e8d 47317->47655 47319 40ea36 47320 40ea93 47319->47320 47321 40ea49 47319->47321 47661 401e65 47320->47661 47929 40fbb3 118 API calls 47321->47929 47324 40eaa3 47328 401e65 22 API calls 47324->47328 47325 40ea5b 47326 401e65 22 API calls 47325->47326 47327 40ea67 47326->47327 47930 410f37 36 API calls __EH_prolog 47327->47930 47329 40eac2 47328->47329 47666 40531e 47329->47666 47332 40ead1 47671 406383 47332->47671 47333 40ea79 47931 40fb64 78 API calls 47333->47931 47336 40ea82 47932 40f3b0 71 API calls 47336->47932 47343 401fd8 11 API calls 47345 40eefb 47343->47345 47344 401fd8 11 API calls 47346 40eafb 47344->47346 47587 4432f6 GetModuleHandleW 47345->47587 47347 401e65 22 API calls 47346->47347 47348 40eb04 47347->47348 47688 401fc0 47348->47688 47350 40eb0f 47351 401e65 22 API calls 47350->47351 47352 40eb28 47351->47352 47353 401e65 22 API calls 47352->47353 47354 40eb43 47353->47354 47355 40ebae 47354->47355 47933 406c1e 47354->47933 47357 401e65 22 API calls 47355->47357 47362 40ebbb 47357->47362 47358 40eb70 47359 401fe2 28 API calls 47358->47359 47360 40eb7c 47359->47360 47363 401fd8 11 API calls 47360->47363 47361 40ec02 47692 40d069 47361->47692 47362->47361 47368 413549 3 API calls 47362->47368 47364 40eb85 47363->47364 47938 413549 RegOpenKeyExA 47364->47938 47366 40ec08 47367 40ea8b 47366->47367 47695 41b2c3 47366->47695 47367->47343 47374 40ebe6 47368->47374 47372 40ec23 47375 40ec76 47372->47375 47712 407716 47372->47712 47373 40f34f 48021 4139a9 30 API calls 47373->48021 47374->47361 47941 4139a9 30 API calls 47374->47941 47378 401e65 22 API calls 47375->47378 47381 40ec7f 47378->47381 47380 40f365 48022 412475 65 API calls ___scrt_fastfail 47380->48022 47389 40ec90 47381->47389 47390 40ec8b 47381->47390 47384 40ec42 47942 407738 30 API calls 47384->47942 47385 40ec4c 47386 401e65 22 API calls 47385->47386 47399 40ec55 47386->47399 47387 40f36f 47392 41bc5e 28 API calls 47387->47392 47395 401e65 22 API calls 47389->47395 47945 407755 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 47390->47945 47391 40ec47 47943 407260 98 API calls 47391->47943 47396 40f37f 47392->47396 47397 40ec99 47395->47397 47821 413a23 RegOpenKeyExW 47396->47821 47716 41bc5e 47397->47716 47399->47375 47403 40ec71 47399->47403 47400 40eca4 47720 401f13 47400->47720 47944 407260 98 API calls 47403->47944 47407 401f09 11 API calls 47409 40f39c 47407->47409 47411 401f09 11 API calls 47409->47411 47413 40f3a5 47411->47413 47412 401e65 22 API calls 47414 40ecc1 47412->47414 47824 40dd42 47413->47824 47419 401e65 22 API calls 47414->47419 47418 40f3af 47420 40ecdb 47419->47420 47421 401e65 22 API calls 47420->47421 47422 40ecf5 47421->47422 47423 401e65 22 API calls 47422->47423 47424 40ed0e 47423->47424 47426 401e65 22 API calls 47424->47426 47456 40ed7b 47424->47456 47425 40ed8a 47427 40ed93 47425->47427 47455 40ee0f ___scrt_fastfail 47425->47455 47431 40ed23 _wcslen 47426->47431 47428 401e65 22 API calls 47427->47428 47429 40ed9c 47428->47429 47432 401e65 22 API calls 47429->47432 47430 40ef06 ___scrt_fastfail 48006 4136f8 RegOpenKeyExA 47430->48006 47433 401e65 22 API calls 47431->47433 47431->47456 47434 40edae 47432->47434 47435 40ed3e 47433->47435 47437 401e65 22 API calls 47434->47437 47438 401e65 22 API calls 47435->47438 47439 40edc0 47437->47439 47440 40ed53 47438->47440 47442 401e65 22 API calls 47439->47442 47946 40da34 47440->47946 47441 40ef51 47443 401e65 22 API calls 47441->47443 47444 40ede9 47442->47444 47445 40ef76 47443->47445 47449 401e65 22 API calls 47444->47449 47742 402093 47445->47742 47448 401f13 28 API calls 47451 40ed72 47448->47451 47452 40edfa 47449->47452 47454 401f09 11 API calls 47451->47454 48004 40cdf9 45 API calls _wcslen 47452->48004 47453 40ef88 47748 41376f RegCreateKeyA 47453->47748 47454->47456 47732 413947 47455->47732 47456->47425 47456->47430 47460 40eea3 ctype 47465 401e65 22 API calls 47460->47465 47461 40ee0a 47461->47455 47463 401e65 22 API calls 47464 40efaa 47463->47464 47754 43baac 47464->47754 47466 40eeba 47465->47466 47466->47441 47470 40eece 47466->47470 47469 40efc1 48009 41cd9b 87 API calls ___scrt_fastfail 47469->48009 47472 401e65 22 API calls 47470->47472 47471 40efe4 47476 402093 28 API calls 47471->47476 47474 40eed7 47472->47474 47477 41bc5e 28 API calls 47474->47477 47475 40efc8 CreateThread 47475->47471 48798 41d45d 10 API calls 47475->48798 47478 40eff9 47476->47478 47479 40eee3 47477->47479 47480 402093 28 API calls 47478->47480 48005 40f474 104 API calls 47479->48005 47483 40f008 47480->47483 47482 40eee8 47482->47441 47485 40eeef 47482->47485 47758 41b4ef 47483->47758 47485->47367 47487 401e65 22 API calls 47488 40f019 47487->47488 47489 401e65 22 API calls 47488->47489 47490 40f02b 47489->47490 47491 401e65 22 API calls 47490->47491 47492 40f04b 47491->47492 47493 43baac _strftime 40 API calls 47492->47493 47494 40f058 47493->47494 47495 401e65 22 API calls 47494->47495 47496 40f063 47495->47496 47497 401e65 22 API calls 47496->47497 47498 40f074 47497->47498 47499 401e65 22 API calls 47498->47499 47500 40f089 47499->47500 47501 401e65 22 API calls 47500->47501 47502 40f09a 47501->47502 47503 40f0a1 StrToIntA 47502->47503 47782 409de4 47503->47782 47506 401e65 22 API calls 47507 40f0bc 47506->47507 47508 40f101 47507->47508 47509 40f0c8 47507->47509 47512 401e65 22 API calls 47508->47512 48010 4344ea 47509->48010 47513 40f111 47512->47513 47516 40f159 47513->47516 47517 40f11d 47513->47517 47514 401e65 22 API calls 47515 40f0e4 47514->47515 47518 40f0eb CreateThread 47515->47518 47520 401e65 22 API calls 47516->47520 47519 4344ea new 22 API calls 47517->47519 47518->47508 48802 419fb4 103 API calls 2 library calls 47518->48802 47521 40f126 47519->47521 47522 40f162 47520->47522 47523 401e65 22 API calls 47521->47523 47525 40f1cc 47522->47525 47526 40f16e 47522->47526 47524 40f138 47523->47524 47528 40f13f CreateThread 47524->47528 47529 401e65 22 API calls 47525->47529 47527 401e65 22 API calls 47526->47527 47531 40f17e 47527->47531 47528->47516 48801 419fb4 103 API calls 2 library calls 47528->48801 47530 40f1d5 47529->47530 47532 40f1e1 47530->47532 47533 40f21a 47530->47533 47534 401e65 22 API calls 47531->47534 47536 401e65 22 API calls 47532->47536 47807 41b60d GetComputerNameExW GetUserNameW 47533->47807 47537 40f193 47534->47537 47539 40f1ea 47536->47539 48017 40d9e8 31 API calls 47537->48017 47544 401e65 22 API calls 47539->47544 47540 401f13 28 API calls 47541 40f22e 47540->47541 47543 401f09 11 API calls 47541->47543 47546 40f237 47543->47546 47547 40f1ff 47544->47547 47545 40f1a6 47548 401f13 28 API calls 47545->47548 47549 40f240 SetProcessDEPPolicy 47546->47549 47550 40f243 CreateThread 47546->47550 47557 43baac _strftime 40 API calls 47547->47557 47551 40f1b2 47548->47551 47549->47550 47552 40f264 47550->47552 47553 40f258 CreateThread 47550->47553 48770 40f7a7 47550->48770 47554 401f09 11 API calls 47551->47554 47555 40f279 47552->47555 47556 40f26d CreateThread 47552->47556 47553->47552 48797 4120f7 138 API calls 47553->48797 47558 40f1bb CreateThread 47554->47558 47560 40f2cc 47555->47560 47562 402093 28 API calls 47555->47562 47556->47555 48799 4126db 38 API calls ___scrt_fastfail 47556->48799 47559 40f20c 47557->47559 47558->47525 48800 401be9 50 API calls _strftime 47558->48800 48018 40c162 7 API calls 47559->48018 47818 4134ff RegOpenKeyExA 47560->47818 47563 40f29c 47562->47563 48019 4052fd 28 API calls 47563->48019 47569 40f2ed 47571 41bc5e 28 API calls 47569->47571 47572 40f2fd 47571->47572 48020 41361b 31 API calls 47572->48020 47577 40f313 47578 401f09 11 API calls 47577->47578 47581 40f31e 47578->47581 47579 40f346 DeleteFileW 47580 40f34d 47579->47580 47579->47581 47580->47387 47581->47387 47581->47579 47582 40f334 Sleep 47581->47582 47582->47581 47583->47261 47584->47265 47585->47271 47586->47268 47587->47278 47588->47279 47589->47280 47590->47284 47591->47288 47592->47290 47593->47292 47594->47295 47596 434b27 GetStartupInfoW 47595->47596 47596->47299 47598 44f06b 47597->47598 47599 44f062 47597->47599 47598->47303 47602 44ef58 49 API calls 5 library calls 47599->47602 47601->47303 47602->47598 47604 41cb8f LoadLibraryA GetProcAddress 47603->47604 47605 41cb7f GetModuleHandleA GetProcAddress 47603->47605 47606 41cbb8 44 API calls 47604->47606 47607 41cba8 LoadLibraryA GetProcAddress 47604->47607 47605->47604 47606->47307 47607->47606 48023 41b4a8 FindResourceA 47608->48023 47612 40f3ed _Yarn 48033 4020b7 47612->48033 47615 401fe2 28 API calls 47616 40f413 47615->47616 47617 401fd8 11 API calls 47616->47617 47618 40f41c 47617->47618 47619 43bd51 new 21 API calls 47618->47619 47620 40f42d _Yarn 47619->47620 48039 406dd8 47620->48039 47622 40f460 47622->47309 47624 40210c 47623->47624 47625 4023ce 11 API calls 47624->47625 47626 402126 47625->47626 47627 402569 28 API calls 47626->47627 47628 402134 47627->47628 47628->47312 48076 4020df 47629->48076 47631 41be2e 47635 41bea0 47631->47635 47643 401fe2 28 API calls 47631->47643 47645 401fd8 11 API calls 47631->47645 47650 41be9e 47631->47650 48080 4041a2 47631->48080 48083 41ce34 47631->48083 47632 401fd8 11 API calls 47633 41bed0 47632->47633 47634 401fd8 11 API calls 47633->47634 47636 41bed8 47634->47636 47637 4041a2 28 API calls 47635->47637 47639 401fd8 11 API calls 47636->47639 47640 41beac 47637->47640 47641 40ea24 47639->47641 47642 401fe2 28 API calls 47640->47642 47651 40fb17 47641->47651 47644 41beb5 47642->47644 47643->47631 47646 401fd8 11 API calls 47644->47646 47645->47631 47647 41bebd 47646->47647 47648 41ce34 28 API calls 47647->47648 47648->47650 47650->47632 47652 40fb23 47651->47652 47654 40fb2a 47651->47654 48125 402163 11 API calls 47652->48125 47654->47317 47656 402163 47655->47656 47660 40219f 47656->47660 48126 402730 11 API calls 47656->48126 47658 402184 48127 402712 11 API calls std::_Deallocate 47658->48127 47660->47319 47663 401e6d 47661->47663 47662 401e75 47662->47324 47663->47662 48128 402158 22 API calls 47663->48128 47667 4020df 11 API calls 47666->47667 47668 40532a 47667->47668 48129 4032a0 47668->48129 47670 405346 47670->47332 48134 4051ef 47671->48134 47673 406391 48138 402055 47673->48138 47676 401fe2 47677 401ff1 47676->47677 47684 402039 47676->47684 47678 4023ce 11 API calls 47677->47678 47679 401ffa 47678->47679 47680 402015 47679->47680 47681 40203c 47679->47681 48172 403098 28 API calls 47680->48172 47682 40267a 11 API calls 47681->47682 47682->47684 47685 401fd8 47684->47685 47686 4023ce 11 API calls 47685->47686 47687 401fe1 47686->47687 47687->47344 47689 401fd2 47688->47689 47690 401fc9 47688->47690 47689->47350 48173 4025e0 28 API calls 47690->48173 48174 401fab 47692->48174 47694 40d073 CreateMutexA GetLastError 47694->47366 48175 41bfb7 47695->48175 47700 401fe2 28 API calls 47701 41b2ff 47700->47701 47702 401fd8 11 API calls 47701->47702 47703 41b307 47702->47703 47704 4135a6 31 API calls 47703->47704 47706 41b35d 47703->47706 47705 41b330 47704->47705 47707 41b33b StrToIntA 47705->47707 47706->47372 47708 41b349 47707->47708 47711 41b352 47707->47711 48183 41cf69 22 API calls 47708->48183 47710 401fd8 11 API calls 47710->47706 47711->47710 47713 40772a 47712->47713 47714 413549 3 API calls 47713->47714 47715 407731 47714->47715 47715->47384 47715->47385 47717 41bc72 47716->47717 48184 40b904 47717->48184 47719 41bc7a 47719->47400 47721 401f22 47720->47721 47728 401f6a 47720->47728 47722 402252 11 API calls 47721->47722 47723 401f2b 47722->47723 47724 401f6d 47723->47724 47726 401f46 47723->47726 48217 402336 47724->48217 48216 40305c 28 API calls 47726->48216 47729 401f09 47728->47729 47730 402252 11 API calls 47729->47730 47731 401f12 47730->47731 47731->47412 47733 413965 47732->47733 47734 406dd8 28 API calls 47733->47734 47735 41397a 47734->47735 47736 4020f6 28 API calls 47735->47736 47737 41398a 47736->47737 47738 41376f 14 API calls 47737->47738 47739 413994 47738->47739 47740 401fd8 11 API calls 47739->47740 47741 4139a1 47740->47741 47741->47460 47743 40209b 47742->47743 47744 4023ce 11 API calls 47743->47744 47745 4020a6 47744->47745 48221 4024ed 47745->48221 47749 4137bf 47748->47749 47750 413788 47748->47750 47751 401fd8 11 API calls 47749->47751 47753 41379a RegSetValueExA RegCloseKey 47750->47753 47752 40ef9e 47751->47752 47752->47463 47753->47749 47755 43bac5 _strftime 47754->47755 48225 43ae03 47755->48225 47757 40efb7 47757->47469 47757->47471 47759 41b5a0 47758->47759 47760 41b505 GetLocalTime 47758->47760 47762 401fd8 11 API calls 47759->47762 47761 40531e 28 API calls 47760->47761 47764 41b547 47761->47764 47763 41b5a8 47762->47763 47765 401fd8 11 API calls 47763->47765 47766 406383 28 API calls 47764->47766 47767 40f00d 47765->47767 47768 41b553 47766->47768 47767->47487 48253 402f10 47768->48253 47771 406383 28 API calls 47772 41b56b 47771->47772 48258 407200 77 API calls 47772->48258 47774 41b579 47775 401fd8 11 API calls 47774->47775 47776 41b585 47775->47776 47777 401fd8 11 API calls 47776->47777 47778 41b58e 47777->47778 47779 401fd8 11 API calls 47778->47779 47780 41b597 47779->47780 47781 401fd8 11 API calls 47780->47781 47781->47759 47783 409e02 _wcslen 47782->47783 47784 409e24 47783->47784 47785 409e0d 47783->47785 47787 40da34 31 API calls 47784->47787 47786 40da34 31 API calls 47785->47786 47788 409e15 47786->47788 47789 409e2c 47787->47789 47790 401f13 28 API calls 47788->47790 47791 401f13 28 API calls 47789->47791 47806 409e1f 47790->47806 47792 409e3a 47791->47792 47793 401f09 11 API calls 47792->47793 47795 409e42 47793->47795 47794 401f09 11 API calls 47796 409e79 47794->47796 48277 40915b 28 API calls 47795->48277 48262 40a109 47796->48262 47799 409e54 48278 403014 47799->48278 47803 401f13 28 API calls 47804 409e69 47803->47804 47805 401f09 11 API calls 47804->47805 47805->47806 47806->47794 48330 40417e 47807->48330 47812 403014 28 API calls 47813 41b672 47812->47813 47814 401f09 11 API calls 47813->47814 47815 41b67b 47814->47815 47816 401f09 11 API calls 47815->47816 47817 40f223 47816->47817 47817->47540 47819 413520 RegQueryValueExA RegCloseKey 47818->47819 47820 40f2e4 47818->47820 47819->47820 47820->47413 47820->47569 47822 40f392 47821->47822 47823 413a3f RegDeleteValueW 47821->47823 47822->47407 47823->47822 47825 40dd5b 47824->47825 47826 4134ff 3 API calls 47825->47826 47827 40dd62 47826->47827 47831 40dd81 47827->47831 48424 401707 47827->48424 47829 40dd6f 48427 413877 RegCreateKeyA 47829->48427 47832 414f2a 47831->47832 47833 4020df 11 API calls 47832->47833 47834 414f3e 47833->47834 48441 41b8b3 47834->48441 47837 4020df 11 API calls 47838 414f54 47837->47838 47839 401e65 22 API calls 47838->47839 47840 414f62 47839->47840 47841 43baac _strftime 40 API calls 47840->47841 47842 414f6f 47841->47842 47843 414f81 47842->47843 47844 414f74 Sleep 47842->47844 47845 402093 28 API calls 47843->47845 47844->47843 47846 414f90 47845->47846 47847 401e65 22 API calls 47846->47847 47848 414f99 47847->47848 47849 4020f6 28 API calls 47848->47849 47850 414fa4 47849->47850 47851 41be1b 28 API calls 47850->47851 47852 414fac 47851->47852 48445 40489e WSAStartup 47852->48445 47854 414fb6 47855 401e65 22 API calls 47854->47855 47856 414fbf 47855->47856 47857 401e65 22 API calls 47856->47857 47905 41503e 47856->47905 47858 414fd8 47857->47858 47861 401e65 22 API calls 47858->47861 47859 401e65 22 API calls 47859->47905 47860 4020f6 28 API calls 47860->47905 47862 414fe9 47861->47862 47864 401e65 22 API calls 47862->47864 47863 41be1b 28 API calls 47863->47905 47865 414ffa 47864->47865 47866 401e65 22 API calls 47865->47866 47868 41500b 47866->47868 47867 406c1e 28 API calls 47867->47905 47870 401e65 22 API calls 47868->47870 47869 401fe2 28 API calls 47869->47905 47871 41501c 47870->47871 47873 401e65 22 API calls 47871->47873 47872 401fd8 11 API calls 47872->47905 47874 41502e 47873->47874 48592 40473d 89 API calls 47874->48592 47877 41518c WSAGetLastError 48593 41cae1 30 API calls 47877->48593 47881 402093 28 API calls 47884 41519c 47881->47884 47884->47881 47887 401e8d 11 API calls 47884->47887 47888 401e65 22 API calls 47884->47888 47889 43baac _strftime 40 API calls 47884->47889 47884->47905 47925 41b4ef 80 API calls 47884->47925 47926 415a71 CreateThread 47884->47926 47927 401fd8 11 API calls 47884->47927 47928 401f09 11 API calls 47884->47928 48594 4052fd 28 API calls 47884->48594 48596 40b051 85 API calls 47884->48596 48597 404e26 99 API calls 47884->48597 47886 40531e 28 API calls 47886->47905 47887->47884 47888->47884 47890 415acf Sleep 47889->47890 47890->47884 47891 406383 28 API calls 47891->47905 47892 402f10 28 API calls 47892->47905 47893 402093 28 API calls 47893->47905 47894 41b4ef 80 API calls 47894->47905 47897 40905c 28 API calls 47897->47905 47899 4136f8 3 API calls 47899->47905 47900 4135a6 31 API calls 47900->47905 47901 40417e 28 API calls 47901->47905 47905->47859 47905->47860 47905->47863 47905->47867 47905->47869 47905->47872 47905->47877 47905->47884 47905->47886 47905->47891 47905->47892 47905->47893 47905->47894 47905->47897 47905->47899 47905->47900 47905->47901 47907 401e65 22 API calls 47905->47907 48446 414ee9 47905->48446 48452 40482d 47905->48452 48459 404f51 47905->48459 48474 4048c8 connect 47905->48474 48534 41b7e0 47905->48534 48537 4145bd 47905->48537 48540 441e81 47905->48540 48544 40dd89 47905->48544 48550 41bc42 47905->48550 48553 41bd1e 47905->48553 48557 41bb8e 47905->48557 47908 415439 GetTickCount 47907->47908 47909 41bb8e 28 API calls 47908->47909 47916 415456 47909->47916 47911 41bb8e 28 API calls 47911->47916 47914 41bd1e 28 API calls 47914->47916 47916->47911 47916->47914 47917 402ea1 28 API calls 47916->47917 47918 406383 28 API calls 47916->47918 47919 402f10 28 API calls 47916->47919 47921 401fd8 11 API calls 47916->47921 47922 401f09 11 API calls 47916->47922 48562 41bae6 47916->48562 48564 41ba96 47916->48564 48569 40f8d1 GetLocaleInfoA 47916->48569 48572 402f31 28 API calls 47916->48572 48573 404c10 47916->48573 48595 404aa1 61 API calls _Yarn 47916->48595 47917->47916 47918->47916 47919->47916 47921->47916 47922->47916 47925->47884 47926->47884 48756 41ad17 105 API calls 47926->48756 47927->47884 47928->47884 47929->47325 47930->47333 47931->47336 47934 4020df 11 API calls 47933->47934 47935 406c2a 47934->47935 47936 4032a0 28 API calls 47935->47936 47937 406c47 47936->47937 47937->47358 47939 413573 RegQueryValueExA RegCloseKey 47938->47939 47940 40eba4 47938->47940 47939->47940 47940->47355 47940->47373 47941->47361 47942->47391 47943->47385 47944->47375 47945->47389 48757 401f86 47946->48757 47949 40da70 48761 41b5b4 29 API calls 47949->48761 47950 40daa5 47953 41bfb7 GetCurrentProcess 47950->47953 47951 40db99 GetLongPathNameW 47955 40417e 28 API calls 47951->47955 47952 40da66 47952->47951 47956 40daaa 47953->47956 47958 40dbae 47955->47958 47959 40db00 47956->47959 47960 40daae 47956->47960 47957 40da79 47961 401f13 28 API calls 47957->47961 47962 40417e 28 API calls 47958->47962 47963 40417e 28 API calls 47959->47963 47964 40417e 28 API calls 47960->47964 47965 40da83 47961->47965 47966 40dbbd 47962->47966 47967 40db0e 47963->47967 47968 40dabc 47964->47968 47970 401f09 11 API calls 47965->47970 48764 40ddd1 28 API calls 47966->48764 47973 40417e 28 API calls 47967->47973 47974 40417e 28 API calls 47968->47974 47970->47952 47971 40dbd0 48765 402fa5 28 API calls 47971->48765 47976 40db24 47973->47976 47977 40dad2 47974->47977 47975 40dbdb 48766 402fa5 28 API calls 47975->48766 48763 402fa5 28 API calls 47976->48763 48762 402fa5 28 API calls 47977->48762 47981 40dbe5 47984 401f09 11 API calls 47981->47984 47982 40db2f 47985 401f13 28 API calls 47982->47985 47983 40dadd 47986 401f13 28 API calls 47983->47986 47988 40dbef 47984->47988 47989 40db3a 47985->47989 47987 40dae8 47986->47987 47991 401f09 11 API calls 47987->47991 47992 401f09 11 API calls 47988->47992 47990 401f09 11 API calls 47989->47990 47993 40db43 47990->47993 47994 40daf1 47991->47994 47995 40dbf8 47992->47995 47997 401f09 11 API calls 47993->47997 47998 401f09 11 API calls 47994->47998 47996 401f09 11 API calls 47995->47996 47999 40dc01 47996->47999 47997->47965 47998->47965 48000 401f09 11 API calls 47999->48000 48001 40dc0a 48000->48001 48002 401f09 11 API calls 48001->48002 48003 40dc13 48002->48003 48003->47448 48004->47461 48005->47482 48007 41371e RegQueryValueExA RegCloseKey 48006->48007 48008 413742 48006->48008 48007->48008 48008->47441 48009->47475 48014 4344ef 48010->48014 48011 43bd51 new 21 API calls 48011->48014 48012 40f0d1 48012->47514 48014->48011 48014->48012 48767 442f80 7 API calls 2 library calls 48014->48767 48768 434c35 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 48014->48768 48769 43526e RaiseException Concurrency::cancel_current_task __CxxThrowException@8 48014->48769 48017->47545 48018->47533 48020->47577 48021->47380 48024 41b4c5 LoadResource LockResource SizeofResource 48023->48024 48025 40f3de 48023->48025 48024->48025 48026 43bd51 48025->48026 48031 446137 ___crtLCMapStringA 48026->48031 48027 446175 48043 4405dd 20 API calls __dosmaperr 48027->48043 48028 446160 RtlAllocateHeap 48030 446173 48028->48030 48028->48031 48030->47612 48031->48027 48031->48028 48042 442f80 7 API calls 2 library calls 48031->48042 48034 4020bf 48033->48034 48044 4023ce 48034->48044 48036 4020ca 48048 40250a 48036->48048 48038 4020d9 48038->47615 48040 4020b7 28 API calls 48039->48040 48041 406dec 48040->48041 48041->47622 48042->48031 48043->48030 48045 4023d8 48044->48045 48046 402428 48044->48046 48045->48046 48055 4027a7 11 API calls std::_Deallocate 48045->48055 48046->48036 48049 40251a 48048->48049 48050 402520 48049->48050 48051 402535 48049->48051 48056 402569 48050->48056 48066 4028e8 28 API calls 48051->48066 48054 402533 48054->48038 48055->48046 48067 402888 48056->48067 48058 40257d 48059 402592 48058->48059 48060 4025a7 48058->48060 48072 402a34 22 API calls 48059->48072 48074 4028e8 28 API calls 48060->48074 48063 40259b 48073 4029da 22 API calls 48063->48073 48065 4025a5 48065->48054 48066->48054 48068 402890 48067->48068 48069 402898 48068->48069 48075 402ca3 22 API calls 48068->48075 48069->48058 48072->48063 48073->48065 48074->48065 48077 4020e7 48076->48077 48078 4023ce 11 API calls 48077->48078 48079 4020f2 48078->48079 48079->47631 48094 40423a 48080->48094 48084 41ce41 48083->48084 48085 41cea0 48084->48085 48088 41ce51 48084->48088 48086 41ceba 48085->48086 48087 41cfe0 28 API calls 48085->48087 48109 41d146 28 API calls 48086->48109 48087->48086 48090 41ce89 48088->48090 48100 41cfe0 48088->48100 48108 41d146 28 API calls 48090->48108 48091 41ce9c 48091->47631 48095 404243 48094->48095 48096 4023ce 11 API calls 48095->48096 48097 40424e 48096->48097 48098 402569 28 API calls 48097->48098 48099 4041b5 48098->48099 48099->47631 48102 41cfe8 48100->48102 48101 41d01a 48101->48090 48102->48101 48103 41d01e 48102->48103 48106 41d002 48102->48106 48120 402725 22 API calls 48103->48120 48110 41d051 48106->48110 48108->48091 48109->48091 48111 41d05b __EH_prolog 48110->48111 48121 402717 22 API calls 48111->48121 48113 41d06e 48122 41d15d 11 API calls 48113->48122 48115 41d094 48116 41d0cc 48115->48116 48123 402730 11 API calls 48115->48123 48116->48101 48118 41d0b3 48124 402712 11 API calls std::_Deallocate 48118->48124 48121->48113 48122->48115 48123->48118 48124->48116 48125->47654 48126->47658 48127->47660 48131 4032aa 48129->48131 48130 4032c9 48130->47670 48131->48130 48133 4028e8 28 API calls 48131->48133 48133->48130 48135 4051fb 48134->48135 48144 405274 48135->48144 48137 405208 48137->47673 48139 402061 48138->48139 48140 4023ce 11 API calls 48139->48140 48141 40207b 48140->48141 48168 40267a 48141->48168 48145 405282 48144->48145 48146 405288 48145->48146 48147 40529e 48145->48147 48155 4025f0 48146->48155 48149 4052f5 48147->48149 48150 4052b6 48147->48150 48165 4028a4 22 API calls 48149->48165 48154 40529c 48150->48154 48164 4028e8 28 API calls 48150->48164 48154->48137 48156 402888 22 API calls 48155->48156 48157 402602 48156->48157 48158 402672 48157->48158 48160 402629 48157->48160 48167 4028a4 22 API calls 48158->48167 48163 40263b 48160->48163 48166 4028e8 28 API calls 48160->48166 48163->48154 48164->48154 48166->48163 48169 40268b 48168->48169 48170 4023ce 11 API calls 48169->48170 48171 40208d 48170->48171 48171->47676 48172->47684 48173->47689 48176 41bfc4 GetCurrentProcess 48175->48176 48177 41b2d1 48175->48177 48176->48177 48178 4135a6 RegOpenKeyExA 48177->48178 48179 4135d4 RegQueryValueExA RegCloseKey 48178->48179 48180 4135fe 48178->48180 48179->48180 48181 402093 28 API calls 48180->48181 48182 413613 48181->48182 48182->47700 48183->47711 48185 40b90c 48184->48185 48190 402252 48185->48190 48187 40b917 48194 40b92c 48187->48194 48189 40b926 48189->47719 48191 40225c 48190->48191 48192 4022ac 48190->48192 48191->48192 48201 402779 11 API calls std::_Deallocate 48191->48201 48192->48187 48195 40b966 48194->48195 48196 40b938 48194->48196 48213 4028a4 22 API calls 48195->48213 48202 4027e6 48196->48202 48200 40b942 48200->48189 48201->48192 48203 4027ef 48202->48203 48204 402851 48203->48204 48205 4027f9 48203->48205 48215 4028a4 22 API calls 48204->48215 48208 402802 48205->48208 48210 402815 48205->48210 48214 402aea 28 API calls __EH_prolog 48208->48214 48211 402813 48210->48211 48212 402252 11 API calls 48210->48212 48211->48200 48212->48211 48214->48211 48216->47728 48218 402347 48217->48218 48219 402252 11 API calls 48218->48219 48220 4023c7 48219->48220 48220->47728 48222 4024f9 48221->48222 48223 40250a 28 API calls 48222->48223 48224 4020b1 48223->48224 48224->47453 48241 43ba0a 48225->48241 48227 43ae50 48247 43a7b7 36 API calls 3 library calls 48227->48247 48229 43ae15 48229->48227 48230 43ae2a 48229->48230 48240 43ae2f ___std_exception_copy 48229->48240 48246 4405dd 20 API calls __dosmaperr 48230->48246 48233 43ae5c 48234 43ae8b 48233->48234 48248 43ba4f 40 API calls __Toupper 48233->48248 48237 43aef7 48234->48237 48249 43b9b6 20 API calls 2 library calls 48234->48249 48250 43b9b6 20 API calls 2 library calls 48237->48250 48238 43afbe _strftime 48238->48240 48251 4405dd 20 API calls __dosmaperr 48238->48251 48240->47757 48242 43ba22 48241->48242 48243 43ba0f 48241->48243 48242->48229 48252 4405dd 20 API calls __dosmaperr 48243->48252 48245 43ba14 ___std_exception_copy 48245->48229 48246->48240 48247->48233 48248->48233 48249->48237 48250->48238 48251->48240 48252->48245 48259 401fb0 48253->48259 48255 402f1e 48256 402055 11 API calls 48255->48256 48257 402f2d 48256->48257 48257->47771 48258->47774 48260 4025f0 28 API calls 48259->48260 48261 401fbd 48260->48261 48261->48255 48263 40a127 48262->48263 48264 413549 3 API calls 48263->48264 48265 40a12e 48264->48265 48266 40a142 48265->48266 48267 40a15c 48265->48267 48268 409e9b 48266->48268 48269 40a147 48266->48269 48270 40905c 28 API calls 48267->48270 48268->47506 48283 40905c 48269->48283 48272 40a16a 48270->48272 48290 40a179 86 API calls 48272->48290 48276 40a15a 48276->48268 48277->47799 48307 403222 48278->48307 48280 403022 48311 403262 48280->48311 48284 409072 48283->48284 48285 402252 11 API calls 48284->48285 48286 40908c 48285->48286 48291 404267 48286->48291 48288 40909a 48289 40a22d 29 API calls 48288->48289 48289->48276 48303 40a273 163 API calls 48289->48303 48290->48268 48304 40a267 86 API calls 48290->48304 48305 40a289 48 API calls 48290->48305 48306 40a27d 128 API calls 48290->48306 48292 402888 22 API calls 48291->48292 48293 40427b 48292->48293 48294 404290 48293->48294 48295 4042a5 48293->48295 48301 4042df 22 API calls 48294->48301 48297 4027e6 28 API calls 48295->48297 48300 4042a3 48297->48300 48298 404299 48302 402c48 22 API calls 48298->48302 48300->48288 48301->48298 48302->48300 48308 40322e 48307->48308 48317 403618 48308->48317 48310 40323b 48310->48280 48312 40326e 48311->48312 48313 402252 11 API calls 48312->48313 48314 403288 48313->48314 48315 402336 11 API calls 48314->48315 48316 403031 48315->48316 48316->47803 48318 403626 48317->48318 48319 403644 48318->48319 48320 40362c 48318->48320 48322 40365c 48319->48322 48323 40369e 48319->48323 48328 4036a6 28 API calls 48320->48328 48326 4027e6 28 API calls 48322->48326 48327 403642 48322->48327 48329 4028a4 22 API calls 48323->48329 48326->48327 48327->48310 48328->48327 48331 404186 48330->48331 48332 402252 11 API calls 48331->48332 48333 404191 48332->48333 48341 4041bc 48333->48341 48336 4042fc 48352 404353 48336->48352 48338 40430a 48339 403262 11 API calls 48338->48339 48340 404319 48339->48340 48340->47812 48342 4041c8 48341->48342 48345 4041d9 48342->48345 48344 40419c 48344->48336 48346 4041e9 48345->48346 48347 404206 48346->48347 48348 4041ef 48346->48348 48349 4027e6 28 API calls 48347->48349 48350 404267 28 API calls 48348->48350 48351 404204 48349->48351 48350->48351 48351->48344 48353 40435f 48352->48353 48356 404371 48353->48356 48355 40436d 48355->48338 48357 40437f 48356->48357 48358 404385 48357->48358 48359 40439e 48357->48359 48422 4034e6 28 API calls 48358->48422 48360 402888 22 API calls 48359->48360 48361 4043a6 48360->48361 48363 404419 48361->48363 48364 4043bf 48361->48364 48423 4028a4 22 API calls 48363->48423 48367 4027e6 28 API calls 48364->48367 48375 40439c 48364->48375 48367->48375 48375->48355 48422->48375 48430 43aa9a 48424->48430 48428 4138b9 48427->48428 48429 41388f RegSetValueExA RegCloseKey 48427->48429 48428->47831 48429->48428 48433 43aa1b 48430->48433 48432 40170d 48432->47829 48434 43aa2a 48433->48434 48435 43aa3e 48433->48435 48439 4405dd 20 API calls __dosmaperr 48434->48439 48438 43aa2f __alldvrm ___std_exception_copy 48435->48438 48440 448957 11 API calls 2 library calls 48435->48440 48438->48432 48439->48438 48440->48438 48444 41b8f9 _Yarn ___scrt_fastfail 48441->48444 48442 402093 28 API calls 48443 414f49 48442->48443 48443->47837 48444->48442 48445->47854 48447 414f02 WSASetLastError 48446->48447 48448 414ef8 48446->48448 48447->47905 48598 414d86 29 API calls ___std_exception_copy 48448->48598 48450 414efd 48450->48447 48453 404846 socket 48452->48453 48454 404839 48452->48454 48456 404860 CreateEventW 48453->48456 48457 404842 48453->48457 48599 40489e WSAStartup 48454->48599 48456->47905 48457->47905 48458 40483e 48458->48453 48458->48457 48460 404f65 48459->48460 48461 404fea 48459->48461 48462 404f6e 48460->48462 48463 404fc0 CreateEventA CreateThread 48460->48463 48464 404f7d GetLocalTime 48460->48464 48461->47905 48462->48463 48463->48461 48601 405150 48463->48601 48465 41bb8e 28 API calls 48464->48465 48466 404f91 48465->48466 48600 4052fd 28 API calls 48466->48600 48475 404a1b 48474->48475 48476 4048ee 48474->48476 48477 40497e 48475->48477 48478 404a21 WSAGetLastError 48475->48478 48476->48477 48479 404923 48476->48479 48481 40531e 28 API calls 48476->48481 48477->47905 48478->48477 48480 404a31 48478->48480 48605 420c60 27 API calls 48479->48605 48482 404932 48480->48482 48483 404a36 48480->48483 48485 40490f 48481->48485 48488 402093 28 API calls 48482->48488 48610 41cae1 30 API calls 48483->48610 48489 402093 28 API calls 48485->48489 48487 40492b 48487->48482 48491 404941 48487->48491 48492 404a80 48488->48492 48493 40491e 48489->48493 48490 404a40 48611 4052fd 28 API calls 48490->48611 48498 404950 48491->48498 48499 404987 48491->48499 48495 402093 28 API calls 48492->48495 48496 41b4ef 80 API calls 48493->48496 48500 404a8f 48495->48500 48496->48479 48502 402093 28 API calls 48498->48502 48607 421a40 54 API calls 48499->48607 48503 41b4ef 80 API calls 48500->48503 48506 40495f 48502->48506 48503->48477 48512 402093 28 API calls 48506->48512 48507 40498f 48509 4049c4 48507->48509 48510 404994 48507->48510 48609 420e06 28 API calls 48509->48609 48513 402093 28 API calls 48510->48513 48515 40496e 48512->48515 48517 4049a3 48513->48517 48518 41b4ef 80 API calls 48515->48518 48520 402093 28 API calls 48517->48520 48521 404973 48518->48521 48519 4049cc 48522 4049f9 CreateEventW CreateEventW 48519->48522 48524 402093 28 API calls 48519->48524 48523 4049b2 48520->48523 48606 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48521->48606 48522->48477 48525 41b4ef 80 API calls 48523->48525 48527 4049e2 48524->48527 48528 4049b7 48525->48528 48529 402093 28 API calls 48527->48529 48608 4210b2 52 API calls 48528->48608 48530 4049f1 48529->48530 48532 41b4ef 80 API calls 48530->48532 48533 4049f6 48532->48533 48533->48522 48612 41b7b6 GlobalMemoryStatusEx 48534->48612 48536 41b7f5 48536->47905 48613 414580 48537->48613 48541 441e8d 48540->48541 48651 441c7d 48541->48651 48543 441eae 48543->47905 48545 40dda5 48544->48545 48546 4134ff 3 API calls 48545->48546 48548 40ddac 48546->48548 48547 40ddc4 48547->47905 48548->48547 48549 413549 3 API calls 48548->48549 48549->48547 48551 4020b7 28 API calls 48550->48551 48552 41bc57 48551->48552 48552->47905 48554 41bd2b 48553->48554 48555 4020b7 28 API calls 48554->48555 48556 41bd3d 48555->48556 48556->47905 48558 441e81 20 API calls 48557->48558 48559 41bbb2 48558->48559 48560 402093 28 API calls 48559->48560 48561 41bbc0 48560->48561 48561->47905 48563 41bafc GetTickCount 48562->48563 48563->47916 48565 436e90 ___scrt_fastfail 48564->48565 48566 41bab5 GetForegroundWindow GetWindowTextW 48565->48566 48567 40417e 28 API calls 48566->48567 48568 41badf 48567->48568 48568->47916 48570 402093 28 API calls 48569->48570 48571 40f8f6 48570->48571 48571->47916 48572->47916 48574 4020df 11 API calls 48573->48574 48575 404c27 48574->48575 48576 4020df 11 API calls 48575->48576 48580 404c30 48576->48580 48577 43bd51 new 21 API calls 48577->48580 48579 404c96 48579->48580 48582 404ca1 48579->48582 48580->48577 48580->48579 48581 4020b7 28 API calls 48580->48581 48583 401fe2 28 API calls 48580->48583 48586 401fd8 11 API calls 48580->48586 48656 404cc3 48580->48656 48668 404b96 57 API calls 48580->48668 48581->48580 48669 404e26 99 API calls 48582->48669 48583->48580 48585 404ca8 48587 401fd8 11 API calls 48585->48587 48586->48580 48588 404cb1 48587->48588 48589 401fd8 11 API calls 48588->48589 48590 404cba 48589->48590 48590->47884 48592->47905 48593->47884 48595->47916 48596->47884 48597->47884 48598->48450 48599->48458 48604 40515c 102 API calls 48601->48604 48603 405159 48604->48603 48605->48487 48606->48477 48607->48507 48608->48521 48609->48519 48610->48490 48612->48536 48616 414553 48613->48616 48617 414568 ___scrt_initialize_default_local_stdio_options 48616->48617 48620 43f79d 48617->48620 48623 43c4f0 48620->48623 48624 43c530 48623->48624 48625 43c518 48623->48625 48624->48625 48627 43c538 48624->48627 48645 4405dd 20 API calls __dosmaperr 48625->48645 48646 43a7b7 36 API calls 3 library calls 48627->48646 48629 43c548 48647 43cc76 20 API calls 2 library calls 48629->48647 48630 43c51d ___std_exception_copy 48638 434fcb 48630->48638 48633 43c5c0 48648 43d2e4 51 API calls 3 library calls 48633->48648 48634 414576 48634->47905 48637 43c5cb 48649 43cce0 20 API calls _free 48637->48649 48639 434fd6 IsProcessorFeaturePresent 48638->48639 48640 434fd4 48638->48640 48642 435018 48639->48642 48640->48634 48650 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 48642->48650 48644 4350fb 48644->48634 48645->48630 48646->48629 48647->48633 48648->48637 48649->48630 48650->48644 48652 441c94 48651->48652 48654 441ccb ___std_exception_copy 48652->48654 48655 4405dd 20 API calls __dosmaperr 48652->48655 48654->48543 48655->48654 48657 4020df 11 API calls 48656->48657 48662 404cde 48657->48662 48658 404e13 48659 401fd8 11 API calls 48658->48659 48660 404e1c 48659->48660 48660->48579 48661 4041a2 28 API calls 48661->48662 48662->48658 48662->48661 48663 401fe2 28 API calls 48662->48663 48664 401fc0 28 API calls 48662->48664 48665 4020f6 28 API calls 48662->48665 48667 401fd8 11 API calls 48662->48667 48663->48662 48666 404dad CreateEventA CreateThread WaitForSingleObject CloseHandle 48664->48666 48665->48662 48666->48662 48670 415aea 48666->48670 48667->48662 48668->48580 48669->48585 48671 4020f6 28 API calls 48670->48671 48672 415b0c SetEvent 48671->48672 48673 415b21 48672->48673 48674 4041a2 28 API calls 48673->48674 48675 415b3b 48674->48675 48676 4020f6 28 API calls 48675->48676 48677 415b4b 48676->48677 48678 4020f6 28 API calls 48677->48678 48679 415b5d 48678->48679 48680 41be1b 28 API calls 48679->48680 48681 415b66 48680->48681 48682 417089 48681->48682 48683 415b86 GetTickCount 48681->48683 48684 415d2f 48681->48684 48685 401e8d 11 API calls 48682->48685 48686 41bb8e 28 API calls 48683->48686 48684->48682 48747 415ce5 48684->48747 48687 417092 48685->48687 48688 415b97 48686->48688 48690 401fd8 11 API calls 48687->48690 48691 41bae6 GetTickCount 48688->48691 48692 41709e 48690->48692 48693 415ba3 48691->48693 48694 401fd8 11 API calls 48692->48694 48695 41bb8e 28 API calls 48693->48695 48696 4170aa 48694->48696 48697 415bae 48695->48697 48698 41ba96 30 API calls 48697->48698 48699 415bbc 48698->48699 48700 41bd1e 28 API calls 48699->48700 48701 415bca 48700->48701 48702 401e65 22 API calls 48701->48702 48703 415bd8 48702->48703 48749 402f31 28 API calls 48703->48749 48705 415be6 48750 402ea1 28 API calls 48705->48750 48707 415bf5 48708 402f10 28 API calls 48707->48708 48709 415c04 48708->48709 48751 402ea1 28 API calls 48709->48751 48711 415c13 48712 402f10 28 API calls 48711->48712 48713 415c1f 48712->48713 48752 402ea1 28 API calls 48713->48752 48715 415c29 48753 404aa1 61 API calls _Yarn 48715->48753 48717 415c38 48718 401fd8 11 API calls 48717->48718 48719 415c41 48718->48719 48720 401fd8 11 API calls 48719->48720 48721 415c4d 48720->48721 48722 401fd8 11 API calls 48721->48722 48723 415c59 48722->48723 48724 401fd8 11 API calls 48723->48724 48725 415c65 48724->48725 48726 401fd8 11 API calls 48725->48726 48727 415c71 48726->48727 48728 401fd8 11 API calls 48727->48728 48729 415c7d 48728->48729 48730 401f09 11 API calls 48729->48730 48731 415c86 48730->48731 48732 401fd8 11 API calls 48731->48732 48733 415c8f 48732->48733 48734 401fd8 11 API calls 48733->48734 48735 415c98 48734->48735 48736 401e65 22 API calls 48735->48736 48737 415ca3 48736->48737 48738 43baac _strftime 40 API calls 48737->48738 48739 415cb0 48738->48739 48740 415cb5 48739->48740 48741 415cdb 48739->48741 48743 415cc3 48740->48743 48744 415cce 48740->48744 48742 401e65 22 API calls 48741->48742 48742->48747 48754 404ff4 82 API calls 48743->48754 48746 404f51 105 API calls 48744->48746 48748 415cc9 48746->48748 48747->48682 48755 4050e4 84 API calls 48747->48755 48748->48682 48749->48705 48750->48707 48751->48711 48752->48715 48753->48717 48754->48748 48755->48748 48758 401f8e 48757->48758 48759 402252 11 API calls 48758->48759 48760 401f99 48759->48760 48760->47949 48760->47950 48760->47952 48761->47957 48762->47983 48763->47982 48764->47971 48765->47975 48766->47981 48767->48014 48772 40f7c2 48770->48772 48771 413549 3 API calls 48771->48772 48772->48771 48773 40f866 48772->48773 48775 40f856 Sleep 48772->48775 48792 40f7f4 48772->48792 48776 40905c 28 API calls 48773->48776 48774 40905c 28 API calls 48774->48792 48775->48772 48779 40f871 48776->48779 48778 41bc5e 28 API calls 48778->48792 48780 41bc5e 28 API calls 48779->48780 48781 40f87d 48780->48781 48805 413814 14 API calls 48781->48805 48784 401f09 11 API calls 48784->48792 48785 40f890 48786 401f09 11 API calls 48785->48786 48788 40f89c 48786->48788 48787 402093 28 API calls 48787->48792 48789 402093 28 API calls 48788->48789 48790 40f8ad 48789->48790 48793 41376f 14 API calls 48790->48793 48791 41376f 14 API calls 48791->48792 48792->48774 48792->48775 48792->48778 48792->48784 48792->48787 48792->48791 48803 40d096 112 API calls ___scrt_fastfail 48792->48803 48804 413814 14 API calls 48792->48804 48794 40f8c0 48793->48794 48806 412850 TerminateProcess WaitForSingleObject 48794->48806 48796 40f8c8 ExitProcess 48807 4127ee 62 API calls 48797->48807 48804->48792 48805->48785 48806->48796 48808 4269e6 48809 4269fb 48808->48809 48816 426a8d 48808->48816 48810 426a48 48809->48810 48811 426b44 48809->48811 48812 426abd 48809->48812 48813 426b1d 48809->48813 48809->48816 48818 426af2 48809->48818 48822 426a7d 48809->48822 48836 424edd 49 API calls _Yarn 48809->48836 48810->48816 48810->48822 48837 41fb6c 52 API calls 48810->48837 48811->48816 48841 426155 28 API calls 48811->48841 48812->48816 48812->48818 48839 41fb6c 52 API calls 48812->48839 48813->48811 48813->48816 48824 425ae1 48813->48824 48818->48813 48840 4256f0 21 API calls 48818->48840 48822->48812 48822->48816 48838 424edd 49 API calls _Yarn 48822->48838 48825 425b00 ___scrt_fastfail 48824->48825 48827 425b0f 48825->48827 48830 425b34 48825->48830 48842 41ebbb 21 API calls 48825->48842 48827->48830 48835 425b14 48827->48835 48843 4205d8 46 API calls 48827->48843 48830->48811 48831 425b1d 48831->48830 48850 424d05 21 API calls 2 library calls 48831->48850 48833 425bb7 48833->48830 48844 432ec4 48833->48844 48835->48830 48835->48831 48849 41da5f 49 API calls 48835->48849 48836->48810 48837->48810 48838->48812 48839->48812 48840->48813 48841->48816 48842->48827 48843->48833 48845 432ed2 48844->48845 48846 432ece 48844->48846 48847 43bd51 new 21 API calls 48845->48847 48846->48835 48848 432ed7 48847->48848 48848->48835 48849->48831 48850->48830 48851 415d06 48866 41b380 48851->48866 48853 415d0f 48854 4020f6 28 API calls 48853->48854 48855 415d1e 48854->48855 48877 404aa1 61 API calls _Yarn 48855->48877 48857 415d2a 48858 417089 48857->48858 48859 401fd8 11 API calls 48857->48859 48860 401e8d 11 API calls 48858->48860 48859->48858 48861 417092 48860->48861 48862 401fd8 11 API calls 48861->48862 48863 41709e 48862->48863 48864 401fd8 11 API calls 48863->48864 48865 4170aa 48864->48865 48867 4020df 11 API calls 48866->48867 48868 41b38e 48867->48868 48869 43bd51 new 21 API calls 48868->48869 48870 41b39e InternetOpenW InternetOpenUrlW 48869->48870 48871 41b3c5 InternetReadFile 48870->48871 48875 41b3e8 48871->48875 48872 4020b7 28 API calls 48872->48875 48873 41b415 InternetCloseHandle InternetCloseHandle 48874 41b427 48873->48874 48874->48853 48875->48871 48875->48872 48875->48873 48876 401fd8 11 API calls 48875->48876 48876->48875 48877->48857 48878 426c4b 48883 426cc8 send 48878->48883 48884 43be58 48886 43be64 _swprintf ___DestructExceptionObject 48884->48886 48885 43be72 48900 4405dd 20 API calls __dosmaperr 48885->48900 48886->48885 48889 43be9c 48886->48889 48888 43be77 ___DestructExceptionObject ___std_exception_copy 48895 445888 EnterCriticalSection 48889->48895 48891 43bea7 48896 43bf48 48891->48896 48895->48891 48898 43bf56 48896->48898 48897 43beb2 48901 43becf LeaveCriticalSection std::_Lockit::~_Lockit 48897->48901 48898->48897 48902 44976c 37 API calls 2 library calls 48898->48902 48900->48888 48901->48888 48902->48898 48903 41dfbd 48904 41dfd2 _Yarn ___scrt_fastfail 48903->48904 48905 41e1d5 48904->48905 48907 432ec4 21 API calls 48904->48907 48911 41e189 48905->48911 48917 41db62 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 48905->48917 48910 41e182 ___scrt_fastfail 48907->48910 48908 41e1e6 48909 432ec4 21 API calls 48908->48909 48908->48911 48913 41e21f ___scrt_fastfail 48909->48913 48910->48911 48912 432ec4 21 API calls 48910->48912 48915 41e1af ___scrt_fastfail 48912->48915 48913->48911 48918 43354a 48913->48918 48915->48911 48916 432ec4 21 API calls 48915->48916 48916->48905 48917->48908 48921 433469 48918->48921 48920 433552 48920->48911 48922 433482 48921->48922 48923 433478 48921->48923 48922->48923 48924 432ec4 21 API calls 48922->48924 48923->48920 48925 4334a3 48924->48925 48925->48923 48927 433837 CryptAcquireContextA 48925->48927 48928 433858 CryptGenRandom 48927->48928 48929 433853 48927->48929 48928->48929 48930 43386d CryptReleaseContext 48928->48930 48929->48923 48930->48929 48931 40165e 48932 401666 48931->48932 48934 401669 48931->48934 48933 4016a8 48935 4344ea new 22 API calls 48933->48935 48934->48933 48936 401696 48934->48936 48937 40169c 48935->48937 48938 4344ea new 22 API calls 48936->48938 48938->48937 48939 426bdc 48945 426cb1 recv 48939->48945 48946 42f8ed 48947 42f8f8 48946->48947 48948 42f90c 48947->48948 48950 432eee 48947->48950 48951 432efd 48950->48951 48953 432ef9 48950->48953 48954 440f0d 48951->48954 48953->48948 48955 446185 48954->48955 48956 446192 48955->48956 48957 44619d 48955->48957 48967 446137 48956->48967 48958 4461a5 48957->48958 48965 4461ae ___crtLCMapStringA 48957->48965 48974 446782 48958->48974 48961 4461b3 48980 4405dd 20 API calls __dosmaperr 48961->48980 48962 4461d8 RtlReAllocateHeap 48963 44619a 48962->48963 48962->48965 48963->48953 48965->48961 48965->48962 48981 442f80 7 API calls 2 library calls 48965->48981 48968 446175 48967->48968 48972 446145 ___crtLCMapStringA 48967->48972 48983 4405dd 20 API calls __dosmaperr 48968->48983 48969 446160 RtlAllocateHeap 48971 446173 48969->48971 48969->48972 48971->48963 48972->48968 48972->48969 48982 442f80 7 API calls 2 library calls 48972->48982 48975 44678d RtlFreeHeap 48974->48975 48976 4467b6 __dosmaperr 48974->48976 48975->48976 48977 4467a2 48975->48977 48976->48963 48984 4405dd 20 API calls __dosmaperr 48977->48984 48979 4467a8 GetLastError 48979->48976 48980->48963 48981->48965 48982->48972 48983->48971 48984->48979

                    Control-flow Graph

                    APIs
                    • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                    • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                    • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                    • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                    • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                    • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                    • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                    • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                    • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                    • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                    • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                    • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC86
                    • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040E9E1), ref: 0041CC97
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CC9A
                    • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCAA
                    • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCBA
                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040E9E1), ref: 0041CCCC
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCCF
                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040E9E1), ref: 0041CCDC
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCDF
                    • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CCF3
                    • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD07
                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,0040E9E1), ref: 0041CD19
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD1C
                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040E9E1), ref: 0041CD29
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD2C
                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040E9E1), ref: 0041CD39
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD3C
                    • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040E9E1), ref: 0041CD49
                    • GetProcAddress.KERNEL32(00000000), ref: 0041CD4C
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$LibraryLoad$HandleModule
                    • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                    • API String ID: 4236061018-3687161714
                    • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                    • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                    • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                    • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1082 41b380-41b3c3 call 4020df call 43bd51 InternetOpenW InternetOpenUrlW 1087 41b3c5-41b3e6 InternetReadFile 1082->1087 1088 41b3e8-41b408 call 4020b7 call 403376 call 401fd8 1087->1088 1089 41b40c-41b40f 1087->1089 1088->1089 1091 41b411-41b413 1089->1091 1092 41b415-41b422 InternetCloseHandle * 2 call 43bd4c 1089->1092 1091->1087 1091->1092 1096 41b427-41b431 1092->1096
                    APIs
                    • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                    • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                    • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                    • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                    • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                    Strings
                    • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Internet$CloseHandleOpen$FileRead
                    • String ID: http://geoplugin.net/json.gp
                    • API String ID: 3121278467-91888290
                    • Opcode ID: 4404311406b4a12e258bc180555c1bc499fb9e537e63fa9c5eb012b199318316
                    • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                    • Opcode Fuzzy Hash: 4404311406b4a12e258bc180555c1bc499fb9e537e63fa9c5eb012b199318316
                    • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA

                    Control-flow Graph

                    APIs
                      • Part of subcall function 00413549: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                      • Part of subcall function 00413549: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                      • Part of subcall function 00413549: RegCloseKey.KERNEL32(?), ref: 00413592
                    • Sleep.KERNEL32(00000BB8), ref: 0040F85B
                    • ExitProcess.KERNEL32 ref: 0040F8CA
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseExitOpenProcessQuerySleepValue
                    • String ID: 5.1.0 Pro$override$pth_unenc
                    • API String ID: 2281282204-182549033
                    • Opcode ID: 0c6c273467781de05ac3cf7c04fce85a932ac025a43e79accc6add002e08d8ca
                    • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                    • Opcode Fuzzy Hash: 0c6c273467781de05ac3cf7c04fce85a932ac025a43e79accc6add002e08d8ca
                    • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1265 404f51-404f5f 1266 404f65-404f6c 1265->1266 1267 404fea 1265->1267 1269 404f74-404f7b 1266->1269 1270 404f6e-404f72 1266->1270 1268 404fec-404ff1 1267->1268 1271 404fc0-404fe8 CreateEventA CreateThread 1269->1271 1272 404f7d-404fbb GetLocalTime call 41bb8e call 4052fd call 402093 call 41b4ef call 401fd8 1269->1272 1270->1271 1271->1268 1272->1271
                    APIs
                    • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404F81
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404FCD
                    • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                    Strings
                    • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Create$EventLocalThreadTime
                    • String ID: KeepAlive | Enabled | Timeout:
                    • API String ID: 2532271599-1507639952
                    • Opcode ID: 27b858f6950e3623d995e23d6d4fe1d77f4f118926dc16c8cee4ff6bd928c013
                    • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                    • Opcode Fuzzy Hash: 27b858f6950e3623d995e23d6d4fe1d77f4f118926dc16c8cee4ff6bd928c013
                    • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA
                    APIs
                    • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,004334BF,00000034,?,?,00B8BE98), ref: 00433849
                    • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000), ref: 0043385F
                    • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000,0041E251), ref: 00433871
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Crypt$Context$AcquireRandomRelease
                    • String ID:
                    • API String ID: 1815803762-0
                    • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                    • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                    • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                    • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                    APIs
                    • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750E4), ref: 0041B62A
                    • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Name$ComputerUser
                    • String ID:
                    • API String ID: 4229901323-0
                    • Opcode ID: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                    • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                    • Opcode Fuzzy Hash: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                    • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8
                    APIs
                    • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.0 Pro), ref: 0040F8E5
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: InfoLocale
                    • String ID:
                    • API String ID: 2299586839-0
                    • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                    • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                    • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                    • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 5 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 22 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->22 23 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 5->23 69 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 22->69 70 40ebae-40ebc9 call 401e65 call 40b9bd 22->70 49 40eef2-40ef03 call 401fd8 23->49 69->70 102 40f34f-40f36a call 401fab call 4139a9 call 412475 69->102 79 40ec03-40ec0a call 40d069 70->79 80 40ebcb-40ebea call 401fab call 413549 70->80 88 40ec13-40ec1a 79->88 89 40ec0c-40ec0e 79->89 80->79 98 40ebec-40ec02 call 401fab call 4139a9 80->98 93 40ec1c 88->93 94 40ec1e-40ec2a call 41b2c3 88->94 92 40eef1 89->92 92->49 93->94 103 40ec33-40ec37 94->103 104 40ec2c-40ec2e 94->104 98->79 124 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 102->124 108 40ec76-40ec89 call 401e65 call 401fab 103->108 109 40ec39 call 407716 103->109 104->103 127 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->127 128 40ec8b call 407755 108->128 118 40ec3e-40ec40 109->118 121 40ec42-40ec47 call 407738 call 407260 118->121 122 40ec4c-40ec5f call 401e65 call 401fab 118->122 121->122 122->108 141 40ec61-40ec67 122->141 157 40f3a5-40f3af call 40dd42 call 414f2a 124->157 177 40ed80-40ed84 127->177 178 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 127->178 128->127 141->108 144 40ec69-40ec6f 141->144 144->108 147 40ec71 call 407260 144->147 147->108 179 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 177->179 180 40ed8a-40ed91 177->180 178->177 202 40ed35-40ed7b call 401e65 call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 178->202 233 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 179->233 182 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 180->182 183 40ee0f-40ee19 call 409057 180->183 192 40ee1e-40ee42 call 40247c call 434798 182->192 183->192 210 40ee51 192->210 211 40ee44-40ee4f call 436e90 192->211 202->177 216 40ee53-40ee9e call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 210->216 211->216 271 40eea3-40eec8 call 4347a1 call 401e65 call 40b9bd 216->271 286 40efc1 233->286 287 40efdc-40efde 233->287 271->233 288 40eece-40eeed call 401e65 call 41bc5e call 40f474 271->288 289 40efc3-40efda call 41cd9b CreateThread 286->289 290 40efe0-40efe2 287->290 291 40efe4 287->291 288->233 306 40eeef 288->306 294 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 289->294 290->289 291->294 344 40f101 294->344 345 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 294->345 306->92 347 40f103-40f11b call 401e65 call 401fab 344->347 345->347 356 40f159-40f16c call 401e65 call 401fab 347->356 357 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 347->357 368 40f1cc-40f1df call 401e65 call 401fab 356->368 369 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 356->369 357->356 379 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 368->379 380 40f21a-40f23e call 41b60d call 401f13 call 401f09 368->380 369->368 379->380 400 40f240-40f241 SetProcessDEPPolicy 380->400 401 40f243-40f256 CreateThread 380->401 400->401 404 40f264-40f26b 401->404 405 40f258-40f262 CreateThread 401->405 408 40f279-40f280 404->408 409 40f26d-40f277 CreateThread 404->409 405->404 412 40f282-40f285 408->412 413 40f28e 408->413 409->408 415 40f287-40f28c 412->415 416 40f2cc-40f2df call 401fab call 4134ff 412->416 418 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 413->418 415->418 426 40f2e4-40f2e7 416->426 418->416 426->157 428 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 426->428 443 40f346-40f34b DeleteFileW 428->443 444 40f34d 443->444 445 40f32f-40f332 443->445 444->124 445->124 446 40f334-40f341 Sleep call 401f04 445->446 446->443
                    APIs
                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                      • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                      • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                      • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\New Order.exe,00000104), ref: 0040E9EE
                      • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                    • String ID: SG$ SG$8SG$8SG$Access Level: $Administrator$C:\Users\user\Desktop\New Order.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                    • API String ID: 2830904901-2045176580
                    • Opcode ID: 9dbae48a280d3333a9d77f8d0747098945c713f3f6b336d54fdc187ddd26b95e
                    • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
                    • Opcode Fuzzy Hash: 9dbae48a280d3333a9d77f8d0747098945c713f3f6b336d54fdc187ddd26b95e
                    • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 448 414f2a-414f72 call 4020df call 41b8b3 call 4020df call 401e65 call 401fab call 43baac 461 414f81-414fcd call 402093 call 401e65 call 4020f6 call 41be1b call 40489e call 401e65 call 40b9bd 448->461 462 414f74-414f7b Sleep 448->462 477 415041-4150dc call 402093 call 401e65 call 4020f6 call 41be1b call 401e65 * 2 call 406c1e call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 461->477 478 414fcf-41503e call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 461->478 462->461 531 4150ec-4150f3 477->531 532 4150de-4150ea 477->532 478->477 533 4150f8-41518a call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414ee9 531->533 532->533 560 4151d5-4151e3 call 40482d 533->560 561 41518c-4151d0 WSAGetLastError call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 533->561 566 415210-415225 call 404f51 call 4048c8 560->566 567 4151e5-41520b call 402093 * 2 call 41b4ef 560->567 582 415aa3-415ab5 call 404e26 call 4021fa 561->582 566->582 583 41522b-41537e call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 4 call 41b7e0 call 4145bd call 40905c call 441e81 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 4136f8 566->583 567->582 597 415ab7-415ad7 call 401e65 call 401fab call 43baac Sleep 582->597 598 415add-415ae5 call 401e8d 582->598 648 415380-41538d call 405aa6 583->648 649 415392-4153b9 call 401fab call 4135a6 583->649 597->598 598->477 648->649 655 4153c0-41577f call 40417e call 40dd89 call 41bc42 call 41bd1e call 41bb8e call 401e65 GetTickCount call 41bb8e call 41bae6 call 41bb8e * 2 call 41ba96 call 41bd1e * 5 call 40f8d1 call 41bd1e call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 649->655 656 4153bb-4153bd 649->656 782 415781 call 404aa1 655->782 656->655 783 415786-415a0a call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 782->783 901 415a0f-415a16 783->901 902 415a18-415a1f 901->902 903 415a2a-415a31 901->903 902->903 904 415a21-415a23 902->904 905 415a33-415a38 call 40b051 903->905 906 415a3d-415a6f call 405a6b call 402093 * 2 call 41b4ef 903->906 904->903 905->906 917 415a71-415a7d CreateThread 906->917 918 415a83-415a9e call 401fd8 * 2 call 401f09 906->918 917->918 918->582
                    APIs
                    • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414F7B
                    • WSAGetLastError.WS2_32(00000000,00000001), ref: 0041518C
                    • Sleep.KERNEL32(00000000,00000002), ref: 00415AD7
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Sleep$ErrorLastLocalTime
                    • String ID: | $%I64u$5.1.0 Pro$8SG$C:\Users\user\Desktop\New Order.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$PSG$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                    • API String ID: 524882891-1383199030
                    • Opcode ID: 9497a8cef06d9965077653e5d14c9f88a6240dc4e4311364d1378025ff75ed42
                    • Instruction ID: 324fc11d7bea0fba9c16e2c7d7b547a311b01f704130931fc4cc70caa797af2d
                    • Opcode Fuzzy Hash: 9497a8cef06d9965077653e5d14c9f88a6240dc4e4311364d1378025ff75ed42
                    • Instruction Fuzzy Hash: 22526B31A001155ACB18F732DD96AFE73769F90344F6041BFE40A761E2EF781E858A5D

                    Control-flow Graph

                    APIs
                    • connect.WS2_32(?,?,?), ref: 004048E0
                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                    • WSAGetLastError.WS2_32 ref: 00404A21
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateEvent$ErrorLastLocalTimeconnect
                    • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                    • API String ID: 994465650-2151626615
                    • Opcode ID: 99cb689bb5f18c3443efc10de2b69162055e835058a5c35f32943c28cb679500
                    • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                    • Opcode Fuzzy Hash: 99cb689bb5f18c3443efc10de2b69162055e835058a5c35f32943c28cb679500
                    • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1000 40da34-40da59 call 401f86 1003 40db83-40dba9 call 401f04 GetLongPathNameW call 40417e 1000->1003 1004 40da5f 1000->1004 1025 40dbae-40dc1b call 40417e call 40ddd1 call 402fa5 * 2 call 401f09 * 5 1003->1025 1006 40da70-40da7e call 41b5b4 call 401f13 1004->1006 1007 40da91-40da96 1004->1007 1008 40db51-40db56 1004->1008 1009 40daa5-40daac call 41bfb7 1004->1009 1010 40da66-40da6b 1004->1010 1011 40db58-40db5d 1004->1011 1012 40da9b-40daa0 1004->1012 1013 40db6e 1004->1013 1014 40db5f-40db64 call 43c0cf 1004->1014 1034 40da83 1006->1034 1016 40db73-40db78 call 43c0cf 1007->1016 1008->1016 1026 40db00-40db4c call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1009->1026 1027 40daae-40dafe call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1009->1027 1010->1016 1011->1016 1012->1016 1013->1016 1022 40db69-40db6c 1014->1022 1028 40db79-40db7e call 409057 1016->1028 1022->1013 1022->1028 1026->1034 1039 40da87-40da8c call 401f09 1027->1039 1028->1003 1034->1039 1039->1003
                    APIs
                    • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DB9A
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: LongNamePath
                    • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                    • API String ID: 82841172-425784914
                    • Opcode ID: f699c62159184187b538f79cdc1dbfdb69b721564b31670cb9aa7a5423fa7b62
                    • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                    • Opcode Fuzzy Hash: f699c62159184187b538f79cdc1dbfdb69b721564b31670cb9aa7a5423fa7b62
                    • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1100 41b2c3-41b31a call 41bfb7 call 4135a6 call 401fe2 call 401fd8 call 406ae1 1111 41b35d-41b366 1100->1111 1112 41b31c-41b32b call 4135a6 1100->1112 1114 41b368-41b36d 1111->1114 1115 41b36f 1111->1115 1117 41b330-41b347 call 401fab StrToIntA 1112->1117 1116 41b374-41b37f call 40537d 1114->1116 1115->1116 1122 41b355-41b358 call 401fd8 1117->1122 1123 41b349-41b352 call 41cf69 1117->1123 1122->1111 1123->1122
                    APIs
                      • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                      • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                      • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                      • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                    • StrToIntA.SHLWAPI(00000000,0046C9F8,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0041B33C
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCurrentOpenProcessQueryValue
                    • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                    • API String ID: 1866151309-2070987746
                    • Opcode ID: 8f8f5d60ce35d1a1c8195802feeff86a127f68f3eb7fb2a0a498f7b0ec669ebf
                    • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                    • Opcode Fuzzy Hash: 8f8f5d60ce35d1a1c8195802feeff86a127f68f3eb7fb2a0a498f7b0ec669ebf
                    • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CountEventTick
                    • String ID: !D@$NG
                    • API String ID: 180926312-2721294649
                    • Opcode ID: f36f2d49ab2961808af81894e896c9fe5fba8881db75f6a1af782146f5b63878
                    • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                    • Opcode Fuzzy Hash: f36f2d49ab2961808af81894e896c9fe5fba8881db75f6a1af782146f5b63878
                    • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1282 41376f-413786 RegCreateKeyA 1283 413788-4137bd call 40247c call 401fab RegSetValueExA RegCloseKey 1282->1283 1284 4137bf 1282->1284 1286 4137c1-4137cf call 401fd8 1283->1286 1284->1286
                    APIs
                    • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                    • RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137A6
                    • RegCloseKey.KERNEL32(?,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137B1
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCreateValue
                    • String ID: pth_unenc
                    • API String ID: 1818849710-4028850238
                    • Opcode ID: 4f15aeb283403f146db3f09acdab1127f952c22a8adcae04a958ae624d8eac3f
                    • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                    • Opcode Fuzzy Hash: 4f15aeb283403f146db3f09acdab1127f952c22a8adcae04a958ae624d8eac3f
                    • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54

                    Control-flow Graph

                    APIs
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                    • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                    • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00404DD2
                    • CloseHandle.KERNEL32(?,?,00000000), ref: 00404DDB
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Create$CloseEventHandleObjectSingleThreadWait
                    • String ID:
                    • API String ID: 3360349984-0
                    • Opcode ID: 896836ce6e67791e20d0eed4e42f92f466038b3ea1b67db69a0d6ef4832fab86
                    • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                    • Opcode Fuzzy Hash: 896836ce6e67791e20d0eed4e42f92f466038b3ea1b67db69a0d6ef4832fab86
                    • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1340 40d069-40d095 call 401fab CreateMutexA GetLastError
                    APIs
                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                    • GetLastError.KERNEL32 ref: 0040D083
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateErrorLastMutex
                    • String ID: SG
                    • API String ID: 1925916568-3189917014
                    • Opcode ID: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                    • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                    • Opcode Fuzzy Hash: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                    • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1343 4135a6-4135d2 RegOpenKeyExA 1344 4135d4-4135fc RegQueryValueExA RegCloseKey 1343->1344 1345 413607 1343->1345 1346 413609 1344->1346 1347 4135fe-413605 1344->1347 1345->1346 1348 41360e-41361a call 402093 1346->1348 1347->1348
                    APIs
                    • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                    • RegCloseKey.KERNEL32(?), ref: 004135F2
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseOpenQueryValue
                    • String ID:
                    • API String ID: 3677997916-0
                    • Opcode ID: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                    • Instruction ID: 357f89d7cd1c8cc036c5e31f86fe90e90b696c4569df010e686479b524d11f87
                    • Opcode Fuzzy Hash: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                    • Instruction Fuzzy Hash: 5A01D676900228BBCF209B91DC09DEF7FBDDB84751F000066BB09E2240DA748E45DBA4

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1351 4136f8-41371c RegOpenKeyExA 1352 413768 1351->1352 1353 41371e-413740 RegQueryValueExA RegCloseKey 1351->1353 1355 41376a-41376e 1352->1355 1353->1352 1354 413742-413766 call 406cb7 call 406d3c 1353->1354 1354->1355
                    APIs
                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                    • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                    • RegCloseKey.KERNEL32(00000000), ref: 00413738
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseOpenQueryValue
                    • String ID:
                    • API String ID: 3677997916-0
                    • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                    • Instruction ID: 3f277cad741e4f631881634228dfc272d65c1146f3ef4f3c344e6cfa7cb73972
                    • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                    • Instruction Fuzzy Hash: 1C018BB1400229FBDF216FA1DC04DEB3F38EF05751F004065BE08621A1D6358AA5DBA4
                    APIs
                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                    • RegCloseKey.KERNEL32(?), ref: 00413592
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseOpenQueryValue
                    • String ID:
                    • API String ID: 3677997916-0
                    • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                    • Instruction ID: df0ca7b2621da3f23a966dc0a7f3323316399916f3769291e5945d4ebcba47cd
                    • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                    • Instruction Fuzzy Hash: E8F01776900218FFDF109FA0DC05FEEBBBCEB04B11F1040A6BA09E6191E2359F54AB94
                    APIs
                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C19C,00466C48), ref: 00413516
                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040C19C,00466C48), ref: 0041352A
                    • RegCloseKey.KERNEL32(?,?,?,0040C19C,00466C48), ref: 00413535
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseOpenQueryValue
                    • String ID:
                    • API String ID: 3677997916-0
                    • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                    • Instruction ID: ffaae2385a847085e6fb085aa4760e2a706d619ab1068a3de776aab9102a8dd7
                    • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                    • Instruction Fuzzy Hash: 46E06D32801238FB9F204FA2DC0DDEB7F6CEF06FA2B000155BD0DA2112E2258E50E6E4
                    APIs
                    • RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                    • RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                    • RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCreateValue
                    • String ID:
                    • API String ID: 1818849710-0
                    • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                    • Instruction ID: 04a42b38e2882b978ed87177a7d0f50f8458418d63be9de7f69fe35b215911ab
                    • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                    • Instruction Fuzzy Hash: 16E06572500318FBEF115F90DC05FEA7B6CDF04B52F1045A5BF09A6191D3358E549798
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _wcslen
                    • String ID: pQG
                    • API String ID: 176396367-3769108836
                    • Opcode ID: 1f3b91536cece4da7108cf24afec647958326f81796985407c04b0a2ae37731c
                    • Instruction ID: e6961f6084f98a1e57a9a6385a58e5d20214d93246a99e64d0d6a4ea431d93e1
                    • Opcode Fuzzy Hash: 1f3b91536cece4da7108cf24afec647958326f81796985407c04b0a2ae37731c
                    • Instruction Fuzzy Hash: 8111C3319002059BCB15EF65E8529EF7BB5EF54318B10013FF406A62E2EFB8AD05CB98
                    APIs
                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B7CA
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: GlobalMemoryStatus
                    • String ID: @
                    • API String ID: 1890195054-2766056989
                    • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                    • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                    • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                    • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                    APIs
                    • _free.LIBCMT ref: 004461A6
                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                    • RtlReAllocateHeap.NTDLL(00000000,00000000,?,?,0000000F,00000000,00432F02,00000000,0000000F,0042F90C,?,?,004319B3,?,?,00000000), ref: 004461E2
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocateHeap$_free
                    • String ID:
                    • API String ID: 1482568997-0
                    • Opcode ID: 0c50226df9aed064d9fc72c30ff8f5201140dd52271d3dd40973ea300b8a0024
                    • Instruction ID: bbbbf11ac8836aedddebace835184d628c0e8eb9448606daf7135ff7baabef38
                    • Opcode Fuzzy Hash: 0c50226df9aed064d9fc72c30ff8f5201140dd52271d3dd40973ea300b8a0024
                    • Instruction Fuzzy Hash: ACF0683120051566BF212A16AD01B6F375D8F83B75F17411BF91466292DE3CD911916F
                    APIs
                    • socket.WS2_32(?,00000001,00000006), ref: 00404852
                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                      • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateEventStartupsocket
                    • String ID:
                    • API String ID: 1953588214-0
                    • Opcode ID: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                    • Instruction ID: 7af5cc85a36d800a693892934b5c0b91abe86707509305098cc6d5fca1b6a633
                    • Opcode Fuzzy Hash: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                    • Instruction Fuzzy Hash: 6E0171B1408B809ED7359F38A8456977FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                    • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                    • Opcode Fuzzy Hash: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                    • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D
                    APIs
                    • GetForegroundWindow.USER32 ref: 0041BAB8
                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BACB
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Window$ForegroundText
                    • String ID:
                    • API String ID: 29597999-0
                    • Opcode ID: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                    • Instruction ID: 4615795adb372a642f3ed3ff298372a60f443b3219566b47796808df054d69ed
                    • Opcode Fuzzy Hash: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                    • Instruction Fuzzy Hash: CCE0D875A00328A7E720A7A49C4EFE5776CEB08701F0000EEBA18D71C2EAB4AD04C7E4
                    APIs
                    • RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocateHeap
                    • String ID:
                    • API String ID: 1279760036-0
                    • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                    • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                    • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                    • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                    APIs
                    • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Startup
                    • String ID:
                    • API String ID: 724789610-0
                    • Opcode ID: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                    • Instruction ID: a24ce82555f98f109a53945ea9c337c8597cdca763f75144b39f195b4e3f482d
                    • Opcode Fuzzy Hash: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                    • Instruction Fuzzy Hash: 0DD0C9325586088AE620AAB4AD0B8A4775C8312615F0007AA6CA5835D2E6446A19C2AA
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: send
                    • String ID:
                    • API String ID: 2809346765-0
                    • Opcode ID: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                    • Instruction ID: 80dceff54fd7c7607e374e8a405dba3f032bb15cdc3f4a53630576a73fa931ff
                    • Opcode Fuzzy Hash: a64cf630b3b4fcbf92e6cf8d3c010959396a6b24f5439efeece66edae75e3506
                    • Instruction Fuzzy Hash: 79B09279108202FFCB150B60CD0887A7EAAABC8381F008A2CB187411B1C636C852AB26
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: recv
                    • String ID:
                    • API String ID: 1507349165-0
                    • Opcode ID: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                    • Instruction ID: 54da5cb0358175ea3eef87e0ba5f02fe09cc36e19498aa822303b7a5c5cf0de8
                    • Opcode Fuzzy Hash: 12f17b9eb2b05ccee17ecde8d051cd75af37e2c2e0a2002d53484fbbe037e517
                    • Instruction Fuzzy Hash: 38B09B75108302FFC6150750CC0486A7D66DBC8351B00481C714641170C736C8519725
                    APIs
                    • SetEvent.KERNEL32(?,?), ref: 00407CB9
                    • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                    • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                      • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                      • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                      • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                      • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                      • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                      • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                      • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                    • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00408278
                    • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                    • DeleteFileA.KERNEL32(?), ref: 00408652
                      • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                      • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                      • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                      • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                    • Sleep.KERNEL32(000007D0), ref: 004086F8
                    • StrToIntA.SHLWAPI(00000000,00000000), ref: 0040873A
                      • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                    • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                    • API String ID: 1067849700-181434739
                    • Opcode ID: 6e6e9140662d37981cd90a958c1ecdba8d0025e4437174fb30692739c6495062
                    • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                    • Opcode Fuzzy Hash: 6e6e9140662d37981cd90a958c1ecdba8d0025e4437174fb30692739c6495062
                    • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                    APIs
                    • __Init_thread_footer.LIBCMT ref: 004056E6
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    • __Init_thread_footer.LIBCMT ref: 00405723
                    • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                    • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                    • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                    • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                    • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                    • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660C0,00000062,004660A4), ref: 004059E4
                    • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                    • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                    • CloseHandle.KERNEL32 ref: 00405A23
                    • CloseHandle.KERNEL32 ref: 00405A2B
                    • CloseHandle.KERNEL32 ref: 00405A3D
                    • CloseHandle.KERNEL32 ref: 00405A45
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                    • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                    • API String ID: 2994406822-18413064
                    • Opcode ID: c42f28ba644b97e37895e1f3ee2c7c884f8e483c3f5d678ab53032e062026d85
                    • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                    • Opcode Fuzzy Hash: c42f28ba644b97e37895e1f3ee2c7c884f8e483c3f5d678ab53032e062026d85
                    • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                    APIs
                    • GetCurrentProcessId.KERNEL32 ref: 00412106
                      • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                      • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                      • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                    • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412146
                    • CloseHandle.KERNEL32(00000000), ref: 00412155
                    • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                    • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                    • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                    • API String ID: 3018269243-13974260
                    • Opcode ID: cf8836db070dde1e79f7b372f7e703d1748ead536f5279adb044898871b6b780
                    • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                    • Opcode Fuzzy Hash: cf8836db070dde1e79f7b372f7e703d1748ead536f5279adb044898871b6b780
                    • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                    APIs
                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                    • FindClose.KERNEL32(00000000), ref: 0040BBC9
                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                    • FindClose.KERNEL32(00000000), ref: 0040BD12
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$CloseFile$FirstNext
                    • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                    • API String ID: 1164774033-3681987949
                    • Opcode ID: a7abc2cbee64d590697779d9a46801e96057498aa45ff5fe343c94ad28998e44
                    • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                    • Opcode Fuzzy Hash: a7abc2cbee64d590697779d9a46801e96057498aa45ff5fe343c94ad28998e44
                    • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                    APIs
                    • OpenClipboard.USER32 ref: 004168C2
                    • EmptyClipboard.USER32 ref: 004168D0
                    • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                    • GlobalLock.KERNEL32(00000000), ref: 004168F9
                    • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                    • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                    • CloseClipboard.USER32 ref: 00416955
                    • OpenClipboard.USER32 ref: 0041695C
                    • GetClipboardData.USER32(0000000D), ref: 0041696C
                    • GlobalLock.KERNEL32(00000000), ref: 00416975
                    • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                    • CloseClipboard.USER32 ref: 00416984
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                    • String ID: !D@
                    • API String ID: 3520204547-604454484
                    • Opcode ID: 6c018320e5b0d2cabe6153e6df3be29feb4b7020e0ff09a9ecc452abf36931f7
                    • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                    • Opcode Fuzzy Hash: 6c018320e5b0d2cabe6153e6df3be29feb4b7020e0ff09a9ecc452abf36931f7
                    • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                    APIs
                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                    • FindClose.KERNEL32(00000000), ref: 0040BDC9
                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                    • FindClose.KERNEL32(00000000), ref: 0040BEAF
                    • FindClose.KERNEL32(00000000), ref: 0040BED0
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$Close$File$FirstNext
                    • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                    • API String ID: 3527384056-432212279
                    • Opcode ID: 48f1059577fb6fb3e12f81dcccae54fa1aae2825fed048d23a83c2489a6cdfe4
                    • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                    • Opcode Fuzzy Hash: 48f1059577fb6fb3e12f81dcccae54fa1aae2825fed048d23a83c2489a6cdfe4
                    • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                    APIs
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00475338), ref: 0040F4B9
                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                    • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F563
                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                    • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F66E
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                    • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                    • API String ID: 3756808967-1743721670
                    • Opcode ID: 8520e54c90e73ae769b9472ab5acef4e7d13580ea560d925ff866fcf30e94af2
                    • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                    • Opcode Fuzzy Hash: 8520e54c90e73ae769b9472ab5acef4e7d13580ea560d925ff866fcf30e94af2
                    • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: 0$1$2$3$4$5$6$7$VG
                    • API String ID: 0-1861860590
                    • Opcode ID: 6e6c7a448708c07855854a0ebdca304f9e0347beed71fdd78d4df1a7a8a0f9ff
                    • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                    • Opcode Fuzzy Hash: 6e6c7a448708c07855854a0ebdca304f9e0347beed71fdd78d4df1a7a8a0f9ff
                    • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                    APIs
                    • _wcslen.LIBCMT ref: 00407521
                    • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Object_wcslen
                    • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                    • API String ID: 240030777-3166923314
                    • Opcode ID: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                    • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                    • Opcode Fuzzy Hash: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                    • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                    APIs
                    • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                    • GetLastError.KERNEL32 ref: 0041A7BB
                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: EnumServicesStatus$ErrorLastManagerOpen
                    • String ID:
                    • API String ID: 3587775597-0
                    • Opcode ID: 8be6c0db88263c078c4d0e26e1b320dd21e80ff956e73d25d1154f48fd66f17a
                    • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                    • Opcode Fuzzy Hash: 8be6c0db88263c078c4d0e26e1b320dd21e80ff956e73d25d1154f48fd66f17a
                    • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                    • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045271C
                    • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                    • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                    • GetLocaleInfoW.KERNEL32(?,00001001,lJD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                    • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 004527ED
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                    • String ID: lJD$lJD$lJD
                    • API String ID: 745075371-479184356
                    • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                    • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                    • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                    • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                    • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                    • FindClose.KERNEL32(00000000), ref: 0040C47D
                    • FindClose.KERNEL32(00000000), ref: 0040C4A8
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$CloseFile$FirstNext
                    • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                    • API String ID: 1164774033-405221262
                    • Opcode ID: 285c5e5c0a0229c45b09239667504c56f02977e4a07d16255c72b533a04b213f
                    • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                    • Opcode Fuzzy Hash: 285c5e5c0a0229c45b09239667504c56f02977e4a07d16255c72b533a04b213f
                    • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
                    APIs
                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C38E
                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C39B
                      • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                    • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3BC
                    • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                    • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                    • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3E2
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                    • String ID:
                    • API String ID: 2341273852-0
                    • Opcode ID: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                    • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                    • Opcode Fuzzy Hash: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                    • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
                    • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$Find$CreateFirstNext
                    • String ID: 8SG$PXG$PXG$NG$PG
                    • API String ID: 341183262-3812160132
                    • Opcode ID: a5597b3f65d10343650a1b8aec819c1f417a5ef5d46547a6ada3e27d2cae3aed
                    • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
                    • Opcode Fuzzy Hash: a5597b3f65d10343650a1b8aec819c1f417a5ef5d46547a6ada3e27d2cae3aed
                    • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                    APIs
                    • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                    • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                    • GetLastError.KERNEL32 ref: 0040A2ED
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A33B
                    • TranslateMessage.USER32(?), ref: 0040A34A
                    • DispatchMessageA.USER32(?), ref: 0040A355
                    Strings
                    • Keylogger initialization failure: error , xrefs: 0040A301
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                    • String ID: Keylogger initialization failure: error
                    • API String ID: 3219506041-952744263
                    • Opcode ID: a0c7fd995aca5085690907e56c9aea0f8c761d2d3ede884cf20f0c391cb5f383
                    • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                    • Opcode Fuzzy Hash: a0c7fd995aca5085690907e56c9aea0f8c761d2d3ede884cf20f0c391cb5f383
                    • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA
                    APIs
                    • GetForegroundWindow.USER32(?,?,00000000), ref: 0040A416
                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                    • GetKeyboardLayout.USER32(00000000), ref: 0040A429
                    • GetKeyState.USER32(00000010), ref: 0040A433
                    • GetKeyboardState.USER32(?,?,00000000), ref: 0040A43E
                    • ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0040A461
                    • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                    • ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0040A4FA
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                    • String ID:
                    • API String ID: 1888522110-0
                    • Opcode ID: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                    • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                    • Opcode Fuzzy Hash: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                    • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                    APIs
                    • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041409D
                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140A9
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0041426A
                    • GetProcAddress.KERNEL32(00000000), ref: 00414271
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressCloseCreateLibraryLoadProcsend
                    • String ID: SHDeleteKeyW$Shlwapi.dll
                    • API String ID: 2127411465-314212984
                    • Opcode ID: d8728620bcedfbf95b0a0fc4e553f00c45b98f8cdcebe4b8e1ae684bfe74d4de
                    • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                    • Opcode Fuzzy Hash: d8728620bcedfbf95b0a0fc4e553f00c45b98f8cdcebe4b8e1ae684bfe74d4de
                    • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                    APIs
                    • _free.LIBCMT ref: 00449212
                    • _free.LIBCMT ref: 00449236
                    • _free.LIBCMT ref: 004493BD
                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                    • _free.LIBCMT ref: 00449589
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ByteCharMultiWide$InformationTimeZone
                    • String ID:
                    • API String ID: 314583886-0
                    • Opcode ID: a0df98c9171fe928957a71b0f613fe22cde1b567892c52a540cd8d6d0b3e47ec
                    • Instruction ID: 779aab753f07af14b01adf3fce5c8211df4e7f9331a35af1166ddbde82723190
                    • Opcode Fuzzy Hash: a0df98c9171fe928957a71b0f613fe22cde1b567892c52a540cd8d6d0b3e47ec
                    • Instruction Fuzzy Hash: CAC15771900205ABFB24DF69CC41AAFBBA8EF46314F1405AFE89497381E7788E42D758
                    APIs
                      • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                      • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                      • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                      • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                      • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                    • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                    • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0041686B
                    • GetProcAddress.KERNEL32(00000000), ref: 00416872
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                    • String ID: !D@$PowrProf.dll$SetSuspendState
                    • API String ID: 1589313981-2876530381
                    • Opcode ID: cf382c4b4b58b3ccdbeb602cd597e3aae52b34eb44ac0b5ef7fae28ca1f23560
                    • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                    • Opcode Fuzzy Hash: cf382c4b4b58b3ccdbeb602cd597e3aae52b34eb44ac0b5ef7fae28ca1f23560
                    • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                    APIs
                    • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524D5
                    • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524FE
                    • GetACP.KERNEL32(?,?,0045275B,?,00000000), ref: 00452513
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: InfoLocale
                    • String ID: ACP$OCP$['E
                    • API String ID: 2299586839-2532616801
                    • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                    • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                    • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                    • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                    APIs
                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                    • GetLastError.KERNEL32 ref: 0040BA58
                    Strings
                    • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                    • UserProfile, xrefs: 0040BA1E
                    • [Chrome StoredLogins not found], xrefs: 0040BA72
                    • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: DeleteErrorFileLast
                    • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    • API String ID: 2018770650-1062637481
                    • Opcode ID: 0869f95c927aca72a4aa01e0263511fc677d69a40d3c9f55f6e6efd0e01f34cf
                    • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                    • Opcode Fuzzy Hash: 0869f95c927aca72a4aa01e0263511fc677d69a40d3c9f55f6e6efd0e01f34cf
                    • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                    APIs
                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                    • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                    • GetLastError.KERNEL32 ref: 0041799D
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                    • String ID: SeShutdownPrivilege
                    • API String ID: 3534403312-3733053543
                    • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                    • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                    • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                    • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                    APIs
                    • __EH_prolog.LIBCMT ref: 00409258
                      • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                    • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                    • FindClose.KERNEL32(00000000), ref: 004093C1
                      • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                      • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                      • Part of subcall function 00404E26: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                    • FindClose.KERNEL32(00000000), ref: 004095B9
                      • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                      • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                    • String ID:
                    • API String ID: 1824512719-0
                    • Opcode ID: 79a333ab798d4f3832fd98009e5fc83f15b4850663dec53ce8833ea938511d01
                    • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                    • Opcode Fuzzy Hash: 79a333ab798d4f3832fd98009e5fc83f15b4850663dec53ce8833ea938511d01
                    • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                    APIs
                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                    • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                    • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                    • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$Open$ManagerStart
                    • String ID:
                    • API String ID: 276877138-0
                    • Opcode ID: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                    • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                    • Opcode Fuzzy Hash: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                    • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444A73,?,?,?,?,004444CA,?,00000004), ref: 00451DBA
                    • _wcschr.LIBVCRUNTIME ref: 00451E4A
                    • _wcschr.LIBVCRUNTIME ref: 00451E58
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,sJD,00000000,?), ref: 00451EFB
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                    • String ID: sJD
                    • API String ID: 4212172061-3536923933
                    • Opcode ID: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                    • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                    • Opcode Fuzzy Hash: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                    • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                    APIs
                    • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B4B9
                    • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                    • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                    • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Resource$FindLoadLockSizeof
                    • String ID: SETTINGS
                    • API String ID: 3473537107-594951305
                    • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                    • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                    • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                    • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                    APIs
                    • __EH_prolog.LIBCMT ref: 0040966A
                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                    • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                    • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseFirstH_prologNext
                    • String ID:
                    • API String ID: 1157919129-0
                    • Opcode ID: fb173912142d451d8169f8852f62cc003beda93b99b20e6bd32f4a4dc40a9ea1
                    • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                    • Opcode Fuzzy Hash: fb173912142d451d8169f8852f62cc003beda93b99b20e6bd32f4a4dc40a9ea1
                    • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                    APIs
                    • __EH_prolog.LIBCMT ref: 00408811
                    • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                    • String ID:
                    • API String ID: 1771804793-0
                    • Opcode ID: 8f16439d90f6ec0f7283b04e08810252f4f5a069acaf261fa4213b3c41c94a9d
                    • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                    • Opcode Fuzzy Hash: 8f16439d90f6ec0f7283b04e08810252f4f5a069acaf261fa4213b3c41c94a9d
                    • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                    APIs
                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                    • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: DownloadExecuteFileShell
                    • String ID: C:\Users\user\Desktop\New Order.exe$open
                    • API String ID: 2825088817-3895059588
                    • Opcode ID: 3e962aae1bf6d9a082c2cb8e7c72c1813a0f1391a4c7d5151776bd2fdf264440
                    • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                    • Opcode Fuzzy Hash: 3e962aae1bf6d9a082c2cb8e7c72c1813a0f1391a4c7d5151776bd2fdf264440
                    • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
                    • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileFind$FirstNextsend
                    • String ID: XPG$XPG
                    • API String ID: 4113138495-1962359302
                    • Opcode ID: ef4afc18dc9d34da461ea20a285219582541565e32a666253127ded6bb227160
                    • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
                    • Opcode Fuzzy Hash: ef4afc18dc9d34da461ea20a285219582541565e32a666253127ded6bb227160
                    • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
                    APIs
                    • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                      • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                      • Part of subcall function 0041376F: RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137A6
                      • Part of subcall function 0041376F: RegCloseKey.KERNEL32(?,?,?,0040F853,004674B8,5.1.0 Pro), ref: 004137B1
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCreateInfoParametersSystemValue
                    • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                    • API String ID: 4127273184-3576401099
                    • Opcode ID: a5c334ccb2f3e0acc440ce1cf8f28a98e6381df3e21f2f51dd4c73347d747d37
                    • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                    • Opcode Fuzzy Hash: a5c334ccb2f3e0acc440ce1cf8f28a98e6381df3e21f2f51dd4c73347d747d37
                    • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorInfoLastLocale$_free$_abort
                    • String ID:
                    • API String ID: 2829624132-0
                    • Opcode ID: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                    • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
                    • Opcode Fuzzy Hash: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
                    • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
                    APIs
                    • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC24
                    • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                    • String ID:
                    • API String ID: 3906539128-0
                    • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                    • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
                    • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                    • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
                    APIs
                    • GetCurrentProcess.KERNEL32(?,?,0044328B,?), ref: 004432D6
                    • TerminateProcess.KERNEL32(00000000,?,0044328B,?), ref: 004432DD
                    • ExitProcess.KERNEL32 ref: 004432EF
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$CurrentExitTerminate
                    • String ID:
                    • API String ID: 1703294689-0
                    • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                    • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
                    • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
                    • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98
                    APIs
                    • OpenClipboard.USER32(00000000), ref: 0040B711
                    • GetClipboardData.USER32(0000000D), ref: 0040B71D
                    • CloseClipboard.USER32 ref: 0040B725
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Clipboard$CloseDataOpen
                    • String ID:
                    • API String ID: 2058664381-0
                    • Opcode ID: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                    • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                    • Opcode Fuzzy Hash: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                    • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: .
                    • API String ID: 0-248832578
                    • Opcode ID: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                    • Instruction ID: 28de479bcd0ee174bbf7ea2f8c467f6584cf945aa63ddb2e5cfeaaf716254919
                    • Opcode Fuzzy Hash: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
                    • Instruction Fuzzy Hash: 233106B2900149AFEB249E7ACC85EEB7BBDEF45304F1001AEE819D7291E6349D458B54
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                    • EnumSystemLocalesW.KERNEL32(004520C3,00000001,00000000,?,lJD,?,004526F0,00000000,?,?,?), ref: 0045200D
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                    • String ID: lJD
                    • API String ID: 1084509184-3316369744
                    • Opcode ID: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                    • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
                    • Opcode Fuzzy Hash: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
                    • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                    • EnumSystemLocalesW.KERNEL32(00452313,00000001,?,?,lJD,?,004526B4,lJD,?,?,?,?,?,00444A6C,?,?), ref: 00452082
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                    • String ID: lJD
                    • API String ID: 1084509184-3316369744
                    • Opcode ID: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                    • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
                    • Opcode Fuzzy Hash: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
                    • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
                    APIs
                    • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: InfoLocale
                    • String ID: GetLocaleInfoEx
                    • API String ID: 2299586839-2904428671
                    • Opcode ID: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                    • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
                    • Opcode Fuzzy Hash: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
                    • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                    • HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$FreeProcess
                    • String ID:
                    • API String ID: 3859560861-0
                    • Opcode ID: 9f2d401c641a2cfb93471127350fb786a64fc0260f1ce6cfe78b140b0d52c749
                    • Instruction ID: eee285bae3a3c664d400e4c5f5e220380537cd22e0998a3ce94cd1697e41dfe3
                    • Opcode Fuzzy Hash: 9f2d401c641a2cfb93471127350fb786a64fc0260f1ce6cfe78b140b0d52c749
                    • Instruction Fuzzy Hash: 16112A32000B11EFC7305F64DE85957BBE9FF08715314892EE29696921CB76FCA0CB58
                    APIs
                    • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434C6B
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: FeaturePresentProcessor
                    • String ID:
                    • API String ID: 2325560087-0
                    • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                    • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
                    • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                    • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                      • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$_free$InfoLocale_abort
                    • String ID:
                    • API String ID: 1663032902-0
                    • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                    • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
                    • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
                    • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$InfoLocale_abort_free
                    • String ID:
                    • API String ID: 2692324296-0
                    • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                    • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
                    • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                    • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
                    APIs
                      • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(-0006D41D,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
                    • EnumSystemLocalesW.KERNEL32(004483BE,00000001,0046EAD0,0000000C), ref: 0044843C
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalEnterEnumLocalesSectionSystem
                    • String ID:
                    • API String ID: 1272433827-0
                    • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                    • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
                    • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
                    • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                    • EnumSystemLocalesW.KERNEL32(00451EA7,00000001,?,?,?,00452712,lJD,?,?,?,?,?,00444A6C,?,?,?), ref: 00451F87
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                    • String ID:
                    • API String ID: 1084509184-0
                    • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                    • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
                    • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
                    • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(Function_00034B53,0043487A), ref: 00434B4C
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                    • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
                    • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                    • Instruction Fuzzy Hash:
                    APIs
                    • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                    • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                      • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                    • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                    • DeleteDC.GDI32(00000000), ref: 00418F2A
                    • DeleteDC.GDI32(00000000), ref: 00418F2D
                    • DeleteObject.GDI32(00000000), ref: 00418F30
                    • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                    • DeleteDC.GDI32(00000000), ref: 00418F62
                    • DeleteDC.GDI32(00000000), ref: 00418F65
                    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                    • GetIconInfo.USER32(?,?), ref: 00418FBD
                    • DeleteObject.GDI32(?), ref: 00418FEC
                    • DeleteObject.GDI32(?), ref: 00418FF9
                    • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                    • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                    • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                    • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                    • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                    • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                    • DeleteDC.GDI32(?), ref: 0041917C
                    • DeleteDC.GDI32(00000000), ref: 0041917F
                    • DeleteObject.GDI32(00000000), ref: 00419182
                    • GlobalFree.KERNEL32(?), ref: 0041918D
                    • DeleteObject.GDI32(00000000), ref: 00419241
                    • GlobalFree.KERNEL32(?), ref: 00419248
                    • DeleteDC.GDI32(?), ref: 00419258
                    • DeleteDC.GDI32(00000000), ref: 00419263
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                    • String ID: DISPLAY
                    • API String ID: 479521175-865373369
                    • Opcode ID: 089398b6e32a15a2bb07324b2b74cb9d300fdf9583fe9699c99010c1927bcddc
                    • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                    • Opcode Fuzzy Hash: 089398b6e32a15a2bb07324b2b74cb9d300fdf9583fe9699c99010c1927bcddc
                    • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
                    APIs
                    • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                    • GetProcAddress.KERNEL32(00000000), ref: 00418139
                    • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                    • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                    • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                    • GetProcAddress.KERNEL32(00000000), ref: 00418161
                    • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                    • GetProcAddress.KERNEL32(00000000), ref: 00418175
                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                    • GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                    • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004182ED
                    • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                    • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
                    • SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                    • ResumeThread.KERNEL32(?), ref: 00418435
                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                    • GetCurrentProcess.KERNEL32(?), ref: 00418457
                    • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                    • GetLastError.KERNEL32 ref: 0041847A
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                    • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                    • API String ID: 4188446516-3035715614
                    • Opcode ID: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                    • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                    • Opcode Fuzzy Hash: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                    • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A
                    APIs
                      • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                      • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                      • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                      • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                    • ExitProcess.KERNEL32 ref: 0040D7D0
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                    • String ID: """, 0$")$0qF$0qF$8SG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                    • API String ID: 1861856835-332907002
                    • Opcode ID: e9f8996b9413f065d588b702d7c496c9e290e02a5e9f4f4bb55cf67c86df2bed
                    • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                    • Opcode Fuzzy Hash: e9f8996b9413f065d588b702d7c496c9e290e02a5e9f4f4bb55cf67c86df2bed
                    • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                    APIs
                      • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                      • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                      • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                      • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                      • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                    • ExitProcess.KERNEL32 ref: 0040D419
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                    • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("
                    • API String ID: 3797177996-2557013105
                    • Opcode ID: 622902c84db1d26943d281a003d45daafdd4eec93442fd148fd25107dc5c202e
                    • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                    • Opcode Fuzzy Hash: 622902c84db1d26943d281a003d45daafdd4eec93442fd148fd25107dc5c202e
                    • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                    APIs
                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                    • ExitProcess.KERNEL32(00000000), ref: 004124A0
                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                    • CloseHandle.KERNEL32(00000000), ref: 0041253B
                    • GetCurrentProcessId.KERNEL32 ref: 00412541
                    • PathFileExistsW.SHLWAPI(?), ref: 00412572
                    • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                    • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                    • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                      • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                    • Sleep.KERNEL32(000001F4), ref: 00412682
                    • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                    • CloseHandle.KERNEL32(00000000), ref: 004126A9
                    • GetCurrentProcessId.KERNEL32 ref: 004126AF
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                    • String ID: .exe$8SG$WDH$exepath$open$temp_
                    • API String ID: 2649220323-436679193
                    • Opcode ID: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                    • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                    • Opcode Fuzzy Hash: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                    • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                    APIs
                    • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                    • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B18E
                    • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                    • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                    • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                    • SetEvent.KERNEL32 ref: 0041B219
                    • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                    • CloseHandle.KERNEL32 ref: 0041B23A
                    • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                    • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                    • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                    • API String ID: 738084811-2094122233
                    • Opcode ID: 3185081fef31f50e7fd3d82a9eeabdb956d7aa56e174b345bc10df65dc5ab0bc
                    • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                    • Opcode Fuzzy Hash: 3185081fef31f50e7fd3d82a9eeabdb956d7aa56e174b345bc10df65dc5ab0bc
                    • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                    APIs
                    • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                    • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                    • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                    • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                    • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                    • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                    • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                    • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                    • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                    • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$Write$Create
                    • String ID: RIFF$WAVE$data$fmt
                    • API String ID: 1602526932-4212202414
                    • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                    • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                    • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                    • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                    APIs
                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\New Order.exe,00000001,0040764D,C:\Users\user\Desktop\New Order.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                    • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                    • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                    • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                    • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                    • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                    • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                    • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressHandleModuleProc
                    • String ID: C:\Users\user\Desktop\New Order.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                    • API String ID: 1646373207-2907446130
                    • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                    • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                    • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                    • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                    APIs
                    • _wcslen.LIBCMT ref: 0040CE07
                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\New Order.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CED0
                    • _wcslen.LIBCMT ref: 0040CEE6
                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\New Order.exe,00000000,00000000), ref: 0040CF84
                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                    • _wcslen.LIBCMT ref: 0040CFC6
                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D02D
                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                    • ExitProcess.KERNEL32 ref: 0040D062
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                    • String ID: 6$C:\Users\user\Desktop\New Order.exe$del$open
                    • API String ID: 1579085052-696220293
                    • Opcode ID: 13f7aa7ccb2e11be31f7ad96e96a4d93445e7550d40e25192285b95e595fa052
                    • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                    • Opcode Fuzzy Hash: 13f7aa7ccb2e11be31f7ad96e96a4d93445e7550d40e25192285b95e595fa052
                    • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                    APIs
                    • lstrlenW.KERNEL32(?), ref: 0041C036
                    • _memcmp.LIBVCRUNTIME ref: 0041C04E
                    • lstrlenW.KERNEL32(?), ref: 0041C067
                    • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                    • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                    • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                    • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                    • _wcslen.LIBCMT ref: 0041C13B
                    • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                    • GetLastError.KERNEL32 ref: 0041C173
                    • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                    • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                    • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                    • GetLastError.KERNEL32 ref: 0041C1D0
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                    • String ID: ?
                    • API String ID: 3941738427-1684325040
                    • Opcode ID: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                    • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                    • Opcode Fuzzy Hash: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                    • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$EnvironmentVariable$_wcschr
                    • String ID:
                    • API String ID: 3899193279-0
                    • Opcode ID: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                    • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                    • Opcode Fuzzy Hash: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                    • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                    APIs
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                      • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                      • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                      • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                    • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                    • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                    • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                    • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                    • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                    • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                    • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                    • Sleep.KERNEL32(00000064), ref: 00412E94
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                    • String ID: /stext "$0TG$0TG$NG$NG
                    • API String ID: 1223786279-2576077980
                    • Opcode ID: bc7e362d57d7670180143ae5cce880ef26dc034d902ff58de5e25bf17600ed29
                    • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                    • Opcode Fuzzy Hash: bc7e362d57d7670180143ae5cce880ef26dc034d902ff58de5e25bf17600ed29
                    • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A
                    APIs
                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                    • LoadLibraryA.KERNEL32(?), ref: 00414E17
                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                    • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                    • LoadLibraryA.KERNEL32(?), ref: 00414E76
                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                    • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                    • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                    • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Library$AddressFreeProc$Load$DirectorySystem
                    • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                    • API String ID: 2490988753-744132762
                    • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                    • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                    • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                    • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE
                    APIs
                    • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C6B1
                    • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C6F5
                    • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseEnumOpen
                    • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                    • API String ID: 1332880857-3714951968
                    • Opcode ID: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
                    • Instruction ID: af0903b0dab8fbea49832074ad132f154b97281cd99b968e1e8b6bf9777b958e
                    • Opcode Fuzzy Hash: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
                    • Instruction Fuzzy Hash: 248144711083419BC325EF11D851EEFB7E8BF94309F10492FB589921A1FF78AE49CA5A
                    APIs
                    • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                    • GetCursorPos.USER32(?), ref: 0041D5E9
                    • SetForegroundWindow.USER32(?), ref: 0041D5F2
                    • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                    • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                    • ExitProcess.KERNEL32 ref: 0041D665
                    • CreatePopupMenu.USER32 ref: 0041D66B
                    • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                    • String ID: Close
                    • API String ID: 1657328048-3535843008
                    • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                    • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                    • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                    • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$Info
                    • String ID:
                    • API String ID: 2509303402-0
                    • Opcode ID: 9a1e8def710a50f9e802e5816f878b52a4fdf116ee4a506070fe770fe0ef34d2
                    • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                    • Opcode Fuzzy Hash: 9a1e8def710a50f9e802e5816f878b52a4fdf116ee4a506070fe770fe0ef34d2
                    • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                    APIs
                    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408CE3
                    • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                    • __aulldiv.LIBCMT ref: 00408D4D
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                    • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                    • CloseHandle.KERNEL32(00000000), ref: 00408F64
                    • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FAE
                    • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                    • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                    • API String ID: 3086580692-2582957567
                    • Opcode ID: 72fad283c4fe1643dee5b4a459ce18e644925f4e3f1a855a4ff9453ab0215ac4
                    • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                    • Opcode Fuzzy Hash: 72fad283c4fe1643dee5b4a459ce18e644925f4e3f1a855a4ff9453ab0215ac4
                    • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                    APIs
                    • Sleep.KERNEL32(00001388), ref: 0040A740
                      • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                      • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                      • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                      • Part of subcall function 0040A675: CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                    • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A81E
                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                    • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A927
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                    • String ID: 8SG$8SG$pQG$pQG$PG$PG
                    • API String ID: 3795512280-1152054767
                    • Opcode ID: 677456a4732d5fb77e9c8745959e99ef54ead223a942f07a0b0fb3c37e482db7
                    • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                    • Opcode Fuzzy Hash: 677456a4732d5fb77e9c8745959e99ef54ead223a942f07a0b0fb3c37e482db7
                    • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E
                    APIs
                    • ___free_lconv_mon.LIBCMT ref: 0045130A
                      • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                      • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                      • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                      • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                      • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                    • _free.LIBCMT ref: 004512FF
                      • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                    • _free.LIBCMT ref: 00451321
                    • _free.LIBCMT ref: 00451336
                    • _free.LIBCMT ref: 00451341
                    • _free.LIBCMT ref: 00451363
                    • _free.LIBCMT ref: 00451376
                    • _free.LIBCMT ref: 00451384
                    • _free.LIBCMT ref: 0045138F
                    • _free.LIBCMT ref: 004513C7
                    • _free.LIBCMT ref: 004513CE
                    • _free.LIBCMT ref: 004513EB
                    • _free.LIBCMT ref: 00451403
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                    • String ID:
                    • API String ID: 161543041-0
                    • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                    • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                    • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                    • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                    APIs
                    • __EH_prolog.LIBCMT ref: 00419FB9
                    • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                    • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                    • GetLocalTime.KERNEL32(?), ref: 0041A105
                    • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                    • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                    • API String ID: 489098229-1431523004
                    • Opcode ID: c46b288c88e8fad2cac684537be2f5c8f54ab494b41e10cc9a988c1d5ba90d08
                    • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                    • Opcode Fuzzy Hash: c46b288c88e8fad2cac684537be2f5c8f54ab494b41e10cc9a988c1d5ba90d08
                    • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                    APIs
                      • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                      • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                      • Part of subcall function 004136F8: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                      • Part of subcall function 004136F8: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                      • Part of subcall function 004136F8: RegCloseKey.KERNEL32(00000000), ref: 00413738
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                    • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                    • ExitProcess.KERNEL32 ref: 0040D9C4
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                    • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                    • API String ID: 1913171305-3159800282
                    • Opcode ID: 636c7451f86ad7dcbf51a7e77965c9df5bd33ebd3fbbde82d92fca028294b8c2
                    • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                    • Opcode Fuzzy Hash: 636c7451f86ad7dcbf51a7e77965c9df5bd33ebd3fbbde82d92fca028294b8c2
                    • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID:
                    • API String ID: 269201875-0
                    • Opcode ID: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                    • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                    • Opcode Fuzzy Hash: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                    • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                    APIs
                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                    • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                    • closesocket.WS2_32(000000FF), ref: 00404E5A
                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                    • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                    • String ID:
                    • API String ID: 3658366068-0
                    • Opcode ID: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                    • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                    • Opcode Fuzzy Hash: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                    • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58
                    APIs
                      • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000,?,00455C84,00000000,0000000C), ref: 004558C6
                    • GetLastError.KERNEL32 ref: 00455CEF
                    • __dosmaperr.LIBCMT ref: 00455CF6
                    • GetFileType.KERNEL32(00000000), ref: 00455D02
                    • GetLastError.KERNEL32 ref: 00455D0C
                    • __dosmaperr.LIBCMT ref: 00455D15
                    • CloseHandle.KERNEL32(00000000), ref: 00455D35
                    • CloseHandle.KERNEL32(?), ref: 00455E7F
                    • GetLastError.KERNEL32 ref: 00455EB1
                    • __dosmaperr.LIBCMT ref: 00455EB8
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                    • String ID: H
                    • API String ID: 4237864984-2852464175
                    • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                    • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                    • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                    • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                    APIs
                    • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453E2F
                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453EB2
                    • __alloca_probe_16.LIBCMT ref: 00453EEA
                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,00000001,00000000,\@E,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F45
                    • __alloca_probe_16.LIBCMT ref: 00453F94
                    • MultiByteToWideChar.KERNEL32(00000001,00000009,00000001,00000000,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F5C
                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                    • MultiByteToWideChar.KERNEL32(00000001,00000001,00000001,00000000,00000000,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FD8
                    • __freea.LIBCMT ref: 00454003
                    • __freea.LIBCMT ref: 0045400F
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                    • String ID: \@E
                    • API String ID: 201697637-1814623452
                    • Opcode ID: fb6195c260b9ae5d4324619eca1f95c452dc13a98459a94436f4153b7f964d62
                    • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                    • Opcode Fuzzy Hash: fb6195c260b9ae5d4324619eca1f95c452dc13a98459a94436f4153b7f964d62
                    • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID: \&G$\&G$`&G
                    • API String ID: 269201875-253610517
                    • Opcode ID: 3d3472b72281963140e8887de038e5b99b85b4a8b881428f5fb0b5852324da1c
                    • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                    • Opcode Fuzzy Hash: 3d3472b72281963140e8887de038e5b99b85b4a8b881428f5fb0b5852324da1c
                    • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: 65535$udp
                    • API String ID: 0-1267037602
                    • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                    • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                    • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                    • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                    APIs
                    • __Init_thread_footer.LIBCMT ref: 0040AD38
                    • Sleep.KERNEL32(000001F4), ref: 0040AD43
                    • GetForegroundWindow.USER32 ref: 0040AD49
                    • GetWindowTextLengthW.USER32(00000000), ref: 0040AD52
                    • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040AD86
                    • Sleep.KERNEL32(000003E8), ref: 0040AE54
                      • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                    • String ID: [${ User has been idle for $ minutes }$]
                    • API String ID: 911427763-3954389425
                    • Opcode ID: 1fd890e2d21f894b0b3b077f7e4e96656cdfff5721ec9a02ea1a5f8763c76f61
                    • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
                    • Opcode Fuzzy Hash: 1fd890e2d21f894b0b3b077f7e4e96656cdfff5721ec9a02ea1a5f8763c76f61
                    • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F
                    APIs
                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                    • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                    • __dosmaperr.LIBCMT ref: 0043A8A6
                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                    • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                    • __dosmaperr.LIBCMT ref: 0043A8E3
                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                    • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                    • __dosmaperr.LIBCMT ref: 0043A937
                    • _free.LIBCMT ref: 0043A943
                    • _free.LIBCMT ref: 0043A94A
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                    • String ID:
                    • API String ID: 2441525078-0
                    • Opcode ID: dbaba6b5bf7e8e3101b206719032b6e5feaa877e1e5831e4faa096a05e69cc69
                    • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                    • Opcode Fuzzy Hash: dbaba6b5bf7e8e3101b206719032b6e5feaa877e1e5831e4faa096a05e69cc69
                    • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                    APIs
                    • SetEvent.KERNEL32(?,?), ref: 004054BF
                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                    • TranslateMessage.USER32(?), ref: 0040557E
                    • DispatchMessageA.USER32(?), ref: 00405589
                    • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                    • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                    • String ID: CloseChat$DisplayMessage$GetMessage
                    • API String ID: 2956720200-749203953
                    • Opcode ID: 685fd760973951ef657dab710ca0ffd0d5e343078631b5a88e9e506cca6722c1
                    • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                    • Opcode Fuzzy Hash: 685fd760973951ef657dab710ca0ffd0d5e343078631b5a88e9e506cca6722c1
                    • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                    APIs
                      • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                    • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                    • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                    • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                    • String ID: 0VG$0VG$<$@$Temp
                    • API String ID: 1704390241-2575729100
                    • Opcode ID: 80039bebc9300f329d7d4246b0ce8421c0d0be0a5475c1be6c4e1aa994d609e9
                    • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                    • Opcode Fuzzy Hash: 80039bebc9300f329d7d4246b0ce8421c0d0be0a5475c1be6c4e1aa994d609e9
                    • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                    APIs
                    • OpenClipboard.USER32 ref: 00416941
                    • EmptyClipboard.USER32 ref: 0041694F
                    • CloseClipboard.USER32 ref: 00416955
                    • OpenClipboard.USER32 ref: 0041695C
                    • GetClipboardData.USER32(0000000D), ref: 0041696C
                    • GlobalLock.KERNEL32(00000000), ref: 00416975
                    • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                    • CloseClipboard.USER32 ref: 00416984
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                    • String ID: !D@
                    • API String ID: 2172192267-604454484
                    • Opcode ID: 4530cadbb14fddee25ef175d735482f5b7b1ecf010632631c9690fb3e5ed724f
                    • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                    • Opcode Fuzzy Hash: 4530cadbb14fddee25ef175d735482f5b7b1ecf010632631c9690fb3e5ed724f
                    • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                    APIs
                    • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                    • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                    • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                    • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                    • CloseHandle.KERNEL32(00000000), ref: 0041345F
                    • CloseHandle.KERNEL32(?), ref: 00413465
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                    • String ID:
                    • API String ID: 297527592-0
                    • Opcode ID: 7389cf943c6bcf248480826047218ee6b0a919d85f38051736b06d81fd75e68c
                    • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                    • Opcode Fuzzy Hash: 7389cf943c6bcf248480826047218ee6b0a919d85f38051736b06d81fd75e68c
                    • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                    APIs
                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                    • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$Open$ControlManager
                    • String ID:
                    • API String ID: 221034970-0
                    • Opcode ID: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                    • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                    • Opcode Fuzzy Hash: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                    • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                    APIs
                    • _free.LIBCMT ref: 00448135
                      • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                    • _free.LIBCMT ref: 00448141
                    • _free.LIBCMT ref: 0044814C
                    • _free.LIBCMT ref: 00448157
                    • _free.LIBCMT ref: 00448162
                    • _free.LIBCMT ref: 0044816D
                    • _free.LIBCMT ref: 00448178
                    • _free.LIBCMT ref: 00448183
                    • _free.LIBCMT ref: 0044818E
                    • _free.LIBCMT ref: 0044819C
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                    • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                    • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                    • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Eventinet_ntoa
                    • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                    • API String ID: 3578746661-3604713145
                    • Opcode ID: 1770ec6c0f5e3b286ceab69ad4fea226e85cf303756d03bb6ed0006363607c11
                    • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                    • Opcode Fuzzy Hash: 1770ec6c0f5e3b286ceab69ad4fea226e85cf303756d03bb6ed0006363607c11
                    • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                    APIs
                    • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00456FFF), ref: 00455F27
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: DecodePointer
                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                    • API String ID: 3527080286-3064271455
                    • Opcode ID: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                    • Instruction ID: ff4fc8d1aadbe784407353d8516796ad37925c88dabf63da6293f70e8270e0de
                    • Opcode Fuzzy Hash: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                    • Instruction Fuzzy Hash: 16519F71900909CBCF10CF58E9485BEBBB0FF49306FA14197D841A73A6DB399D298B1E
                    APIs
                    • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                    • Sleep.KERNEL32(00000064), ref: 00417521
                    • DeleteFileW.KERNEL32(00000000), ref: 00417555
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CreateDeleteExecuteShellSleep
                    • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                    • API String ID: 1462127192-2001430897
                    • Opcode ID: 80bc1f01d41e6bb49ab2ea0752573067485f1394140a330d823018e0c212e60a
                    • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                    • Opcode Fuzzy Hash: 80bc1f01d41e6bb49ab2ea0752573067485f1394140a330d823018e0c212e60a
                    • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                    APIs
                    • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                    • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Users\user\Desktop\New Order.exe), ref: 0040749E
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CurrentProcess
                    • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                    • API String ID: 2050909247-4242073005
                    • Opcode ID: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                    • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                    • Opcode Fuzzy Hash: 1dcac826a5e52bf6061f4ebfcee704f683c74aacb316ad2bc9bf89965cfe4023
                    • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                    APIs
                    • _strftime.LIBCMT ref: 00401D50
                      • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                    • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                    • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                    • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                    • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                    • API String ID: 3809562944-243156785
                    • Opcode ID: 2a82ab0076c0d6d6c8320c03c1c844241e91b5265a3fceccd43811ae68df0b86
                    • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                    • Opcode Fuzzy Hash: 2a82ab0076c0d6d6c8320c03c1c844241e91b5265a3fceccd43811ae68df0b86
                    • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                    APIs
                    • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                    • int.LIBCPMT ref: 00410E81
                      • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                      • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                    • std::_Facet_Register.LIBCPMT ref: 00410EC1
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                    • __Init_thread_footer.LIBCMT ref: 00410F29
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                    • String ID: ,kG$0kG
                    • API String ID: 3815856325-2015055088
                    • Opcode ID: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                    • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                    • Opcode Fuzzy Hash: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                    • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                    APIs
                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                    • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                    • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                    • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                    • waveInStart.WINMM ref: 00401CFE
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                    • String ID: dMG$|MG$PG
                    • API String ID: 1356121797-532278878
                    • Opcode ID: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                    • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                    • Opcode Fuzzy Hash: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                    • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                      • Part of subcall function 0041D50F: RegisterClassExA.USER32(00000030), ref: 0041D55B
                      • Part of subcall function 0041D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                      • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                    • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                    • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                    • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                    • TranslateMessage.USER32(?), ref: 0041D4E9
                    • DispatchMessageA.USER32(?), ref: 0041D4F3
                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D500
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                    • String ID: Remcos
                    • API String ID: 1970332568-165870891
                    • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                    • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                    • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                    • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7d049b86027effad8d92042d9403d5bfe2ea3e93186a839875c543696ca89538
                    • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                    • Opcode Fuzzy Hash: 7d049b86027effad8d92042d9403d5bfe2ea3e93186a839875c543696ca89538
                    • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                    APIs
                      • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                      • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                      • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                      • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                    • _memcmp.LIBVCRUNTIME ref: 00445423
                    • _free.LIBCMT ref: 00445494
                    • _free.LIBCMT ref: 004454AD
                    • _free.LIBCMT ref: 004454DF
                    • _free.LIBCMT ref: 004454E8
                    • _free.LIBCMT ref: 004454F4
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorLast$_abort_memcmp
                    • String ID: C
                    • API String ID: 1679612858-1037565863
                    • Opcode ID: 0768c3d9e3dd940518f99a63cbcd3aeb961d046fc1a72f364ae26972a0ea9dca
                    • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                    • Opcode Fuzzy Hash: 0768c3d9e3dd940518f99a63cbcd3aeb961d046fc1a72f364ae26972a0ea9dca
                    • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: tcp$udp
                    • API String ID: 0-3725065008
                    • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                    • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                    • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                    • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                    APIs
                    • __Init_thread_footer.LIBCMT ref: 004018BE
                    • ExitThread.KERNEL32 ref: 004018F6
                    • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                    • String ID: PkG$XMG$NG$NG
                    • API String ID: 1649129571-3151166067
                    • Opcode ID: f17f11b8b39cffc117ffaa71cd5d18446726339bb65f1098d7a399b3bb622f5a
                    • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                    • Opcode Fuzzy Hash: f17f11b8b39cffc117ffaa71cd5d18446726339bb65f1098d7a399b3bb622f5a
                    • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                    APIs
                    • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,00407FFC,00000000), ref: 004079C5
                    • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A0D
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    • CloseHandle.KERNEL32(00000000,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A4D
                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00407A6A
                    • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407A95
                    • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                      • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                      • Part of subcall function 00404B96: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                    • String ID: .part
                    • API String ID: 1303771098-3499674018
                    • Opcode ID: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                    • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                    • Opcode Fuzzy Hash: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
                    • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                    APIs
                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044ACA3
                    • __alloca_probe_16.LIBCMT ref: 0044ACDB
                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044AD29
                    • __alloca_probe_16.LIBCMT ref: 0044ADC0
                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                    • __freea.LIBCMT ref: 0044AE30
                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                    • __freea.LIBCMT ref: 0044AE39
                    • __freea.LIBCMT ref: 0044AE5E
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                    • String ID:
                    • API String ID: 3864826663-0
                    • Opcode ID: 118846f8b98fa7142c6fc34e08ba9c255994cc722e781db25b6080b075eb9fff
                    • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                    • Opcode Fuzzy Hash: 118846f8b98fa7142c6fc34e08ba9c255994cc722e781db25b6080b075eb9fff
                    • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A
                    APIs
                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 004199CC
                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004199ED
                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A0D
                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A21
                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A37
                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A54
                    • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A6F
                    • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00419A8B
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: InputSend
                    • String ID:
                    • API String ID: 3431551938-0
                    • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                    • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                    • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                    • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: __freea$__alloca_probe_16_free
                    • String ID: a/p$am/pm$zD
                    • API String ID: 2936374016-2723203690
                    • Opcode ID: 582b27bd1da2528f23ecf4cf811f425633019422103e053086a59298c2d48650
                    • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                    • Opcode Fuzzy Hash: 582b27bd1da2528f23ecf4cf811f425633019422103e053086a59298c2d48650
                    • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                    APIs
                    • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                    • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413B8B
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Enum$InfoQueryValue
                    • String ID: [regsplt]$xUG$TG
                    • API String ID: 3554306468-1165877943
                    • Opcode ID: 7e2048b5b4a15889db9c74ac39567fdb59dd46086023709b3913aff4f04af58e
                    • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                    • Opcode Fuzzy Hash: 7e2048b5b4a15889db9c74ac39567fdb59dd46086023709b3913aff4f04af58e
                    • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                    APIs
                    • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B3FE
                    • __fassign.LIBCMT ref: 0044B479
                    • __fassign.LIBCMT ref: 0044B494
                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                    • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B4D9
                    • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B512
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                    • String ID:
                    • API String ID: 1324828854-0
                    • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                    • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                    • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                    • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID: D[E$D[E
                    • API String ID: 269201875-3695742444
                    • Opcode ID: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                    • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                    • Opcode Fuzzy Hash: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                    • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                    APIs
                    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D46
                      • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                      • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    • RegCloseKey.ADVAPI32(00000000,004660A4,004660A4,00466468,00466468,00000071), ref: 00413EB4
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseEnumInfoOpenQuerysend
                    • String ID: xUG$NG$NG$TG
                    • API String ID: 3114080316-2811732169
                    • Opcode ID: fc7062b0e2d73897183f332ff677a088385e4ff99dcd0168fd06527908a237fe
                    • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                    • Opcode Fuzzy Hash: fc7062b0e2d73897183f332ff677a088385e4ff99dcd0168fd06527908a237fe
                    • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                    APIs
                      • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 0041363D
                      • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                      • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                      • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                    • _wcslen.LIBCMT ref: 0041B763
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                    • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                    • API String ID: 37874593-122982132
                    • Opcode ID: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                    • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                    • Opcode Fuzzy Hash: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                    • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                    APIs
                      • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                      • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                      • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                    • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                    • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                    • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                    • API String ID: 1133728706-4073444585
                    • Opcode ID: c4bf94da8be876f49cea7471f0be2422906d591350fd81deebf31ce2b361b3bc
                    • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                    • Opcode Fuzzy Hash: c4bf94da8be876f49cea7471f0be2422906d591350fd81deebf31ce2b361b3bc
                    • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b15328f38de36e2236e67be376e02f2a3afc52644fcc3b23babb247561bddb00
                    • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                    • Opcode Fuzzy Hash: b15328f38de36e2236e67be376e02f2a3afc52644fcc3b23babb247561bddb00
                    • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                    APIs
                    • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C44D
                    • CloseHandle.KERNEL32(00000000), ref: 0041C459
                    • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C46A
                    • CloseHandle.KERNEL32(00000000), ref: 0041C477
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseHandle$CreatePointerWrite
                    • String ID: hpF
                    • API String ID: 1852769593-151379673
                    • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                    • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                    • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                    • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
                    APIs
                      • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                    • _free.LIBCMT ref: 00450F48
                      • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                    • _free.LIBCMT ref: 00450F53
                    • _free.LIBCMT ref: 00450F5E
                    • _free.LIBCMT ref: 00450FB2
                    • _free.LIBCMT ref: 00450FBD
                    • _free.LIBCMT ref: 00450FC8
                    • _free.LIBCMT ref: 00450FD3
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                    • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                    • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                    • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                    APIs
                    • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                    • int.LIBCPMT ref: 00411183
                      • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                      • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                    • std::_Facet_Register.LIBCPMT ref: 004111C3
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                    • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                    • String ID: (mG
                    • API String ID: 2536120697-4059303827
                    • Opcode ID: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                    • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                    • Opcode Fuzzy Hash: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                    • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                    APIs
                    • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                    • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLastValue___vcrt_
                    • String ID:
                    • API String ID: 3852720340-0
                    • Opcode ID: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                    • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                    • Opcode Fuzzy Hash: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                    • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                    APIs
                    • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\New Order.exe), ref: 004075D0
                      • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                      • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                    • CoUninitialize.OLE32 ref: 00407629
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: InitializeObjectUninitialize_wcslen
                    • String ID: C:\Users\user\Desktop\New Order.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                    • API String ID: 3851391207-3747118213
                    • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                    • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                    • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                    • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                    APIs
                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                    • GetLastError.KERNEL32 ref: 0040BAE7
                    Strings
                    • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                    • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                    • UserProfile, xrefs: 0040BAAD
                    • [Chrome Cookies not found], xrefs: 0040BB01
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: DeleteErrorFileLast
                    • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                    • API String ID: 2018770650-304995407
                    • Opcode ID: 1760e3e0d40a85f21b6d805f5d6a4de2d8cd9e2060f798d2c7163d0a527507e4
                    • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                    • Opcode Fuzzy Hash: 1760e3e0d40a85f21b6d805f5d6a4de2d8cd9e2060f798d2c7163d0a527507e4
                    • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                    APIs
                    • AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                    • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                    • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Console$AllocOutputShowWindow
                    • String ID: Remcos v$5.1.0 Pro$CONOUT$
                    • API String ID: 2425139147-1043272453
                    • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                    • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                    • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                    • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                    APIs
                    • __allrem.LIBCMT ref: 0043AC69
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                    • __allrem.LIBCMT ref: 0043AC9C
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                    • __allrem.LIBCMT ref: 0043ACD1
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                    • String ID:
                    • API String ID: 1992179935-0
                    • Opcode ID: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                    • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                    • Opcode Fuzzy Hash: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                    • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                    APIs
                    • Sleep.KERNEL32(00000000,0040D262), ref: 004044C4
                      • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prologSleep
                    • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                    • API String ID: 3469354165-3054508432
                    • Opcode ID: 675044920d57351bd4be636fd76d132256166d9fc3ead1ba86e83f4fd14bb599
                    • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                    • Opcode Fuzzy Hash: 675044920d57351bd4be636fd76d132256166d9fc3ead1ba86e83f4fd14bb599
                    • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                    APIs
                      • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                    • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                    • GetNativeSystemInfo.KERNEL32(?,0040D2A2,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411DA5
                    • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411DC9
                      • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                    • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E10
                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E17
                    • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F2A
                      • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                      • Part of subcall function 00412077: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                    • String ID:
                    • API String ID: 3950776272-0
                    • Opcode ID: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                    • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                    • Opcode Fuzzy Hash: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                    • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: __cftoe
                    • String ID:
                    • API String ID: 4189289331-0
                    • Opcode ID: 9a4a9018df91bb80547d8cd227be064c11647db9cc7a9b7c485a3b8778a52ece
                    • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                    • Opcode Fuzzy Hash: 9a4a9018df91bb80547d8cd227be064c11647db9cc7a9b7c485a3b8778a52ece
                    • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                    APIs
                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                    • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                    • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$Open$ChangeConfigManager
                    • String ID:
                    • API String ID: 493672254-0
                    • Opcode ID: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                    • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                    • Opcode Fuzzy Hash: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                    • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                    APIs
                    • GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                    • _free.LIBCMT ref: 0044824C
                    • _free.LIBCMT ref: 00448274
                    • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                    • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                    • _abort.LIBCMT ref: 00448293
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$_free$_abort
                    • String ID:
                    • API String ID: 3160817290-0
                    • Opcode ID: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                    • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                    • Opcode Fuzzy Hash: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                    • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                    APIs
                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                    • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$Open$ControlManager
                    • String ID:
                    • API String ID: 221034970-0
                    • Opcode ID: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                    • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                    • Opcode Fuzzy Hash: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                    • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                    APIs
                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                    • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$Open$ControlManager
                    • String ID:
                    • API String ID: 221034970-0
                    • Opcode ID: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                    • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                    • Opcode Fuzzy Hash: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                    • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                    APIs
                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                    • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Service$CloseHandle$Open$ControlManager
                    • String ID:
                    • API String ID: 221034970-0
                    • Opcode ID: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                    • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                    • Opcode Fuzzy Hash: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                    • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                    APIs
                    • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                    • wsprintfW.USER32 ref: 0040B1F3
                      • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: EventLocalTimewsprintf
                    • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                    • API String ID: 1497725170-248792730
                    • Opcode ID: 5930b91d6002e4bc173ab4be93e7cb7fd053249898d40d7797ac70fa62357d50
                    • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                    • Opcode Fuzzy Hash: 5930b91d6002e4bc173ab4be93e7cb7fd053249898d40d7797ac70fa62357d50
                    • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                    APIs
                    • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                    • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                    • CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseCreateHandleSizeSleep
                    • String ID: XQG
                    • API String ID: 1958988193-3606453820
                    • Opcode ID: a936430ac144879a830ace31701bfe89764f94ae4ec5835598aad753144bf191
                    • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                    • Opcode Fuzzy Hash: a936430ac144879a830ace31701bfe89764f94ae4ec5835598aad753144bf191
                    • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                    APIs
                    • RegisterClassExA.USER32(00000030), ref: 0041D55B
                    • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                    • GetLastError.KERNEL32 ref: 0041D580
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ClassCreateErrorLastRegisterWindow
                    • String ID: 0$MsgWindowClass
                    • API String ID: 2877667751-2410386613
                    • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                    • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                    • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                    • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                    APIs
                    • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                    • CloseHandle.KERNEL32(?), ref: 004077AA
                    • CloseHandle.KERNEL32(?), ref: 004077AF
                    Strings
                    • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                    • C:\Windows\System32\cmd.exe, xrefs: 00407796
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandle$CreateProcess
                    • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                    • API String ID: 2922976086-4183131282
                    • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                    • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                    • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                    • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: SG$C:\Users\user\Desktop\New Order.exe
                    • API String ID: 0-1855926645
                    • Opcode ID: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                    • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                    • Opcode Fuzzy Hash: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                    • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                    APIs
                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 0044335A
                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044336D
                    • FreeLibrary.KERNEL32(00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 00443390
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressFreeHandleLibraryModuleProc
                    • String ID: CorExitProcess$mscoree.dll
                    • API String ID: 4061214504-1276376045
                    • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                    • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                    • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                    • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                    APIs
                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                    • String ID: KeepAlive | Disabled
                    • API String ID: 2993684571-305739064
                    • Opcode ID: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                    • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                    • Opcode Fuzzy Hash: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                    • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                    APIs
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                    • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                    • Sleep.KERNEL32(00002710), ref: 0041AE07
                    • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: PlaySound$HandleLocalModuleSleepTime
                    • String ID: Alarm triggered
                    • API String ID: 614609389-2816303416
                    • Opcode ID: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                    • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                    • Opcode Fuzzy Hash: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                    • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                    APIs
                    • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                    • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD6F
                    • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CDED), ref: 0041CD7C
                    • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD8F
                    Strings
                    • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Console$AttributeText$BufferHandleInfoScreen
                    • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                    • API String ID: 3024135584-2418719853
                    • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                    • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                    • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                    • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                    • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                    • Opcode Fuzzy Hash: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                    • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                    APIs
                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                    • _free.LIBCMT ref: 00444E06
                    • _free.LIBCMT ref: 00444E1D
                    • _free.LIBCMT ref: 00444E3C
                    • _free.LIBCMT ref: 00444E57
                    • _free.LIBCMT ref: 00444E6E
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$AllocateHeap
                    • String ID:
                    • API String ID: 3033488037-0
                    • Opcode ID: d775a197f71d536e5d52874a7a30662ad33d8ad4d8240f212ad1ffb4432d1cba
                    • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                    • Opcode Fuzzy Hash: d775a197f71d536e5d52874a7a30662ad33d8ad4d8240f212ad1ffb4432d1cba
                    • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                    APIs
                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                    • _free.LIBCMT ref: 004493BD
                      • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                    • _free.LIBCMT ref: 00449589
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                    • String ID:
                    • API String ID: 1286116820-0
                    • Opcode ID: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                    • Instruction ID: c95a83c4fc9d8f5f381c6ef12c4bd90d50aad01b0883e3b7d6e96279f2ead045
                    • Opcode Fuzzy Hash: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                    • Instruction Fuzzy Hash: 71511A71904205EBEB14EFA9DD819AFB7BCEF44324F10066FE51493291EB788E42DB58
                    APIs
                      • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                    • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                    • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                      • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                      • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                    • String ID:
                    • API String ID: 4269425633-0
                    • Opcode ID: 6f51e59ffccac79a8cfa31e78c91a9a185d84b91a830793d1a1b18643491f6ec
                    • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                    • Opcode Fuzzy Hash: 6f51e59ffccac79a8cfa31e78c91a9a185d84b91a830793d1a1b18643491f6ec
                    • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID:
                    • API String ID: 269201875-0
                    • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                    • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                    • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                    • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                    APIs
                    • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01), ref: 00451179
                    • __alloca_probe_16.LIBCMT ref: 004511B1
                    • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?), ref: 00451202
                    • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?,00000002,00000000), ref: 00451214
                    • __freea.LIBCMT ref: 0045121D
                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                    • String ID:
                    • API String ID: 313313983-0
                    • Opcode ID: 176232f54f3ec98bfb029651777c0c6490447229ae5715771154ed3ce12be0f5
                    • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                    • Opcode Fuzzy Hash: 176232f54f3ec98bfb029651777c0c6490447229ae5715771154ed3ce12be0f5
                    • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                    APIs
                    • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                      • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                    • _free.LIBCMT ref: 0044F3BF
                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                    • String ID:
                    • API String ID: 336800556-0
                    • Opcode ID: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                    • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                    • Opcode Fuzzy Hash: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                    • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                    APIs
                    • GetLastError.KERNEL32(?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044829E
                    • _free.LIBCMT ref: 004482D3
                    • _free.LIBCMT ref: 004482FA
                    • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448307
                    • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448310
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$_free
                    • String ID:
                    • API String ID: 3170660625-0
                    • Opcode ID: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                    • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                    • Opcode Fuzzy Hash: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                    • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                    APIs
                    • _free.LIBCMT ref: 004509D4
                      • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                    • _free.LIBCMT ref: 004509E6
                    • _free.LIBCMT ref: 004509F8
                    • _free.LIBCMT ref: 00450A0A
                    • _free.LIBCMT ref: 00450A1C
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                    • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                    • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                    • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                    APIs
                    • _free.LIBCMT ref: 00444066
                      • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                      • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                    • _free.LIBCMT ref: 00444078
                    • _free.LIBCMT ref: 0044408B
                    • _free.LIBCMT ref: 0044409C
                    • _free.LIBCMT ref: 004440AD
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                    • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                    • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                    • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                    APIs
                    • _strpbrk.LIBCMT ref: 0044E738
                    • _free.LIBCMT ref: 0044E855
                      • Part of subcall function 0043BD19: IsProcessorFeaturePresent.KERNEL32(00000017,0043BCEB,00405103,?,00000000,00000000,004020A6,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000), ref: 0043BD1B
                      • Part of subcall function 0043BD19: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD3D
                      • Part of subcall function 0043BD19: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD44
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                    • String ID: *?$.
                    • API String ID: 2812119850-3972193922
                    • Opcode ID: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                    • Instruction ID: 94a4b4bbf586d133b1ca6d09685756ea089c4dad0dcc4a5060c65dcbb11523ea
                    • Opcode Fuzzy Hash: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                    • Instruction Fuzzy Hash: B951C375E00109EFEF14DFAAC881AAEBBB5FF58314F25816EE454E7301E6399E018B54
                    APIs
                    • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                      • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                      • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F5B,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C52A
                      • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateFileKeyboardLayoutNameconnectsend
                    • String ID: XQG$NG$PG
                    • API String ID: 1634807452-3565412412
                    • Opcode ID: 540faca1283a201b615fa294366106f171e649dc374ea9aa343cf977934f0195
                    • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
                    • Opcode Fuzzy Hash: 540faca1283a201b615fa294366106f171e649dc374ea9aa343cf977934f0195
                    • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
                    APIs
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                    • String ID: `#D$`#D
                    • API String ID: 885266447-2450397995
                    • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                    • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                    • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                    • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\New Order.exe,00000104), ref: 00443475
                    • _free.LIBCMT ref: 00443540
                    • _free.LIBCMT ref: 0044354A
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$FileModuleName
                    • String ID: C:\Users\user\Desktop\New Order.exe
                    • API String ID: 2506810119-1035246353
                    • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                    • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                    • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                    • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                    APIs
                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                      • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                      • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                      • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                      • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                    • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                    • String ID: /sort "Visit Time" /stext "$0NG
                    • API String ID: 368326130-3219657780
                    • Opcode ID: 765a2cec5dfc93fc14e6a06a83629ca65ec94325b3245c099cb6fcf10de14a30
                    • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                    • Opcode Fuzzy Hash: 765a2cec5dfc93fc14e6a06a83629ca65ec94325b3245c099cb6fcf10de14a30
                    • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                    APIs
                    • _wcslen.LIBCMT ref: 004162F5
                      • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                      • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                      • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                      • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: _wcslen$CloseCreateValue
                    • String ID: !D@$okmode$PG
                    • API String ID: 3411444782-3370592832
                    • Opcode ID: 56d367afe2ba597d6a39c7afb1f52fa5ab03872d574dd40714d897b86eaaf0d3
                    • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                    • Opcode Fuzzy Hash: 56d367afe2ba597d6a39c7afb1f52fa5ab03872d574dd40714d897b86eaaf0d3
                    • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                    APIs
                      • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                    • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                    • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C688
                    Strings
                    • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                    • User Data\Default\Network\Cookies, xrefs: 0040C603
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExistsFilePath
                    • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                    • API String ID: 1174141254-1980882731
                    • Opcode ID: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                    • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                    • Opcode Fuzzy Hash: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                    • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                    APIs
                      • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                    • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                    • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C757
                    Strings
                    • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                    • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExistsFilePath
                    • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                    • API String ID: 1174141254-1980882731
                    • Opcode ID: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                    • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                    • Opcode Fuzzy Hash: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                    • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                    APIs
                    • CreateThread.KERNEL32(00000000,00000000,0040A27D,?,00000000,00000000), ref: 0040A1FE
                    • CreateThread.KERNEL32(00000000,00000000,0040A267,?,00000000,00000000), ref: 0040A20E
                    • CreateThread.KERNEL32(00000000,00000000,0040A289,?,00000000,00000000), ref: 0040A21A
                      • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                      • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateThread$LocalTimewsprintf
                    • String ID: Offline Keylogger Started
                    • API String ID: 465354869-4114347211
                    • Opcode ID: 052d9f24e9ed53101c9c6e29893d10a0ebf43ddb848004275c2ad0d2f900b3d6
                    • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                    • Opcode Fuzzy Hash: 052d9f24e9ed53101c9c6e29893d10a0ebf43ddb848004275c2ad0d2f900b3d6
                    • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                    APIs
                      • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                      • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040AF6E
                    • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040AF7A
                    • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateThread$LocalTime$wsprintf
                    • String ID: Online Keylogger Started
                    • API String ID: 112202259-1258561607
                    • Opcode ID: 1301e6b876f99197b04564c733fafc78f062806f1783c7b989fb50bec4e70a22
                    • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                    • Opcode Fuzzy Hash: 1301e6b876f99197b04564c733fafc78f062806f1783c7b989fb50bec4e70a22
                    • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                    APIs
                    • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406A82
                    • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: CryptUnprotectData$crypt32
                    • API String ID: 2574300362-2380590389
                    • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                    • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                    • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                    • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                    APIs
                    • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                    • CloseHandle.KERNEL32(?), ref: 004051CA
                    • SetEvent.KERNEL32(?), ref: 004051D9
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseEventHandleObjectSingleWait
                    • String ID: Connection Timeout
                    • API String ID: 2055531096-499159329
                    • Opcode ID: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                    • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                    • Opcode Fuzzy Hash: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                    • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                    APIs
                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Exception@8Throw
                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                    • API String ID: 2005118841-1866435925
                    • Opcode ID: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                    • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                    • Opcode Fuzzy Hash: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                    • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                    APIs
                    • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041381F
                    • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F823,pth_unenc,004752D8), ref: 0041384D
                    • RegCloseKey.ADVAPI32(004752D8,?,0040F823,pth_unenc,004752D8), ref: 00413858
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseCreateValue
                    • String ID: pth_unenc
                    • API String ID: 1818849710-4028850238
                    • Opcode ID: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                    • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                    • Opcode Fuzzy Hash: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                    • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                    APIs
                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                      • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                      • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                    • String ID: bad locale name
                    • API String ID: 3628047217-1405518554
                    • Opcode ID: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                    • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                    • Opcode Fuzzy Hash: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                    • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                    APIs
                    • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                    • ShowWindow.USER32(00000009), ref: 00416C61
                    • SetForegroundWindow.USER32 ref: 00416C6D
                      • Part of subcall function 0041CD9B: AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                      • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                      • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                    • String ID: !D@
                    • API String ID: 3446828153-604454484
                    • Opcode ID: b7364eaafb7a437eec89ed9fb4143899ef50b32a2d873a0c8232afd7958e43d5
                    • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                    • Opcode Fuzzy Hash: b7364eaafb7a437eec89ed9fb4143899ef50b32a2d873a0c8232afd7958e43d5
                    • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                    APIs
                    • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExecuteShell
                    • String ID: /C $cmd.exe$open
                    • API String ID: 587946157-3896048727
                    • Opcode ID: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                    • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                    • Opcode Fuzzy Hash: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                    • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                    APIs
                    • TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                    • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                    • TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: TerminateThread$HookUnhookWindows
                    • String ID: pth_unenc
                    • API String ID: 3123878439-4028850238
                    • Opcode ID: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                    • Instruction ID: 1c21f009177841ea8acfe7f5b61a435624369701cc7e40c150536a334dec3301
                    • Opcode Fuzzy Hash: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                    • Instruction Fuzzy Hash: 4AE01272205356EFD7241FA09C988267BEEDA0478A324487EF2C3626B1CA794C10CB5D
                    APIs
                    • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                    • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressHandleModuleProc
                    • String ID: GetCursorInfo$User32.dll
                    • API String ID: 1646373207-2714051624
                    • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                    • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
                    • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                    • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
                    APIs
                    • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                    • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: GetLastInputInfo$User32.dll
                    • API String ID: 2574300362-1519888992
                    • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                    • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
                    • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                    • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
                    APIs
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: __alldvrm$_strrchr
                    • String ID:
                    • API String ID: 1036877536-0
                    • Opcode ID: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                    • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                    • Opcode Fuzzy Hash: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                    • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                    • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                    • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                    • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                    APIs
                    Strings
                    • Cleared browsers logins and cookies., xrefs: 0040C0F5
                    • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Sleep
                    • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                    • API String ID: 3472027048-1236744412
                    • Opcode ID: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                    • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                    • Opcode Fuzzy Hash: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
                    • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                    APIs
                      • Part of subcall function 0041C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C561
                      • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                      • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C594
                    • Sleep.KERNEL32(000001F4), ref: 0040A573
                    • Sleep.KERNEL32(00000064), ref: 0040A5FD
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Window$SleepText$ForegroundLength
                    • String ID: [ $ ]
                    • API String ID: 3309952895-93608704
                    • Opcode ID: e4ff9062ebc1855ffc8709a41a4aeb88848ac43e96cbaf8abbe5df7ed01e55c0
                    • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                    • Opcode Fuzzy Hash: e4ff9062ebc1855ffc8709a41a4aeb88848ac43e96cbaf8abbe5df7ed01e55c0
                    • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                    • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                    • Opcode Fuzzy Hash: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                    • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                    • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                    • Opcode Fuzzy Hash: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                    • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                    APIs
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                    • GetLastError.KERNEL32(?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: LibraryLoad$ErrorLast
                    • String ID:
                    • API String ID: 3177248105-0
                    • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                    • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                    • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                    • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
                    APIs
                    • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C4B2
                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C4D7
                    • CloseHandle.KERNEL32(00000000), ref: 0041C4E5
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseCreateHandleReadSize
                    • String ID:
                    • API String ID: 3919263394-0
                    • Opcode ID: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                    • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                    • Opcode Fuzzy Hash: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                    • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                    APIs
                    • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                    • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C233
                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C23B
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandleOpenProcess
                    • String ID:
                    • API String ID: 39102293-0
                    • Opcode ID: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                    • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                    • Opcode Fuzzy Hash: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                    • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                    APIs
                    • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                      • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                    • _UnwindNestedFrames.LIBCMT ref: 00439891
                    • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                    • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                    • String ID:
                    • API String ID: 2633735394-0
                    • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                    • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                    • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                    • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                    APIs
                    • GetSystemMetrics.USER32(0000004C), ref: 004193F0
                    • GetSystemMetrics.USER32(0000004D), ref: 004193F6
                    • GetSystemMetrics.USER32(0000004E), ref: 004193FC
                    • GetSystemMetrics.USER32(0000004F), ref: 00419402
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: MetricsSystem
                    • String ID:
                    • API String ID: 4116985748-0
                    • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                    • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                    • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                    • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                    APIs
                    • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                    • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                    • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                      • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                    • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                    • String ID:
                    • API String ID: 1761009282-0
                    • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                    • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                    • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                    • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                    APIs
                    • __startOneArgErrorHandling.LIBCMT ref: 00442CED
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorHandling__start
                    • String ID: pow
                    • API String ID: 3213639722-2276729525
                    • Opcode ID: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                    • Instruction ID: c2a334fe3ab53b67a82bc2a1da04863f7f1ed5e2a579c87dfbcc8ae8a095d349
                    • Opcode Fuzzy Hash: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                    • Instruction Fuzzy Hash: C6516DA1E0420296FB167B14CE4137B2BA4DB40751F704D7FF096823AAEB7D8C859A4F
                    APIs
                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                    • __Init_thread_footer.LIBCMT ref: 0040B797
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Init_thread_footer__onexit
                    • String ID: [End of clipboard]$[Text copied to clipboard]
                    • API String ID: 1881088180-3686566968
                    • Opcode ID: 1452d6304ce3f0295fff478f129f85fb29fa27eb4ce50424bc2e0dcad400a5b7
                    • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                    • Opcode Fuzzy Hash: 1452d6304ce3f0295fff478f129f85fb29fa27eb4ce50424bc2e0dcad400a5b7
                    • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                    APIs
                    • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451D92,?,00000050,?,?,?,?,?), ref: 00451C12
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: ACP$OCP
                    • API String ID: 0-711371036
                    • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                    • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                    • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                    • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                    APIs
                    • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                    Strings
                    • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: LocalTime
                    • String ID: KeepAlive | Enabled | Timeout:
                    • API String ID: 481472006-1507639952
                    • Opcode ID: 94476530adddf729a94900e8ced82c90480f790f78fd79a0466f5c5f7008df8a
                    • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                    • Opcode Fuzzy Hash: 94476530adddf729a94900e8ced82c90480f790f78fd79a0466f5c5f7008df8a
                    • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                    APIs
                    • Sleep.KERNEL32 ref: 00416640
                    • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: DownloadFileSleep
                    • String ID: !D@
                    • API String ID: 1931167962-604454484
                    • Opcode ID: 07a7ba679a22719b007f27f942da87136b12813d5d7402b4186b0f1ae2008f5d
                    • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                    • Opcode Fuzzy Hash: 07a7ba679a22719b007f27f942da87136b12813d5d7402b4186b0f1ae2008f5d
                    • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                    APIs
                    • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: LocalTime
                    • String ID: | $%02i:%02i:%02i:%03i
                    • API String ID: 481472006-2430845779
                    • Opcode ID: 0b58fb712609a629be2860926311a3a1d9782cd388fbf364b696734300abae58
                    • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                    • Opcode Fuzzy Hash: 0b58fb712609a629be2860926311a3a1d9782cd388fbf364b696734300abae58
                    • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                    APIs
                    • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExistsFilePath
                    • String ID: alarm.wav$hYG
                    • API String ID: 1174141254-2782910960
                    • Opcode ID: 0e1c4e1224622d2e2eba9349cd815abebc3d2b7a1c969d03ea25083f5c27e476
                    • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
                    • Opcode Fuzzy Hash: 0e1c4e1224622d2e2eba9349cd815abebc3d2b7a1c969d03ea25083f5c27e476
                    • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
                    APIs
                      • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                      • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                      • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                    • CloseHandle.KERNEL32(?), ref: 0040B0B4
                    • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                    • String ID: Online Keylogger Stopped
                    • API String ID: 1623830855-1496645233
                    • Opcode ID: 14d91ba3cc0780b58bc46c93ea61c46197eef5bd77683ed78bbf46c7536d2da3
                    • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                    • Opcode Fuzzy Hash: 14d91ba3cc0780b58bc46c93ea61c46197eef5bd77683ed78bbf46c7536d2da3
                    • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                    APIs
                    • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                    • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: wave$BufferHeaderPrepare
                    • String ID: XMG
                    • API String ID: 2315374483-813777761
                    • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                    • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                    • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                    • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                    APIs
                    • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: LocaleValid
                    • String ID: IsValidLocaleName$JD
                    • API String ID: 1901932003-2234456777
                    • Opcode ID: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                    • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                    • Opcode Fuzzy Hash: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                    • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                    APIs
                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExistsFilePath
                    • String ID: UserProfile$\AppData\Local\Google\Chrome\
                    • API String ID: 1174141254-4188645398
                    • Opcode ID: d6df45e634b6afbccae3fd0fe3c480d2b3110c006c85663e0c742c56e2ad0e6a
                    • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                    • Opcode Fuzzy Hash: d6df45e634b6afbccae3fd0fe3c480d2b3110c006c85663e0c742c56e2ad0e6a
                    • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                    APIs
                    • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExistsFilePath
                    • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                    • API String ID: 1174141254-2800177040
                    • Opcode ID: 6b2bbaa95f382bae7588de9092395feb5a0607f01bf817232799a9fc0a715970
                    • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                    • Opcode Fuzzy Hash: 6b2bbaa95f382bae7588de9092395feb5a0607f01bf817232799a9fc0a715970
                    • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                    APIs
                    • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExistsFilePath
                    • String ID: AppData$\Opera Software\Opera Stable\
                    • API String ID: 1174141254-1629609700
                    • Opcode ID: eb22ca10a5fa219f5c4dc8a07dafa017cd8c89abc0008a47340e43b7a4e1140f
                    • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                    • Opcode Fuzzy Hash: eb22ca10a5fa219f5c4dc8a07dafa017cd8c89abc0008a47340e43b7a4e1140f
                    • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                    APIs
                    • GetKeyState.USER32(00000011), ref: 0040B64B
                      • Part of subcall function 0040A3E0: GetForegroundWindow.USER32(?,?,00000000), ref: 0040A416
                      • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                      • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32(00000000), ref: 0040A429
                      • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                      • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?,?,00000000), ref: 0040A43E
                      • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0040A461
                      • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                      • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                    • String ID: [AltL]$[AltR]
                    • API String ID: 2738857842-2658077756
                    • Opcode ID: 440f2a55e07645c447245340f9966782ae35bb9e0b4477c7a4060e7ad180e5fa
                    • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                    • Opcode Fuzzy Hash: 440f2a55e07645c447245340f9966782ae35bb9e0b4477c7a4060e7ad180e5fa
                    • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                    APIs
                    • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                    • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: uD
                    • API String ID: 0-2547262877
                    • Opcode ID: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                    • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                    • Opcode Fuzzy Hash: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                    • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                    APIs
                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExecuteShell
                    • String ID: !D@$open
                    • API String ID: 587946157-1586967515
                    • Opcode ID: ef1b3a0f4602e6d199ecf0e45d17a7acf077c1a045a33f1301243906c424f492
                    • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                    • Opcode Fuzzy Hash: ef1b3a0f4602e6d199ecf0e45d17a7acf077c1a045a33f1301243906c424f492
                    • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                    APIs
                    • GetKeyState.USER32(00000012), ref: 0040B6A5
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: State
                    • String ID: [CtrlL]$[CtrlR]
                    • API String ID: 1649606143-2446555240
                    • Opcode ID: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                    • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                    • Opcode Fuzzy Hash: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
                    • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                    APIs
                      • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                    • __Init_thread_footer.LIBCMT ref: 00410F29
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: Init_thread_footer__onexit
                    • String ID: ,kG$0kG
                    • API String ID: 1881088180-2015055088
                    • Opcode ID: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                    • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                    • Opcode Fuzzy Hash: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                    • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                    APIs
                    • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D144,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A31
                    • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A45
                    Strings
                    • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: DeleteOpenValue
                    • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                    • API String ID: 2654517830-1051519024
                    • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                    • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                    • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                    • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                    APIs
                    • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B876
                    • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8A1
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: DeleteDirectoryFileRemove
                    • String ID: pth_unenc
                    • API String ID: 3325800564-4028850238
                    • Opcode ID: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                    • Instruction ID: 8281cfb8de641f04b50c20d0c8e921e0d4b8d2282f61a3be21f0805504db5409
                    • Opcode Fuzzy Hash: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                    • Instruction Fuzzy Hash: 45E046321007119BCB14AB258C48AD6339CAF0031AF00486FA492A32A1DF38AC09CAA8
                    APIs
                    • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                    • WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                    Strings
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ObjectProcessSingleTerminateWait
                    • String ID: pth_unenc
                    • API String ID: 1872346434-4028850238
                    • Opcode ID: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                    • Instruction ID: 1c2a9d3d993a2aa40768a62e13ec0bdc830226799852dc8a6b6faba0c59f1205
                    • Opcode Fuzzy Hash: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                    • Instruction Fuzzy Hash: 2FD01234189312FFD7350F60EE4DB043B98A705362F140265F428512F1C7A58994EA59
                    APIs
                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                    • GetLastError.KERNEL32 ref: 00440D35
                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharMultiWide$ErrorLast
                    • String ID:
                    • API String ID: 1717984340-0
                    • Opcode ID: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                    • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                    • Opcode Fuzzy Hash: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                    • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                    APIs
                    • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411B8C
                    • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C58
                    • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411C7A
                    • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                    Memory Dump Source
                    • Source File: 00000003.00000002.4506652852.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_3_2_400000_New Order.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLastRead
                    • String ID:
                    • API String ID: 4100373531-0
                    • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                    • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                    • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                    • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99