Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nuevo orden.exe

Overview

General Information

Sample name:nuevo orden.exe
Analysis ID:1555015
MD5:1af621550628ee8ace6ea7c6afefb0fe
SHA1:0c06b92be85b5810e75709b307ef28df4a5623bb
SHA256:d097aece3afaf2eeafce3fea88dc99e98ef31465bb9216fbc4bbc0c649dea94c
Tags:AgentTeslaexeuser-lowmal3
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • nuevo orden.exe (PID: 5172 cmdline: "C:\Users\user\Desktop\nuevo orden.exe" MD5: 1AF621550628EE8ACE6EA7C6AFEFB0FE)
    • powershell.exe (PID: 1444 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • nuevo orden.exe (PID: 6256 cmdline: "C:\Users\user\Desktop\nuevo orden.exe" MD5: 1AF621550628EE8ACE6EA7C6AFEFB0FE)
  • ZUHFqcY.exe (PID: 356 cmdline: "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe" MD5: 1AF621550628EE8ACE6EA7C6AFEFB0FE)
    • ZUHFqcY.exe (PID: 5268 cmdline: "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe" MD5: 1AF621550628EE8ACE6EA7C6AFEFB0FE)
  • ZUHFqcY.exe (PID: 1280 cmdline: "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe" MD5: 1AF621550628EE8ACE6EA7C6AFEFB0FE)
    • ZUHFqcY.exe (PID: 5344 cmdline: "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe" MD5: 1AF621550628EE8ACE6EA7C6AFEFB0FE)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "eric.zhang@longpowartech.com", "Password": "    w#chNV#1"}
SourceRuleDescriptionAuthorStrings
0000000A.00000002.3421195838.0000000002EA7000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000007.00000002.3422052551.0000000002C47000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000007.00000002.3422052551.0000000002C36000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000007.00000002.3422052551.0000000002C6B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000005.00000002.3421733340.0000000002F5B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 20 entries
            SourceRuleDescriptionAuthorStrings
            0.2.nuevo orden.exe.3c07e70.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.nuevo orden.exe.3c07e70.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.nuevo orden.exe.3c07e70.2.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x32542:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x325b4:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x3263e:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x326d0:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x3273a:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x327ac:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x32842:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x328d2:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.nuevo orden.exe.3bcc450.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.nuevo orden.exe.3bcc450.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 9 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\nuevo orden.exe", ParentImage: C:\Users\user\Desktop\nuevo orden.exe, ParentProcessId: 5172, ParentProcessName: nuevo orden.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe", ProcessId: 1444, ProcessName: powershell.exe
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\nuevo orden.exe, ProcessId: 6256, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZUHFqcY
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\nuevo orden.exe", ParentImage: C:\Users\user\Desktop\nuevo orden.exe, ParentProcessId: 5172, ParentProcessName: nuevo orden.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe", ProcessId: 1444, ProcessName: powershell.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 208.91.199.224, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\nuevo orden.exe, Initiated: true, ProcessId: 6256, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49715
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\nuevo orden.exe", ParentImage: C:\Users\user\Desktop\nuevo orden.exe, ParentProcessId: 5172, ParentProcessName: nuevo orden.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe", ProcessId: 1444, ProcessName: powershell.exe
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:27:24.083031+010020229301A Network Trojan was detected4.245.163.56443192.168.2.649785TCP
                    2024-11-13T10:28:02.316167+010020229301A Network Trojan was detected4.245.163.56443192.168.2.649993TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "eric.zhang@longpowartech.com", "Password": " w#chNV#1"}
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeReversingLabs: Detection: 55%
                    Source: nuevo orden.exeReversingLabs: Detection: 55%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeJoe Sandbox ML: detected
                    Source: nuevo orden.exeJoe Sandbox ML: detected
                    Source: nuevo orden.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: nuevo orden.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: BXjh.pdb source: nuevo orden.exe, ZUHFqcY.exe.5.dr
                    Source: Binary string: BXjh.pdbSHA256 source: nuevo orden.exe, ZUHFqcY.exe.5.dr

                    Networking

                    barindex
                    Source: Yara matchFile source: 0.2.nuevo orden.exe.3c07e70.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.6:49715 -> 208.91.199.224:587
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                    Source: unknownDNS query: name: ip-api.com
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.6:49993
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.6:49785
                    Source: global trafficTCP traffic: 192.168.2.6:49715 -> 208.91.199.224:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: ip-api.com
                    Source: global trafficDNS traffic detected: DNS query: us2.smtp.mailhostbox.com
                    Source: nuevo orden.exe, 00000005.00000002.3417276138.00000000011DD000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3417276138.00000000011B2000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3421733340.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3422052551.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3417281316.0000000000D4E000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3440664568.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3417281316.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3440462278.0000000006347000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3418014149.0000000001326000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3440121979.00000000062F0000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3421195838.0000000002EAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: nuevo orden.exe, 00000005.00000002.3417276138.00000000011B2000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3440988711.0000000006205000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3440121979.00000000062F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: ZUHFqcY.exe, 0000000A.00000002.3440462278.0000000006347000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
                    Source: nuevo orden.exe, 00000005.00000002.3417276138.00000000011DD000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3417276138.00000000011B2000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3421733340.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3422052551.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3440664568.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3417281316.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3440462278.0000000006347000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3418014149.0000000001326000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3421195838.0000000002EAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                    Source: nuevo orden.exe, 00000005.00000002.3421733340.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3422052551.0000000002BFC000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3421195838.0000000002E51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                    Source: nuevo orden.exe, 00000000.00000002.2198129748.00000000039B8000.00000004.00000800.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3421733340.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3417276138.0000000001157000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3422052551.0000000002BFC000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3415403340.000000000042D000.00000040.00000400.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3421195838.0000000002E51000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3418014149.00000000012A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                    Source: ZUHFqcY.exe, 0000000A.00000002.3418014149.00000000012A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hostingJ
                    Source: nuevo orden.exe, 00000005.00000002.3417276138.00000000011DD000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3417276138.00000000011B2000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3421733340.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3422052551.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3417281316.0000000000D4E000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3440664568.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3417281316.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3440462278.0000000006347000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3418014149.0000000001326000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3440121979.00000000062F0000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3421195838.0000000002EAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: nuevo orden.exe, 00000005.00000002.3417276138.00000000011DD000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3417276138.00000000011B2000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3421733340.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3422052551.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3440664568.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3417281316.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3440462278.0000000006347000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3418014149.0000000001326000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3421195838.0000000002EAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0A
                    Source: nuevo orden.exe, 00000000.00000002.2196528166.0000000002A0B000.00000004.00000800.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3421733340.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000006.00000002.2319147071.00000000028BB000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3422052551.0000000002BFC000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000009.00000002.2396410946.000000000269E000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3421195838.0000000002E51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: nuevo orden.exe, ZUHFqcY.exe.5.drString found in binary or memory: http://tempuri.org/DataSet1.xsd
                    Source: nuevo orden.exe, 00000005.00000002.3421733340.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3422052551.0000000002C47000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3421195838.0000000002EAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                    Source: nuevo orden.exe, 00000000.00000002.2198129748.00000000039B8000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3415403340.000000000042D000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: nuevo orden.exe, 00000005.00000002.3417276138.00000000011DD000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3417276138.00000000011B2000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3421733340.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3422052551.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3440664568.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3417281316.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3440462278.0000000006347000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3418014149.0000000001326000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3421195838.0000000002EAD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpack, X3fxBL.cs.Net Code: UdKYqv
                    Source: 0.2.nuevo orden.exe.3c07e70.2.raw.unpack, X3fxBL.cs.Net Code: UdKYqv

                    System Summary

                    barindex
                    Source: 0.2.nuevo orden.exe.3c07e70.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.nuevo orden.exe.3bcc450.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.nuevo orden.exe.3c07e70.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_0281CFA40_2_0281CFA4
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_06F2C5E00_2_06F2C5E0
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_06F2C5DA0_2_06F2C5DA
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_06F235600_2_06F23560
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_06F235500_2_06F23550
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_06F2E3E00_2_06F2E3E0
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_06F2E3DA0_2_06F2E3DA
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_06F203A80_2_06F203A8
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_06F203980_2_06F20398
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_06F2C1A80_2_06F2C1A8
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_06F2BD700_2_06F2BD70
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_06F2CA180_2_06F2CA18
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_07891E680_2_07891E68
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_078900400_2_07890040
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_078900070_2_07890007
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 5_2_01114AD05_2_01114AD0
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 5_2_01113EB85_2_01113EB8
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 5_2_011142005_2_01114200
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 5_2_06A6B4D85_2_06A6B4D8
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 5_2_06A634785_2_06A63478
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 5_2_06A605665_2_06A60566
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 5_2_06A6F3C05_2_06A6F3C0
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 5_2_06A68CF05_2_06A68CF0
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 5_2_06A69D485_2_06A69D48
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 5_2_06A66BB85_2_06A66BB8
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 5_2_06A694335_2_06A69433
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 5_2_06A6ADF85_2_06A6ADF8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_00F624386_2_00F62438
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_00F6CFA46_2_00F6CFA4
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_00F67BC36_2_00F67BC3
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_06E900406_2_06E90040
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_06E91E686_2_06E91E68
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_06E9003B6_2_06E9003B
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_073D35606_2_073D3560
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_073D35506_2_073D3550
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_073DC5E06_2_073DC5E0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_073DC5DA6_2_073DC5DA
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_073D03A86_2_073D03A8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_073D03986_2_073D0398
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_073DE3E06_2_073DE3E0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_073DE3DB6_2_073DE3DB
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_073DC1A86_2_073DC1A8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_073DBD706_2_073DBD70
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_073DCA186_2_073DCA18
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 7_2_00F94AD07_2_00F94AD0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 7_2_00F9CA387_2_00F9CA38
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 7_2_00F93EB87_2_00F93EB8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 7_2_00F942007_2_00F94200
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 7_2_066734787_2_06673478
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 7_2_0667B4D87_2_0667B4D8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 7_2_0667F3C07_2_0667F3C0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 7_2_066700407_2_06670040
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 7_2_06678CF07_2_06678CF0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 7_2_06679D487_2_06679D48
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 7_2_06676BB87_2_06676BB8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 7_2_066794487_2_06679448
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 7_2_0667ADF87_2_0667ADF8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_0099CFA49_2_0099CFA4
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_06C31E589_2_06C31E58
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_06C300409_2_06C30040
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_06C300239_2_06C30023
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_070935509_2_07093550
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_070935609_2_07093560
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_0709C5D29_2_0709C5D2
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_0709C5E09_2_0709C5E0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_070903989_2_07090398
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_070903A89_2_070903A8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_0709E3D99_2_0709E3D9
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_0709E3E09_2_0709E3E0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_0709C1A89_2_0709C1A8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_0709BD709_2_0709BD70
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_0709CA189_2_0709CA18
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_011F4AD010_2_011F4AD0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_011F3EB810_2_011F3EB8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_011F420010_2_011F4200
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_0695963110_2_06959631
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_0695E57810_2_0695E578
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_0695507810_2_06955078
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_06A2B4D810_2_06A2B4D8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_06A2347810_2_06A23478
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_06A29D4810_2_06A29D48
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_06A26BB810_2_06A26BB8
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_06A2F3C010_2_06A2F3C0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_06A2004010_2_06A20040
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_06A28CF010_2_06A28CF0
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_06A2943310_2_06A29433
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_06A2ADF810_2_06A2ADF8
                    Source: nuevo orden.exe, 00000000.00000002.2200644804.0000000005470000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs nuevo orden.exe
                    Source: nuevo orden.exe, 00000000.00000002.2188278997.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs nuevo orden.exe
                    Source: nuevo orden.exe, 00000000.00000002.2196528166.0000000002A12000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename51fb4aff-95dd-4a93-9ab4-04a316570185.exe4 vs nuevo orden.exe
                    Source: nuevo orden.exe, 00000000.00000000.2173904671.000000000071E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBXjh.exe" vs nuevo orden.exe
                    Source: nuevo orden.exe, 00000000.00000002.2198129748.00000000039B8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename51fb4aff-95dd-4a93-9ab4-04a316570185.exe4 vs nuevo orden.exe
                    Source: nuevo orden.exe, 00000000.00000002.2198129748.00000000039B8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs nuevo orden.exe
                    Source: nuevo orden.exe, 00000000.00000002.2203066372.00000000078F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs nuevo orden.exe
                    Source: nuevo orden.exe, 00000005.00000002.3416019378.0000000000EF9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs nuevo orden.exe
                    Source: nuevo orden.exe, 00000005.00000002.3415395729.000000000043E000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename51fb4aff-95dd-4a93-9ab4-04a316570185.exe4 vs nuevo orden.exe
                    Source: nuevo orden.exeBinary or memory string: OriginalFilenameBXjh.exe" vs nuevo orden.exe
                    Source: nuevo orden.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.nuevo orden.exe.3c07e70.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.nuevo orden.exe.3bcc450.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.nuevo orden.exe.3c07e70.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: nuevo orden.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: ZUHFqcY.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpack, ojfoYn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpack, ojfoYn.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpack, nz576WY2fl.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpack, nz576WY2fl.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpack, nz576WY2fl.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpack, nz576WY2fl.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpack, fq6MquFPL9.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpack, fq6MquFPL9.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, jNAS4j9fQeCL43sUac.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, HR8leUGke1iYnYjYyR.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, HR8leUGke1iYnYjYyR.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, HR8leUGke1iYnYjYyR.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, HR8leUGke1iYnYjYyR.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, HR8leUGke1iYnYjYyR.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, HR8leUGke1iYnYjYyR.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, jNAS4j9fQeCL43sUac.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@12/9@2/2
                    Source: C:\Users\user\Desktop\nuevo orden.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\nuevo orden.exe.logJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5208:120:WilError_03
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gronkilf.uie.ps1Jump to behavior
                    Source: nuevo orden.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: nuevo orden.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\nuevo orden.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\nuevo orden.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\nuevo orden.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: nuevo orden.exeReversingLabs: Detection: 55%
                    Source: C:\Users\user\Desktop\nuevo orden.exeFile read: C:\Users\user\Desktop\nuevo orden.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\nuevo orden.exe "C:\Users\user\Desktop\nuevo orden.exe"
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess created: C:\Users\user\Desktop\nuevo orden.exe "C:\Users\user\Desktop\nuevo orden.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess created: C:\Users\user\Desktop\nuevo orden.exe "C:\Users\user\Desktop\nuevo orden.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\Desktop\nuevo orden.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\nuevo orden.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: nuevo orden.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: nuevo orden.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: nuevo orden.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: BXjh.pdb source: nuevo orden.exe, ZUHFqcY.exe.5.dr
                    Source: Binary string: BXjh.pdbSHA256 source: nuevo orden.exe, ZUHFqcY.exe.5.dr

                    Data Obfuscation

                    barindex
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, HR8leUGke1iYnYjYyR.cs.Net Code: addcjc6yOa System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, HR8leUGke1iYnYjYyR.cs.Net Code: addcjc6yOa System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_0281D4B0 pushfd ; ret 0_2_0281D4B1
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 0_2_06F27320 push esp; retf 0_2_06F27321
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 5_2_0111CB44 pushad ; iretd 5_2_0111CEBD
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_00F6D4B0 pushfd ; ret 6_2_00F6D4B1
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_06E91E58 push esp; retn 0006h6_2_06E91E5A
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_073DF279 push ss; retn 0006h6_2_073DF27A
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_073DF240 push ss; retn 0006h6_2_073DF242
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 6_2_073DF2C0 push ss; retn 0006h6_2_073DF2C2
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_00995C88 pushad ; retn 0000h9_2_00995C89
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_00999E41 pushfd ; retn 0000h9_2_00999E42
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 9_2_07097320 push esp; retf 9_2_07097321
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_0695BF60 push es; ret 10_2_0695BF70
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_0695B934 push es; retf 10_2_0695B948
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_0695B94D push es; retf 10_2_0695B948
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeCode function: 10_2_0695B949 push es; retf 10_2_0695B94C
                    Source: nuevo orden.exeStatic PE information: section name: .text entropy: 7.945028236511907
                    Source: ZUHFqcY.exe.5.drStatic PE information: section name: .text entropy: 7.945028236511907
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, nUVMUTwJNZb0qjIrXS.csHigh entropy of concatenated method names: 'SXgoL4rcAk', 'Qq2otgARNP', 'cLUowbKDBm', 'QlGoeFSCFI', 'kkdovAg1pd', 'idxolj0WpW', 'T3JoyqGeHj', 'YhsoHfvMHG', 'UdAog4Rg8f', 'GicobW7J6w'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, f8GXSI8dfcOXDYFeYq.csHigh entropy of concatenated method names: 'gsefS2Ipfw', 'bckfZnkSJd', 'uXKmaOlKYJ', 'nHim56GS9q', 'V7xf1q5sqT', 'XFgftXqMlb', 'YT0fQHvCuw', 'psofwNXUGr', 'ImnfeKRyOW', 'Dh5f4a8Uhk'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, aVCaA3d0t28yPseesH.csHigh entropy of concatenated method names: 'Dispose', 'cDH5WxNHKf', 'A9HpvqcUuH', 'Ppl79mdxgQ', 'VkO5ZvLNmX', 'SaZ5zPcllJ', 'ProcessDialogKey', 'omBpaG3nY4', 'aG6p5dMwpG', 'y1Opp0wdQp'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, YvGYe7QSIaOMfnsZd7.csHigh entropy of concatenated method names: 'xWkB9JKPKZ', 'gRvB0EL2Lr', 'UG4Bshbst5', 'meGBvlfebT', 'HOLBybMT8P', 'sujBHFcDts', 'NtTBb3VBTr', 'VICBuAARuw', 'DDbBLlkHCT', 'VPrB1mdk36'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, nG3nY4WaG6dMwpGE1O.csHigh entropy of concatenated method names: 'ne8rs8wymQ', 'iy0rvCPHxr', 'zdkrlCv9Bn', 'FqoryYjXer', 'Xd7rHiaxc6', 'HV5rgOCucM', 'kJ6rbayMZ1', 'rScruqfhg2', 'A9vrKTKXrw', 'ueurLdiyIn'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, Sn3ea7bCGZDnbqhIeB.csHigh entropy of concatenated method names: 'WK1XJa8Ayn', 'dSUXIwYoLS', 'yWoXORobS7', 'K0WOZWjrjZ', 'hD2OzWFaMH', 'NNnXah9ILP', 'wItX5pi3DQ', 'qv5Xpt2XPA', 'M85XVqNbSv', 'oFXXcJhf2Q'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, gwUc6n5aqAXhZTNg0YF.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'tdp71tij87', 'Dqg7t9PI7f', 'veZ7QHjcg2', 'NYI7w2QcxK', 'hqY7ex1Umf', 'BS974sUTcE', 'hBA7RpvEft'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, jNAS4j9fQeCL43sUac.csHigh entropy of concatenated method names: 'hvjdw089V1', 'jyEdeLmewR', 'DXyd498Ht8', 'HJAdROOjiw', 'TYdd3Um2PQ', 'f0ld8NECLy', 'M7rdAilwoQ', 'GcXdSPqap7', 'zvcdWqGcK0', 'TMEdZZXfus'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, eSXgHXcJKytyOiMBEX.csHigh entropy of concatenated method names: 'UrX5XNAS4j', 'qQe5GCL43s', 'L475YQqRNi', 'CTp5FY2KAQ', 'kNH5o3eYpM', 'yGK5TqoCco', 'NnRwJaJRUDOwFK9IYZ', 'w7NN8ZhXn1qbwd4aLE', 'OXK55iJ7s0', 'p6I5VbPHGu'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, xR9B3jzrW6xI5Sipho.csHigh entropy of concatenated method names: 'gZM76B5Ds8', 'YLm794PitH', 'Gku70pO18a', 'hgg7swNnrg', 'v1C7v5gHfw', 'Hck7ys0yxM', 'mGJ7HGqDa0', 'GPH7hFAnrp', 'Db37MD7kPL', 'L7M7EwEEK5'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, hKAQbOnUNmjciGNH3e.csHigh entropy of concatenated method names: 'Mhl2CQbhIU', 'oEm2qjnfGh', 'WM7IlMXkLr', 'jW9IyST8wl', 'HFLIH4L3NX', 'GKEIgo0P7k', 'eQ8Ib4Wrkj', 'nQPIuGR7Ln', 'r6kIKTCh2Z', 'J7HILoAJgU'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, K7jmrZRRQcgZ5pqb1D.csHigh entropy of concatenated method names: 'Hu4fYDrUxC', 'eIDfF1E73L', 'ToString', 'QPwfJrp2fr', 'Ic3fdii3PM', 'GGJfIUCoYu', 'cZ2f2hhOAy', 'AMRfOriD9y', 'p7JfX88YhD', 'vhFfGSpHZ4'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, HR8leUGke1iYnYjYyR.csHigh entropy of concatenated method names: 'yjpVNTOuZc', 'vK6VJ5nnju', 'l2xVdCmqrx', 'b35VI7IK7r', 'YWTV2YeyT2', 'haeVOokwmW', 'DXoVX9LxsN', 'MFRVGIe7Sd', 'Nn9ViD3q0f', 'uCBVYXsPTq'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, SOlrbVphIZvVVgwFII.csHigh entropy of concatenated method names: 'jqqjThYLc', 'rOcPJm1vb', 'hoL62EtRr', 'GodquCEL0', 'ryF0uL2on', 'aPRnD9QxF', 'fS9tcrnu5ha5khyliU', 'gtlhy0svWtgTAcPhqP', 'nLLm4llLx', 'CGk7LH48b'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, VZCaVb047QqRNiqTpY.csHigh entropy of concatenated method names: 'joiIPSSqqY', 'KtVI6dxpD1', 'KAKI9IOLU3', 'sOgI0rwryp', 'T9oIoLjiuU', 'aZJITeMNFd', 'xg1IfZ3058', 'KymImRxvX4', 'DlVIrhkGlC', 'XkwI7aOe6t'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, MLSwxJ55tQu3yEi6g1B.csHigh entropy of concatenated method names: 'IIP7ZuHIU6', 'b4Z7z3LOk9', 'tt4UaIalcM', 'A6LU5NX9ql', 'tEcUpQ6HBt', 'UL4UVxTFSX', 'oVbUc6HxjH', 'US5UNLRqRv', 'JZ6UJshIfH', 'dOQUdtmTx0'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, EwdQpKZIR41WdNr8Gs.csHigh entropy of concatenated method names: 'Rh87IpgDjI', 'POV72nhjq2', 'z7w7OVI9Mx', 'RKm7XJVUjG', 'jk67rOI7Df', 'nsu7GRbxGv', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, z4Z2jKKxvYLLJRBmCR.csHigh entropy of concatenated method names: 'DyRXMh54yE', 'sQxXEKyGK8', 'YHmXjyEdbN', 'kyyXPGZwjV', 'QDoXCfRaoF', 'S0mX6ooW6S', 'zJTXqUsxu8', 'LmIX9ADekx', 'xbMX0KwQCa', 'KM7Xnuub77'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, OmjNYv5cibqVT7ixO7C.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Or4xr1iMD9', 'jIpx7fRXaj', 'HVexUtBZhO', 'zZSxxbDwQ2', 'svMxkUAJrZ', 'h1BxD6rAvE', 'mQHxhBhrKw'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, mpMEGKsqoCcoqntDFF.csHigh entropy of concatenated method names: 'V6YONpEVDi', 'rwfOd4iLGi', 'kVjO2JiW7m', 'U6KOXARuGi', 'LhwOGZpDjt', 'RnV23RFnD4', 'bJq28SmWL6', 'BRx2ARyPvK', 'jS52SpTA49', 'EME2WpXG4G'
                    Source: 0.2.nuevo orden.exe.3c4c070.0.raw.unpack, bnfH3TA3xVDHxNHKf8.csHigh entropy of concatenated method names: 'pCsro2MtX8', 'c8Brf8CUJw', 'pVarroPZoO', 'qf1rUJaHJS', 'EmarkXSUjj', 'QkGrhMfHjZ', 'Dispose', 'OyjmJvoM1V', 'uZxmdXAASX', 'LK1mI2jt3u'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, nUVMUTwJNZb0qjIrXS.csHigh entropy of concatenated method names: 'SXgoL4rcAk', 'Qq2otgARNP', 'cLUowbKDBm', 'QlGoeFSCFI', 'kkdovAg1pd', 'idxolj0WpW', 'T3JoyqGeHj', 'YhsoHfvMHG', 'UdAog4Rg8f', 'GicobW7J6w'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, f8GXSI8dfcOXDYFeYq.csHigh entropy of concatenated method names: 'gsefS2Ipfw', 'bckfZnkSJd', 'uXKmaOlKYJ', 'nHim56GS9q', 'V7xf1q5sqT', 'XFgftXqMlb', 'YT0fQHvCuw', 'psofwNXUGr', 'ImnfeKRyOW', 'Dh5f4a8Uhk'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, aVCaA3d0t28yPseesH.csHigh entropy of concatenated method names: 'Dispose', 'cDH5WxNHKf', 'A9HpvqcUuH', 'Ppl79mdxgQ', 'VkO5ZvLNmX', 'SaZ5zPcllJ', 'ProcessDialogKey', 'omBpaG3nY4', 'aG6p5dMwpG', 'y1Opp0wdQp'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, YvGYe7QSIaOMfnsZd7.csHigh entropy of concatenated method names: 'xWkB9JKPKZ', 'gRvB0EL2Lr', 'UG4Bshbst5', 'meGBvlfebT', 'HOLBybMT8P', 'sujBHFcDts', 'NtTBb3VBTr', 'VICBuAARuw', 'DDbBLlkHCT', 'VPrB1mdk36'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, nG3nY4WaG6dMwpGE1O.csHigh entropy of concatenated method names: 'ne8rs8wymQ', 'iy0rvCPHxr', 'zdkrlCv9Bn', 'FqoryYjXer', 'Xd7rHiaxc6', 'HV5rgOCucM', 'kJ6rbayMZ1', 'rScruqfhg2', 'A9vrKTKXrw', 'ueurLdiyIn'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, Sn3ea7bCGZDnbqhIeB.csHigh entropy of concatenated method names: 'WK1XJa8Ayn', 'dSUXIwYoLS', 'yWoXORobS7', 'K0WOZWjrjZ', 'hD2OzWFaMH', 'NNnXah9ILP', 'wItX5pi3DQ', 'qv5Xpt2XPA', 'M85XVqNbSv', 'oFXXcJhf2Q'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, gwUc6n5aqAXhZTNg0YF.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'tdp71tij87', 'Dqg7t9PI7f', 'veZ7QHjcg2', 'NYI7w2QcxK', 'hqY7ex1Umf', 'BS974sUTcE', 'hBA7RpvEft'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, jNAS4j9fQeCL43sUac.csHigh entropy of concatenated method names: 'hvjdw089V1', 'jyEdeLmewR', 'DXyd498Ht8', 'HJAdROOjiw', 'TYdd3Um2PQ', 'f0ld8NECLy', 'M7rdAilwoQ', 'GcXdSPqap7', 'zvcdWqGcK0', 'TMEdZZXfus'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, eSXgHXcJKytyOiMBEX.csHigh entropy of concatenated method names: 'UrX5XNAS4j', 'qQe5GCL43s', 'L475YQqRNi', 'CTp5FY2KAQ', 'kNH5o3eYpM', 'yGK5TqoCco', 'NnRwJaJRUDOwFK9IYZ', 'w7NN8ZhXn1qbwd4aLE', 'OXK55iJ7s0', 'p6I5VbPHGu'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, xR9B3jzrW6xI5Sipho.csHigh entropy of concatenated method names: 'gZM76B5Ds8', 'YLm794PitH', 'Gku70pO18a', 'hgg7swNnrg', 'v1C7v5gHfw', 'Hck7ys0yxM', 'mGJ7HGqDa0', 'GPH7hFAnrp', 'Db37MD7kPL', 'L7M7EwEEK5'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, hKAQbOnUNmjciGNH3e.csHigh entropy of concatenated method names: 'Mhl2CQbhIU', 'oEm2qjnfGh', 'WM7IlMXkLr', 'jW9IyST8wl', 'HFLIH4L3NX', 'GKEIgo0P7k', 'eQ8Ib4Wrkj', 'nQPIuGR7Ln', 'r6kIKTCh2Z', 'J7HILoAJgU'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, K7jmrZRRQcgZ5pqb1D.csHigh entropy of concatenated method names: 'Hu4fYDrUxC', 'eIDfF1E73L', 'ToString', 'QPwfJrp2fr', 'Ic3fdii3PM', 'GGJfIUCoYu', 'cZ2f2hhOAy', 'AMRfOriD9y', 'p7JfX88YhD', 'vhFfGSpHZ4'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, HR8leUGke1iYnYjYyR.csHigh entropy of concatenated method names: 'yjpVNTOuZc', 'vK6VJ5nnju', 'l2xVdCmqrx', 'b35VI7IK7r', 'YWTV2YeyT2', 'haeVOokwmW', 'DXoVX9LxsN', 'MFRVGIe7Sd', 'Nn9ViD3q0f', 'uCBVYXsPTq'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, SOlrbVphIZvVVgwFII.csHigh entropy of concatenated method names: 'jqqjThYLc', 'rOcPJm1vb', 'hoL62EtRr', 'GodquCEL0', 'ryF0uL2on', 'aPRnD9QxF', 'fS9tcrnu5ha5khyliU', 'gtlhy0svWtgTAcPhqP', 'nLLm4llLx', 'CGk7LH48b'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, VZCaVb047QqRNiqTpY.csHigh entropy of concatenated method names: 'joiIPSSqqY', 'KtVI6dxpD1', 'KAKI9IOLU3', 'sOgI0rwryp', 'T9oIoLjiuU', 'aZJITeMNFd', 'xg1IfZ3058', 'KymImRxvX4', 'DlVIrhkGlC', 'XkwI7aOe6t'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, MLSwxJ55tQu3yEi6g1B.csHigh entropy of concatenated method names: 'IIP7ZuHIU6', 'b4Z7z3LOk9', 'tt4UaIalcM', 'A6LU5NX9ql', 'tEcUpQ6HBt', 'UL4UVxTFSX', 'oVbUc6HxjH', 'US5UNLRqRv', 'JZ6UJshIfH', 'dOQUdtmTx0'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, EwdQpKZIR41WdNr8Gs.csHigh entropy of concatenated method names: 'Rh87IpgDjI', 'POV72nhjq2', 'z7w7OVI9Mx', 'RKm7XJVUjG', 'jk67rOI7Df', 'nsu7GRbxGv', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, z4Z2jKKxvYLLJRBmCR.csHigh entropy of concatenated method names: 'DyRXMh54yE', 'sQxXEKyGK8', 'YHmXjyEdbN', 'kyyXPGZwjV', 'QDoXCfRaoF', 'S0mX6ooW6S', 'zJTXqUsxu8', 'LmIX9ADekx', 'xbMX0KwQCa', 'KM7Xnuub77'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, OmjNYv5cibqVT7ixO7C.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Or4xr1iMD9', 'jIpx7fRXaj', 'HVexUtBZhO', 'zZSxxbDwQ2', 'svMxkUAJrZ', 'h1BxD6rAvE', 'mQHxhBhrKw'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, mpMEGKsqoCcoqntDFF.csHigh entropy of concatenated method names: 'V6YONpEVDi', 'rwfOd4iLGi', 'kVjO2JiW7m', 'U6KOXARuGi', 'LhwOGZpDjt', 'RnV23RFnD4', 'bJq28SmWL6', 'BRx2ARyPvK', 'jS52SpTA49', 'EME2WpXG4G'
                    Source: 0.2.nuevo orden.exe.78f0000.4.raw.unpack, bnfH3TA3xVDHxNHKf8.csHigh entropy of concatenated method names: 'pCsro2MtX8', 'c8Brf8CUJw', 'pVarroPZoO', 'qf1rUJaHJS', 'EmarkXSUjj', 'QkGrhMfHjZ', 'Dispose', 'OyjmJvoM1V', 'uZxmdXAASX', 'LK1mI2jt3u'
                    Source: C:\Users\user\Desktop\nuevo orden.exeFile created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeJump to dropped file
                    Source: C:\Users\user\Desktop\nuevo orden.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ZUHFqcYJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ZUHFqcYJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\nuevo orden.exeFile opened: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: nuevo orden.exe PID: 5172, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 356, type: MEMORYSTR
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: C:\Users\user\Desktop\nuevo orden.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: nuevo orden.exe, 00000000.00000002.2198129748.00000000039B8000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3415403340.000000000042D000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\nuevo orden.exeMemory allocated: 2810000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeMemory allocated: 29B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeMemory allocated: 49B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeMemory allocated: 7A70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeMemory allocated: 8A70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeMemory allocated: 8C30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeMemory allocated: 9C30000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeMemory allocated: 1110000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeMemory allocated: 2EE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeMemory allocated: 2D70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: F20000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 2860000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 4860000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 73E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 83E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 8580000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 9580000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: F50000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 2BF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: FC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 990000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 2640000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 4640000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 70A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 80A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 8240000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 9240000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 11F0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 2E50000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory allocated: 2CA0000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5950Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3782Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeWindow / User API: threadDelayed 1584Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeWindow / User API: threadDelayed 4101Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWindow / User API: threadDelayed 4602Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWindow / User API: threadDelayed 1147Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWindow / User API: threadDelayed 456
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWindow / User API: threadDelayed 4677
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5544Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3940Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -17524406870024063s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -99890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 1128Thread sleep count: 1584 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 1128Thread sleep count: 4101 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -99781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -99667s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -99542s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -99437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -99322s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -99183s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -99078s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -98964s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -98858s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -98746s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -98640s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -98531s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -98421s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -98309s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -98203s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -98093s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -97984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -97874s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -97765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -97656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -97546s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -97437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -97328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -97218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -97109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -97000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exe TID: 5260Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5632Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -18446744073709540s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -99890s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1340Thread sleep count: 4602 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1340Thread sleep count: 1147 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -99780s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -99671s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -99562s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -99452s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -99343s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -99234s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -99124s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -99015s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -98906s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -98796s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -98687s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -98578s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -98466s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -98359s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -98250s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -98140s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -98031s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -97921s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -97812s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -97703s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -97593s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -97484s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -97375s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -97265s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -97156s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -97040s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4892Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 1088Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -12912720851596678s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -99874s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4784Thread sleep count: 456 > 30
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 4784Thread sleep count: 4677 > 30
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -99765s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -99656s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -99546s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -99437s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -99328s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -99218s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -99109s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -99000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -98890s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -98781s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -98671s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -98562s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -98453s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -98343s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -98234s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -98125s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -98015s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -97906s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -97796s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -97687s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -97578s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -97468s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -97359s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe TID: 5172Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\Desktop\nuevo orden.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\nuevo orden.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\nuevo orden.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 99890Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 99667Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 99542Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 99437Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 99322Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 99183Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 99078Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 98964Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 98858Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 98746Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 98640Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 98531Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 98421Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 98309Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 98203Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 98093Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 97984Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 97874Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 97765Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 97656Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 97546Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 97437Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 97328Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 97218Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 97109Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 97000Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99890Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99780Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99671Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99562Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99452Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99343Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99234Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99124Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99015Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98906Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98796Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98687Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98578Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98466Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98359Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98140Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98031Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97921Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97812Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97703Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97593Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97484Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97375Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97265Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97156Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97040Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99874
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99765
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99656
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99546
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99437
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99328
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99218
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99109
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 99000
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98890
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98781
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98671
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98562
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98453
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98343
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98234
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98125
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 98015
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97906
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97796
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97687
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97578
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97468
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 97359
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeThread delayed: delay time: 922337203685477
                    Source: nuevo orden.exe, 00000000.00000002.2201625930.0000000006E34000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}rJ
                    Source: ZUHFqcY.exe, 00000007.00000002.3415403340.000000000042D000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: ZUHFqcY.exe, 00000007.00000002.3415403340.000000000042D000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                    Source: nuevo orden.exe, 00000005.00000002.3417276138.00000000011DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll%
                    Source: nuevo orden.exe, 00000000.00000002.2201625930.0000000006E34000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                    Source: ZUHFqcY.exe, 00000007.00000002.3417281316.0000000000DBF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll"
                    Source: ZUHFqcY.exe, 0000000A.00000002.3418014149.0000000001345000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\nuevo orden.exeCode function: 5_2_011170B8 CheckRemoteDebuggerPresent,5_2_011170B8
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess queried: DebugPort
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe"
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeMemory written: C:\Users\user\Desktop\nuevo orden.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory written: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeMemory written: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeProcess created: C:\Users\user\Desktop\nuevo orden.exe "C:\Users\user\Desktop\nuevo orden.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeProcess created: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe "C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeQueries volume information: C:\Users\user\Desktop\nuevo orden.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeQueries volume information: C:\Users\user\Desktop\nuevo orden.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\nuevo orden.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.nuevo orden.exe.3c07e70.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.nuevo orden.exe.3bcc450.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.nuevo orden.exe.3c07e70.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.3421195838.0000000002EA7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3422052551.0000000002C47000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3422052551.0000000002C36000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3422052551.0000000002C6B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.3421733340.0000000002F5B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3421195838.0000000002ECB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.3421733340.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3415403340.000000000042D000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3421195838.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.3421733340.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2198129748.00000000039B8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: nuevo orden.exe PID: 5172, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: nuevo orden.exe PID: 6256, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 5268, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 5344, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                    Source: C:\Users\user\Desktop\nuevo orden.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\nuevo orden.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: Yara matchFile source: 0.2.nuevo orden.exe.3c07e70.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.nuevo orden.exe.3bcc450.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.nuevo orden.exe.3c07e70.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.3415403340.000000000042D000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3421195838.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.3421733340.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2198129748.00000000039B8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: nuevo orden.exe PID: 5172, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: nuevo orden.exe PID: 6256, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 5268, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 5344, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.nuevo orden.exe.3c07e70.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.nuevo orden.exe.3bcc450.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.nuevo orden.exe.3c07e70.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.nuevo orden.exe.3bcc450.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000A.00000002.3421195838.0000000002EA7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3422052551.0000000002C47000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3422052551.0000000002C36000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3422052551.0000000002C6B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.3421733340.0000000002F5B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3421195838.0000000002ECB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.3421733340.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.3415403340.000000000042D000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.3421195838.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.3421733340.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2198129748.00000000039B8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: nuevo orden.exe PID: 5172, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: nuevo orden.exe PID: 6256, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 5268, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ZUHFqcY.exe PID: 5344, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    Registry Run Keys / Startup Folder
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Registry Run Keys / Startup Folder
                    2
                    Obfuscated Files or Information
                    Security Account Manager1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS521
                    Security Software Discovery
                    Distributed Component Object Model1
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Process Discovery
                    SSHKeylogging12
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials151
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items151
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Hidden Files and Directories
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1555015 Sample: nuevo orden.exe Startdate: 13/11/2024 Architecture: WINDOWS Score: 100 39 us2.smtp.mailhostbox.com 2->39 41 ip-api.com 2->41 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 Multi AV Scanner detection for submitted file 2->55 57 12 other signatures 2->57 8 nuevo orden.exe 4 2->8         started        12 ZUHFqcY.exe 3 2->12         started        14 ZUHFqcY.exe 2 2->14         started        signatures3 process4 file5 33 C:\Users\user\AppData\...\nuevo orden.exe.log, ASCII 8->33 dropped 59 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->59 61 Adds a directory exclusion to Windows Defender 8->61 63 Injects a PE file into a foreign processes 8->63 16 nuevo orden.exe 16 5 8->16         started        21 powershell.exe 23 8->21         started        65 Multi AV Scanner detection for dropped file 12->65 67 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 12->67 69 Machine Learning detection for dropped file 12->69 23 ZUHFqcY.exe 14 2 12->23         started        25 ZUHFqcY.exe 14->25         started        signatures6 process7 dnsIp8 35 ip-api.com 208.95.112.1, 49714, 49773, 49814 TUT-ASUS United States 16->35 37 us2.smtp.mailhostbox.com 208.91.199.224, 49715, 49780, 49825 PUBLIC-DOMAIN-REGISTRYUS United States 16->37 29 C:\Users\user\AppData\Roaming\...\ZUHFqcY.exe, PE32 16->29 dropped 31 C:\Users\user\...\ZUHFqcY.exe:Zone.Identifier, ASCII 16->31 dropped 43 Tries to steal Mail credentials (via file / registry access) 16->43 45 Hides that the sample has been downloaded from the Internet (zone.identifier) 16->45 47 Loading BitLocker PowerShell Module 21->47 27 conhost.exe 21->27         started        49 Tries to harvest and steal browser information (history, passwords, etc) 25->49 file9 signatures10 process11

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    nuevo orden.exe55%ReversingLabsByteCode-MSIL.Hacktool.Aikaantivm
                    nuevo orden.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe55%ReversingLabsByteCode-MSIL.Hacktool.Aikaantivm
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://ocsp.sectigo.com0A0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    us2.smtp.mailhostbox.com
                    208.91.199.224
                    truefalse
                      high
                      ip-api.com
                      208.95.112.1
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://ip-api.com/line/?fields=hostingfalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#nuevo orden.exe, 00000005.00000002.3417276138.00000000011DD000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3417276138.00000000011B2000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3421733340.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3422052551.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3440664568.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3417281316.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3440462278.0000000006347000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3418014149.0000000001326000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3421195838.0000000002EAD000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://ocsp.sectigo.com0Anuevo orden.exe, 00000005.00000002.3417276138.00000000011DD000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3417276138.00000000011B2000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3421733340.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3422052551.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3440664568.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3417281316.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3440462278.0000000006347000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3418014149.0000000001326000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3421195838.0000000002EAD000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://crl.mZUHFqcY.exe, 0000000A.00000002.3440462278.0000000006347000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://sectigo.com/CPS0nuevo orden.exe, 00000005.00000002.3417276138.00000000011DD000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3417276138.00000000011B2000.00000004.00000020.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3421733340.0000000002F3F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3422052551.0000000002C4F000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3440664568.00000000061B0000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3417281316.0000000000DBF000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3440462278.0000000006347000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3418014149.0000000001326000.00000004.00000020.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3421195838.0000000002EAD000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://account.dyn.com/nuevo orden.exe, 00000000.00000002.2198129748.00000000039B8000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3415403340.000000000042D000.00000040.00000400.00020000.00000000.sdmpfalse
                                  high
                                  http://us2.smtp.mailhostbox.comnuevo orden.exe, 00000005.00000002.3421733340.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3422052551.0000000002C47000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3421195838.0000000002EAD000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namenuevo orden.exe, 00000000.00000002.2196528166.0000000002A0B000.00000004.00000800.00020000.00000000.sdmp, nuevo orden.exe, 00000005.00000002.3421733340.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000006.00000002.2319147071.00000000028BB000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3422052551.0000000002BFC000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000009.00000002.2396410946.000000000269E000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3421195838.0000000002E51000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://ip-api.com/line/?fields=hostingJZUHFqcY.exe, 0000000A.00000002.3418014149.00000000012A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://tempuri.org/DataSet1.xsdnuevo orden.exe, ZUHFqcY.exe.5.drfalse
                                          high
                                          http://ip-api.comnuevo orden.exe, 00000005.00000002.3421733340.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 00000007.00000002.3422052551.0000000002BFC000.00000004.00000800.00020000.00000000.sdmp, ZUHFqcY.exe, 0000000A.00000002.3421195838.0000000002E51000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            208.95.112.1
                                            ip-api.comUnited States
                                            53334TUT-ASUSfalse
                                            208.91.199.224
                                            us2.smtp.mailhostbox.comUnited States
                                            394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1555015
                                            Start date and time:2024-11-13 10:26:09 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 7m 32s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:12
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:nuevo orden.exe
                                            Detection:MAL
                                            Classification:mal100.troj.spyw.evad.winEXE@12/9@2/2
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 99%
                                            • Number of executed functions: 120
                                            • Number of non-executed functions: 13
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size getting too big, too many NtCreateKey calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • VT rate limit hit for: nuevo orden.exe
                                            TimeTypeDescription
                                            04:27:05API Interceptor29x Sleep call for process: nuevo orden.exe modified
                                            04:27:07API Interceptor11x Sleep call for process: powershell.exe modified
                                            04:27:18API Interceptor55x Sleep call for process: ZUHFqcY.exe modified
                                            10:27:09AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ZUHFqcY C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                            10:27:17AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ZUHFqcY C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            208.95.112.1transferencia interbancaria_867897870877.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                            • ip-api.com/line/?fields=hosting
                                            INV & BANK DETAILS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • ip-api.com/line/?fields=hosting
                                            Halkbank_Ekstre.exeGet hashmaliciousAgentTeslaBrowse
                                            • ip-api.com/line/?fields=hosting
                                            dens.exeGet hashmaliciousPython Stealer, Exela Stealer, Waltuhium GrabberBrowse
                                            • ip-api.com/json
                                            Sipari_.exeGet hashmaliciousAgentTeslaBrowse
                                            • ip-api.com/line/?fields=hosting
                                            IgTdifcj7HukYrd.exeGet hashmaliciousAgentTeslaBrowse
                                            • ip-api.com/line/?fields=hosting
                                            Orden de Compra No. 434565344657.exeGet hashmaliciousAgentTeslaBrowse
                                            • ip-api.com/line/?fields=hosting
                                            Pr6Fu6VZK3.exeGet hashmaliciousUnknownBrowse
                                            • ip-api.com/line/
                                            Pr6Fu6VZK3.exeGet hashmaliciousUnknownBrowse
                                            • ip-api.com/line/
                                            #U0416#U0430#U0440#U043a#U043e#U0432#U0430 .exeGet hashmaliciousBlank Grabber, Creal StealerBrowse
                                            • ip-api.com/line/?fields=hosting
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            ip-api.comtransferencia interbancaria_867897870877.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            INV & BANK DETAILS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 208.95.112.1
                                            Halkbank_Ekstre.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            dens.exeGet hashmaliciousPython Stealer, Exela Stealer, Waltuhium GrabberBrowse
                                            • 208.95.112.1
                                            Sipari_.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            IgTdifcj7HukYrd.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            Orden de Compra No. 434565344657.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            Pr6Fu6VZK3.exeGet hashmaliciousUnknownBrowse
                                            • 208.95.112.1
                                            Pr6Fu6VZK3.exeGet hashmaliciousUnknownBrowse
                                            • 208.95.112.1
                                            #U0416#U0430#U0440#U043a#U043e#U0432#U0430 .exeGet hashmaliciousBlank Grabber, Creal StealerBrowse
                                            • 208.95.112.1
                                            us2.smtp.mailhostbox.comLpjrd6Wxad.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 208.91.198.143
                                            REnBTVfW8q.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 208.91.199.223
                                            ulf4JrCRk2.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 208.91.199.223
                                            Nt8BLNLKN7.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 208.91.199.223
                                            copto de pago.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.91.199.224
                                            SecuriteInfo.com.BackDoor.AgentTeslaNET.20.5206.2075.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 208.91.199.223
                                            Proforma Invoice_21-1541 And Packing List.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 208.91.199.223
                                            Tax Invoice 103505.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 208.91.199.224
                                            PO.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.91.199.223
                                            Purchase_Order.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.91.198.143
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            TUT-ASUStransferencia interbancaria_867897870877.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            INV & BANK DETAILS.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 208.95.112.1
                                            Halkbank_Ekstre.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            dens.exeGet hashmaliciousPython Stealer, Exela Stealer, Waltuhium GrabberBrowse
                                            • 208.95.112.1
                                            Sipari_.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            https://t.ly/SjDNXGet hashmaliciousPython Stealer, BraodoBrowse
                                            • 208.95.112.1
                                            IgTdifcj7HukYrd.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            Orden de Compra No. 434565344657.exeGet hashmaliciousAgentTeslaBrowse
                                            • 208.95.112.1
                                            Pr6Fu6VZK3.exeGet hashmaliciousUnknownBrowse
                                            • 208.95.112.1
                                            Pr6Fu6VZK3.exeGet hashmaliciousUnknownBrowse
                                            • 208.95.112.1
                                            PUBLIC-DOMAIN-REGISTRYUSPO ALJAT-5804-2024.exeGet hashmaliciousAgentTeslaBrowse
                                            • 199.79.62.115
                                            INQ#84790.exeGet hashmaliciousAgentTeslaBrowse
                                            • 199.79.62.115
                                            https://u34251876.ct.sendgrid.net/ls/click?upn=u001.ordJ57g0HVndDa8Km-2BVUUFN1eIn5tdzIxrKbgsGfF9eVdl7b-2Fab-2BrUBdfIXH9yijR5LLM7kgivkgUI3nC3VajM00UDrq4ekI2XREqo0QmHcHyDyYWomvx9-2FHEtQ3o5rBM9AHzVSsjnwFSEJqic-2BEtw-3D-3DBxNa_qINdfz5Lp8EahgxJXfgGV-2Bk7caEgTUs2gtUTKNMgBkZ9mbVIMd-2B1UUN0TqdRRGrocW81C18onNWNx5Y6KM88Rr7odKCqMhALUPuUbXGlkOo01sEKeKdphXRhykHXKfSB-2By1s-2BNAgCL9-2BbtY8LNaKNV0sXQnlv-2F9fA-2BLZtaeadaVGHb32bFHhcOwS3ltfr2dig92MY6M8DrwwYiolgI1k4Q-3D-3DGet hashmaliciousUnknownBrowse
                                            • 216.10.246.48
                                            LPO24.0524.exeGet hashmaliciousAgentTeslaBrowse
                                            • 199.79.62.115
                                            MJ5bO7kS7j.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 208.91.198.107
                                            xxTupY4Fr3.xlsxGet hashmaliciousUnknownBrowse
                                            • 207.174.214.153
                                            xz8lxAetNu.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 119.18.54.39
                                            Lpjrd6Wxad.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 208.91.198.143
                                            w6dnPra4mx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 162.251.80.30
                                            05.11.241591883_UyeIsyeriCalismanKosullari.xlxs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 119.18.54.39
                                            No context
                                            No context
                                            Process:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1415
                                            Entropy (8bit):5.352427679901606
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPE4KMRuAE4KzecKIE4oKNzKorE4x84j:MIHK5HKH1qHiYHKh3oPHKMRuAHKzectP
                                            MD5:3978978DE913FD1C068312697D6E5917
                                            SHA1:1DABBE7FB8F38F6EBF474CE5F0ECAA89F48E2538
                                            SHA-256:33B7B1668DDD3AB39711F9F93B667F6F2F674348A79228BFA163BA625B37F120
                                            SHA-512:78694B97F5D03758F503155E5CE5B85AABDF9690F0DFBC51FCE9926BE2D86BCF99E008659420F1E8489A7F6EA125F2776D4C6DC4B151566B529454512352953D
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Data\1b8c564fd69668e6e62d136259980d9e\System.Data.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll"
                                            Process:C:\Users\user\Desktop\nuevo orden.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1415
                                            Entropy (8bit):5.352427679901606
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPE4KMRuAE4KzecKIE4oKNzKorE4x84j:MIHK5HKH1qHiYHKh3oPHKMRuAHKzectP
                                            MD5:3978978DE913FD1C068312697D6E5917
                                            SHA1:1DABBE7FB8F38F6EBF474CE5F0ECAA89F48E2538
                                            SHA-256:33B7B1668DDD3AB39711F9F93B667F6F2F674348A79228BFA163BA625B37F120
                                            SHA-512:78694B97F5D03758F503155E5CE5B85AABDF9690F0DFBC51FCE9926BE2D86BCF99E008659420F1E8489A7F6EA125F2776D4C6DC4B151566B529454512352953D
                                            Malicious:true
                                            Reputation:moderate, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Data\1b8c564fd69668e6e62d136259980d9e\System.Data.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll"
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):1172
                                            Entropy (8bit):5.354777075714867
                                            Encrypted:false
                                            SSDEEP:24:3gWSKco4KmZjKbm51s4RPT6moUebIKo+mZ9t7J0gt/NKIl9r+q:QWSU4xymI4RfoUeW+mZ9tK8ND3
                                            MD5:0CBD5C86CC1353C7EF09E2ED3E0829E3
                                            SHA1:0FFE29A715ED1E32BB9491D3DD88FB72280ED040
                                            SHA-256:B7A6D1B47CEA0A5084460775416103112E56A7A423216183ABAC974960FD51E7
                                            SHA-512:C60EC6550188DCCD1EAD93CC49011BAC45134426ADEF81410468A1F613AD8F2E67AEF296F5C92092A62BFAC746FCA9DC8741FEC5600996F28A48BF2488E94D40
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview:@...e.................................,..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Users\user\Desktop\nuevo orden.exe
                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):708096
                                            Entropy (8bit):7.93950181377389
                                            Encrypted:false
                                            SSDEEP:12288:q5/TyEluCIzXI+1jessAS3qi6A3xfwCgnac4zFC6:q5/uElunIIje0C53BwlnacW
                                            MD5:1AF621550628EE8ACE6EA7C6AFEFB0FE
                                            SHA1:0C06B92BE85B5810E75709B307EF28DF4A5623BB
                                            SHA-256:D097AECE3AFAF2EEAFCE3FEA88DC99E98EF31465BB9216FBC4BBC0C649DEA94C
                                            SHA-512:8AE4A8EE8971080DADAB59C56C694D7DA3D9552844CE0A61D27B16A43D7F1F52807FB63082640B76FCD0E2B1DA52C02B33B0B688DD699F5B9047435493715B06
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 55%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}u3g..............0......&......b.... ........@.. .......................@............`.....................................O........#................... ......p...T............................................ ............... ..H............text...h.... ...................... ..`.rsrc....#.......$..................@..@.reloc....... ......................@..B................D.......H........R...x...........................................................0..]........s....}.....r...p}.....r...p}.....(.....(.....{.....o.....{.....o.....{...........s"...o....*6..o....(....*..0...........r!..p(....-..rm..p(....--.r...p(....->+X.{.....}.....{....r...po....+:.{.....}.....{....r...po....+..{.....}.....{....rq..po.....{.....{....o....*..0...........{......E............&...+4.{....r...po....+".{....r...po....+..{....rq..po.....{......E............#...*.{....r&..p
                                            Process:C:\Users\user\Desktop\nuevo orden.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):26
                                            Entropy (8bit):3.95006375643621
                                            Encrypted:false
                                            SSDEEP:3:ggPYV:rPYV
                                            MD5:187F488E27DB4AF347237FE461A079AD
                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                            Malicious:true
                                            Preview:[ZoneTransfer]....ZoneId=0
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.93950181377389
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            • DOS Executable Generic (2002/1) 0.01%
                                            File name:nuevo orden.exe
                                            File size:708'096 bytes
                                            MD5:1af621550628ee8ace6ea7c6afefb0fe
                                            SHA1:0c06b92be85b5810e75709b307ef28df4a5623bb
                                            SHA256:d097aece3afaf2eeafce3fea88dc99e98ef31465bb9216fbc4bbc0c649dea94c
                                            SHA512:8ae4a8ee8971080dadab59c56c694d7da3d9552844ce0a61d27b16a43d7f1f52807fb63082640b76fcd0e2b1da52c02b33b0b688dd699f5b9047435493715b06
                                            SSDEEP:12288:q5/TyEluCIzXI+1jessAS3qi6A3xfwCgnac4zFC6:q5/uElunIIje0C53BwlnacW
                                            TLSH:26E4029032D88D37C27A13346A35A008A6F340675538D2A5FDDE7A5F1F7BB521263BA3
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}u3g..............0......&......b.... ........@.. .......................@............`................................
                                            Icon Hash:33f8e8cef4719964
                                            Entrypoint:0x4ac562
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x6733757D [Tue Nov 12 15:34:21 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xac5100x4f.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xae0000x23d4.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xb20000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xaa3700x54.text
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000xaa5680xaa6002f3661bd338473e0b0ec0db6b9c2d782False0.9285955841892883data7.945028236511907IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rsrc0xae0000x23d40x2400c60516e43cc06ae55aae63f01792b462False0.9021267361111112data7.620131830534139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xb20000xc0x200a5e551b7932ef2bae44ee80b36942559False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0xae0c80x1fdaPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9612460142261466
                                            RT_GROUP_ICON0xb00b40x14data1.05
                                            RT_VERSION0xb00d80x2f8data0.4473684210526316
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2024-11-13T10:27:24.083031+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.649785TCP
                                            2024-11-13T10:28:02.316167+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.649993TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Nov 13, 2024 10:27:08.255013943 CET4971480192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:27:08.260045052 CET8049714208.95.112.1192.168.2.6
                                            Nov 13, 2024 10:27:08.260122061 CET4971480192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:27:08.260946989 CET4971480192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:27:08.266015053 CET8049714208.95.112.1192.168.2.6
                                            Nov 13, 2024 10:27:08.854911089 CET8049714208.95.112.1192.168.2.6
                                            Nov 13, 2024 10:27:08.909975052 CET4971480192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:27:09.519921064 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:09.524945974 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:09.525036097 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:10.375308037 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:10.376214981 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:10.381109953 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:10.531347036 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:10.531672955 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:10.536567926 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:10.686549902 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:10.697129011 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:10.702028036 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:10.852154970 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:10.852185965 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:10.852196932 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:10.852206945 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:10.852241039 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:10.852272987 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:10.884828091 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:10.925584078 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:10.934262991 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:10.939264059 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:11.267261982 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:11.283376932 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:11.288331985 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:11.447263002 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:11.448168993 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:11.453882933 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:11.610460043 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:11.610825062 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:11.615781069 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:11.772150993 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:11.772452116 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:11.777266026 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:11.929075956 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:11.929536104 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:11.934477091 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:12.116233110 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:12.116492987 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:12.121375084 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:12.272085905 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:12.272886038 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:12.273000956 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:12.273086071 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:12.273113012 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:12.277776957 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:12.277854919 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:12.277867079 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:12.277892113 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:12.571400881 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:12.613101959 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:19.924964905 CET4977380192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:27:19.930092096 CET8049773208.95.112.1192.168.2.6
                                            Nov 13, 2024 10:27:19.930176020 CET4977380192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:27:19.930484056 CET4977380192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:27:19.935332060 CET8049773208.95.112.1192.168.2.6
                                            Nov 13, 2024 10:27:20.564347029 CET8049773208.95.112.1192.168.2.6
                                            Nov 13, 2024 10:27:20.613080978 CET4977380192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:27:21.400636911 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:21.405637026 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:21.405770063 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:21.970335007 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:21.970717907 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:21.975632906 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.124262094 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.124491930 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:22.129407883 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.277900934 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.290393114 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:22.295214891 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.443720102 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.443777084 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.443802118 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.443844080 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:22.443866968 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.443877935 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.444353104 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:22.476517916 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.476608038 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:22.478117943 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:22.482907057 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.631886005 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.645287037 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:22.650245905 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.799143076 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.799582958 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:22.804482937 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.956587076 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:22.957190990 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:22.962234020 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:23.122371912 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:23.122757912 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:23.128587961 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:23.280128002 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:23.280755997 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:23.285629034 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:23.461602926 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:23.461915016 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:23.466845989 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:23.824893951 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:23.825768948 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:23.825768948 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:23.825819969 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:23.825819969 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:24.036386013 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:24.081394911 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:24.081461906 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:24.081702948 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:24.081866026 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:24.082556963 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:24.082571983 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:24.082585096 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:24.082597971 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:24.082942963 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:24.359585047 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:24.410403967 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:27.740410089 CET4981480192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:27:27.745284081 CET8049814208.95.112.1192.168.2.6
                                            Nov 13, 2024 10:27:27.745402098 CET4981480192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:27:27.745681047 CET4981480192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:27:27.750643015 CET8049814208.95.112.1192.168.2.6
                                            Nov 13, 2024 10:27:28.363729000 CET8049814208.95.112.1192.168.2.6
                                            Nov 13, 2024 10:27:28.409996033 CET4981480192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:27:28.924904108 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:28.930202961 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:28.930532932 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:29.505944014 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:29.506447077 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:29.511557102 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:29.667036057 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:29.667287111 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:29.673857927 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:29.822175026 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:29.826100111 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:29.831049919 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:29.981101036 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:29.981122017 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:29.981133938 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:29.981148958 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:29.981232882 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:29.981271982 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:30.013190031 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:30.014775991 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:30.019701004 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:30.169986963 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:30.182995081 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:30.188112020 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:30.337498903 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:30.337904930 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:30.342868090 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:30.495165110 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:30.495527029 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:30.500818014 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:30.655458927 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:30.655771971 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:30.660698891 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:30.813353062 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:30.813617945 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:30.818686008 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:30.997155905 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:30.997395039 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:31.002728939 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:31.153853893 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:31.154689074 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:31.154768944 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:31.154797077 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:31.154819012 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:31.161035061 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:31.161046028 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:31.638510942 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:31.668343067 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:27:31.668438911 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:27:41.998137951 CET8049714208.95.112.1192.168.2.6
                                            Nov 13, 2024 10:27:41.998243093 CET4971480192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:27:57.304924011 CET8049773208.95.112.1192.168.2.6
                                            Nov 13, 2024 10:27:57.305063963 CET4977380192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:27:59.519629002 CET4971480192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:27:59.524645090 CET8049714208.95.112.1192.168.2.6
                                            Nov 13, 2024 10:28:02.670169115 CET8049814208.95.112.1192.168.2.6
                                            Nov 13, 2024 10:28:02.670298100 CET4981480192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:28:11.410315037 CET4977380192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:28:11.415360928 CET8049773208.95.112.1192.168.2.6
                                            Nov 13, 2024 10:28:18.926074028 CET4981480192.168.2.6208.95.112.1
                                            Nov 13, 2024 10:28:18.931919098 CET8049814208.95.112.1192.168.2.6
                                            Nov 13, 2024 10:28:49.535414934 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:28:49.540811062 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:28:49.691485882 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:28:49.691766024 CET58749715208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:28:49.691823959 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:28:49.696846962 CET49715587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:29:01.426139116 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:29:01.431282043 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:29:01.580173016 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:29:01.580653906 CET58749780208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:29:01.580715895 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:29:01.583903074 CET49780587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:29:08.941601992 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:29:08.946679115 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:29:09.097208023 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:29:09.097234011 CET58749825208.91.199.224192.168.2.6
                                            Nov 13, 2024 10:29:09.097604990 CET49825587192.168.2.6208.91.199.224
                                            Nov 13, 2024 10:29:09.102421999 CET49825587192.168.2.6208.91.199.224
                                            TimestampSource PortDest PortSource IPDest IP
                                            Nov 13, 2024 10:27:08.239479065 CET5199853192.168.2.61.1.1.1
                                            Nov 13, 2024 10:27:08.246428013 CET53519981.1.1.1192.168.2.6
                                            Nov 13, 2024 10:27:09.509762049 CET5666153192.168.2.61.1.1.1
                                            Nov 13, 2024 10:27:09.518619061 CET53566611.1.1.1192.168.2.6
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Nov 13, 2024 10:27:08.239479065 CET192.168.2.61.1.1.10xa11cStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                            Nov 13, 2024 10:27:09.509762049 CET192.168.2.61.1.1.10x33bStandard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Nov 13, 2024 10:27:08.246428013 CET1.1.1.1192.168.2.60xa11cNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                            Nov 13, 2024 10:27:09.518619061 CET1.1.1.1192.168.2.60x33bNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                            Nov 13, 2024 10:27:09.518619061 CET1.1.1.1192.168.2.60x33bNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                            Nov 13, 2024 10:27:09.518619061 CET1.1.1.1192.168.2.60x33bNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                            Nov 13, 2024 10:27:09.518619061 CET1.1.1.1192.168.2.60x33bNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                            • ip-api.com
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.649714208.95.112.1806256C:\Users\user\Desktop\nuevo orden.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 13, 2024 10:27:08.260946989 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                            Host: ip-api.com
                                            Connection: Keep-Alive
                                            Nov 13, 2024 10:27:08.854911089 CET174INHTTP/1.1 200 OK
                                            Date: Wed, 13 Nov 2024 09:27:07 GMT
                                            Content-Type: text/plain; charset=utf-8
                                            Content-Length: 5
                                            Access-Control-Allow-Origin: *
                                            X-Ttl: 60
                                            X-Rl: 44
                                            Data Raw: 74 72 75 65 0a
                                            Data Ascii: true


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.649773208.95.112.1805268C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 13, 2024 10:27:19.930484056 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                            Host: ip-api.com
                                            Connection: Keep-Alive
                                            Nov 13, 2024 10:27:20.564347029 CET174INHTTP/1.1 200 OK
                                            Date: Wed, 13 Nov 2024 09:27:19 GMT
                                            Content-Type: text/plain; charset=utf-8
                                            Content-Length: 5
                                            Access-Control-Allow-Origin: *
                                            X-Ttl: 60
                                            X-Rl: 44
                                            Data Raw: 74 72 75 65 0a
                                            Data Ascii: true


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.649814208.95.112.1805344C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                            TimestampBytes transferredDirectionData
                                            Nov 13, 2024 10:27:27.745681047 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                            Host: ip-api.com
                                            Connection: Keep-Alive
                                            Nov 13, 2024 10:27:28.363729000 CET174INHTTP/1.1 200 OK
                                            Date: Wed, 13 Nov 2024 09:27:27 GMT
                                            Content-Type: text/plain; charset=utf-8
                                            Content-Length: 5
                                            Access-Control-Allow-Origin: *
                                            X-Ttl: 40
                                            X-Rl: 43
                                            Data Raw: 74 72 75 65 0a
                                            Data Ascii: true


                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Nov 13, 2024 10:27:10.375308037 CET58749715208.91.199.224192.168.2.6220 us2.outbound.mailhostbox.com ESMTP Postfix
                                            Nov 13, 2024 10:27:10.376214981 CET49715587192.168.2.6208.91.199.224EHLO 377142
                                            Nov 13, 2024 10:27:10.531347036 CET58749715208.91.199.224192.168.2.6250-us2.outbound.mailhostbox.com
                                            250-PIPELINING
                                            250-SIZE 41648128
                                            250-VRFY
                                            250-ETRN
                                            250-STARTTLS
                                            250-AUTH PLAIN LOGIN
                                            250-AUTH=PLAIN LOGIN
                                            250-ENHANCEDSTATUSCODES
                                            250-8BITMIME
                                            250-DSN
                                            250 CHUNKING
                                            Nov 13, 2024 10:27:10.531672955 CET49715587192.168.2.6208.91.199.224STARTTLS
                                            Nov 13, 2024 10:27:10.686549902 CET58749715208.91.199.224192.168.2.6220 2.0.0 Ready to start TLS
                                            Nov 13, 2024 10:27:21.970335007 CET58749780208.91.199.224192.168.2.6220 us2.outbound.mailhostbox.com ESMTP Postfix
                                            Nov 13, 2024 10:27:21.970717907 CET49780587192.168.2.6208.91.199.224EHLO 377142
                                            Nov 13, 2024 10:27:22.124262094 CET58749780208.91.199.224192.168.2.6250-us2.outbound.mailhostbox.com
                                            250-PIPELINING
                                            250-SIZE 41648128
                                            250-VRFY
                                            250-ETRN
                                            250-STARTTLS
                                            250-AUTH PLAIN LOGIN
                                            250-AUTH=PLAIN LOGIN
                                            250-ENHANCEDSTATUSCODES
                                            250-8BITMIME
                                            250-DSN
                                            250 CHUNKING
                                            Nov 13, 2024 10:27:22.124491930 CET49780587192.168.2.6208.91.199.224STARTTLS
                                            Nov 13, 2024 10:27:22.277900934 CET58749780208.91.199.224192.168.2.6220 2.0.0 Ready to start TLS
                                            Nov 13, 2024 10:27:29.505944014 CET58749825208.91.199.224192.168.2.6220 us2.outbound.mailhostbox.com ESMTP Postfix
                                            Nov 13, 2024 10:27:29.506447077 CET49825587192.168.2.6208.91.199.224EHLO 377142
                                            Nov 13, 2024 10:27:29.667036057 CET58749825208.91.199.224192.168.2.6250-us2.outbound.mailhostbox.com
                                            250-PIPELINING
                                            250-SIZE 41648128
                                            250-VRFY
                                            250-ETRN
                                            250-STARTTLS
                                            250-AUTH PLAIN LOGIN
                                            250-AUTH=PLAIN LOGIN
                                            250-ENHANCEDSTATUSCODES
                                            250-8BITMIME
                                            250-DSN
                                            250 CHUNKING
                                            Nov 13, 2024 10:27:29.667287111 CET49825587192.168.2.6208.91.199.224STARTTLS
                                            Nov 13, 2024 10:27:29.822175026 CET58749825208.91.199.224192.168.2.6220 2.0.0 Ready to start TLS

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:04:27:04
                                            Start date:13/11/2024
                                            Path:C:\Users\user\Desktop\nuevo orden.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\nuevo orden.exe"
                                            Imagebase:0x670000
                                            File size:708'096 bytes
                                            MD5 hash:1AF621550628EE8ACE6EA7C6AFEFB0FE
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2198129748.00000000039B8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2198129748.00000000039B8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:3
                                            Start time:04:27:05
                                            Start date:13/11/2024
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nuevo orden.exe"
                                            Imagebase:0xa30000
                                            File size:433'152 bytes
                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:04:27:05
                                            Start date:13/11/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff66e660000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:5
                                            Start time:04:27:05
                                            Start date:13/11/2024
                                            Path:C:\Users\user\Desktop\nuevo orden.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\nuevo orden.exe"
                                            Imagebase:0xa40000
                                            File size:708'096 bytes
                                            MD5 hash:1AF621550628EE8ACE6EA7C6AFEFB0FE
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.3421733340.0000000002F5B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.3421733340.0000000002F37000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.3421733340.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.3421733340.0000000002F11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Target ID:6
                                            Start time:04:27:17
                                            Start date:13/11/2024
                                            Path:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                                            Imagebase:0x4e0000
                                            File size:708'096 bytes
                                            MD5 hash:1AF621550628EE8ACE6EA7C6AFEFB0FE
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 55%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Target ID:7
                                            Start time:04:27:18
                                            Start date:13/11/2024
                                            Path:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                                            Imagebase:0x650000
                                            File size:708'096 bytes
                                            MD5 hash:1AF621550628EE8ACE6EA7C6AFEFB0FE
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.3422052551.0000000002C47000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.3422052551.0000000002C36000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.3422052551.0000000002C6B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.3415403340.000000000042D000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.3415403340.000000000042D000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Target ID:9
                                            Start time:04:27:25
                                            Start date:13/11/2024
                                            Path:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                                            Imagebase:0x2a0000
                                            File size:708'096 bytes
                                            MD5 hash:1AF621550628EE8ACE6EA7C6AFEFB0FE
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:10
                                            Start time:04:27:26
                                            Start date:13/11/2024
                                            Path:C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Roaming\ZUHFqcY\ZUHFqcY.exe"
                                            Imagebase:0xa00000
                                            File size:708'096 bytes
                                            MD5 hash:1AF621550628EE8ACE6EA7C6AFEFB0FE
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.3421195838.0000000002EA7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.3421195838.0000000002ECB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.3421195838.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.3421195838.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:9.2%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:3.8%
                                              Total number of Nodes:237
                                              Total number of Limit Nodes:8
                                              execution_graph 29193 6f2ee32 29194 6f2eecc 29193->29194 29195 6f2edc6 29193->29195 29196 6f2eddb 29195->29196 29200 6f2fc68 29195->29200 29217 6f2fcce 29195->29217 29235 6f2fc58 29195->29235 29201 6f2fc82 29200->29201 29252 7890456 29201->29252 29257 78903f6 29201->29257 29265 78906f7 29201->29265 29269 7890859 29201->29269 29273 78902e7 29201->29273 29277 7890007 29201->29277 29283 7890105 29201->29283 29289 78908a3 29201->29289 29296 7890980 29201->29296 29300 7890040 29201->29300 29306 789056f 29201->29306 29311 78900ef 29201->29311 29316 789038b 29201->29316 29321 78907a9 29201->29321 29202 6f2fc8a 29202->29195 29218 6f2fcd1 29217->29218 29219 6f2fc5c 29217->29219 29218->29195 29221 78907a9 2 API calls 29219->29221 29222 789038b 2 API calls 29219->29222 29223 78900ef 2 API calls 29219->29223 29224 789056f 2 API calls 29219->29224 29225 7890040 2 API calls 29219->29225 29226 7890980 2 API calls 29219->29226 29227 78908a3 4 API calls 29219->29227 29228 7890105 2 API calls 29219->29228 29229 7890007 2 API calls 29219->29229 29230 78902e7 2 API calls 29219->29230 29231 7890859 2 API calls 29219->29231 29232 78906f7 2 API calls 29219->29232 29233 78903f6 4 API calls 29219->29233 29234 7890456 2 API calls 29219->29234 29220 6f2fc8a 29220->29195 29221->29220 29222->29220 29223->29220 29224->29220 29225->29220 29226->29220 29227->29220 29228->29220 29229->29220 29230->29220 29231->29220 29232->29220 29233->29220 29234->29220 29236 6f2fc5c 29235->29236 29238 78907a9 2 API calls 29236->29238 29239 789038b 2 API calls 29236->29239 29240 78900ef 2 API calls 29236->29240 29241 789056f 2 API calls 29236->29241 29242 7890040 2 API calls 29236->29242 29243 7890980 2 API calls 29236->29243 29244 78908a3 4 API calls 29236->29244 29245 7890105 2 API calls 29236->29245 29246 7890007 2 API calls 29236->29246 29247 78902e7 2 API calls 29236->29247 29248 7890859 2 API calls 29236->29248 29249 78906f7 2 API calls 29236->29249 29250 78903f6 4 API calls 29236->29250 29251 7890456 2 API calls 29236->29251 29237 6f2fc8a 29237->29195 29238->29237 29239->29237 29240->29237 29241->29237 29242->29237 29243->29237 29244->29237 29245->29237 29246->29237 29247->29237 29248->29237 29249->29237 29250->29237 29251->29237 29253 7890394 29252->29253 29325 6f2e2f0 29253->29325 29329 6f2e2e8 29253->29329 29254 7890a14 29258 7890518 29257->29258 29259 789052b 29257->29259 29263 6f2e2f0 WriteProcessMemory 29258->29263 29264 6f2e2e8 WriteProcessMemory 29258->29264 29333 6f2e230 29259->29333 29337 6f2e228 29259->29337 29260 7890961 29263->29260 29264->29260 29267 6f2e2f0 WriteProcessMemory 29265->29267 29268 6f2e2e8 WriteProcessMemory 29265->29268 29266 7890725 29267->29266 29268->29266 29341 6f2e810 29269->29341 29345 6f2e818 29269->29345 29270 7890884 29274 78902f4 29273->29274 29349 6f2e0a0 29274->29349 29353 6f2e0a8 29274->29353 29278 7890028 29277->29278 29279 7890133 29278->29279 29357 6f2e9b0 29278->29357 29361 6f2e9a4 29278->29361 29279->29202 29284 78900f8 29283->29284 29285 7890133 29284->29285 29287 6f2e9b0 CreateProcessA 29284->29287 29288 6f2e9a4 CreateProcessA 29284->29288 29285->29202 29286 78901fd 29286->29202 29287->29286 29288->29286 29290 78908b0 29289->29290 29291 78908f7 29289->29291 29365 6f2e152 29290->29365 29369 6f2e158 29290->29369 29292 6f2e0a0 ResumeThread 29291->29292 29293 6f2e0a8 ResumeThread 29291->29293 29292->29291 29293->29291 29297 7890986 29296->29297 29298 6f2e0a0 ResumeThread 29297->29298 29299 6f2e0a8 ResumeThread 29297->29299 29298->29297 29299->29297 29302 7890073 29300->29302 29301 7890133 29301->29202 29302->29301 29304 6f2e9b0 CreateProcessA 29302->29304 29305 6f2e9a4 CreateProcessA 29302->29305 29303 78901fd 29303->29202 29304->29303 29305->29303 29307 7890518 29306->29307 29309 6f2e2f0 WriteProcessMemory 29307->29309 29310 6f2e2e8 WriteProcessMemory 29307->29310 29308 7890961 29309->29308 29310->29308 29312 78900f8 29311->29312 29314 6f2e9b0 CreateProcessA 29312->29314 29315 6f2e9a4 CreateProcessA 29312->29315 29313 78901fd 29313->29202 29314->29313 29315->29313 29317 78909f0 29316->29317 29319 6f2e2f0 WriteProcessMemory 29317->29319 29320 6f2e2e8 WriteProcessMemory 29317->29320 29318 7890a14 29319->29318 29320->29318 29323 6f2e152 Wow64SetThreadContext 29321->29323 29324 6f2e158 Wow64SetThreadContext 29321->29324 29322 78907c3 29323->29322 29324->29322 29326 6f2e338 WriteProcessMemory 29325->29326 29328 6f2e38f 29326->29328 29328->29254 29330 6f2e2f0 WriteProcessMemory 29329->29330 29332 6f2e38f 29330->29332 29332->29254 29334 6f2e270 VirtualAllocEx 29333->29334 29336 6f2e2ad 29334->29336 29336->29258 29338 6f2e270 VirtualAllocEx 29337->29338 29340 6f2e2ad 29338->29340 29340->29258 29342 6f2e863 ReadProcessMemory 29341->29342 29344 6f2e8a7 29342->29344 29344->29270 29346 6f2e863 ReadProcessMemory 29345->29346 29348 6f2e8a7 29346->29348 29348->29270 29350 6f2e0a8 ResumeThread 29349->29350 29352 6f2e119 29350->29352 29352->29274 29354 6f2e0e8 ResumeThread 29353->29354 29356 6f2e119 29354->29356 29356->29274 29358 6f2e9b3 CreateProcessA 29357->29358 29360 6f2ebfb 29358->29360 29362 6f2e9a9 CreateProcessA 29361->29362 29364 6f2ebfb 29362->29364 29366 6f2e159 Wow64SetThreadContext 29365->29366 29368 6f2e1e5 29366->29368 29368->29291 29370 6f2e19d Wow64SetThreadContext 29369->29370 29372 6f2e1e5 29370->29372 29372->29291 29373 6f2f1f3 29374 6f2f1f7 29373->29374 29379 6f2fc68 12 API calls 29373->29379 29380 6f2fc58 12 API calls 29373->29380 29381 6f2fcce 12 API calls 29373->29381 29375 6f2f0cf 29374->29375 29376 6f2fc68 12 API calls 29374->29376 29377 6f2fc58 12 API calls 29374->29377 29378 6f2fcce 12 API calls 29374->29378 29376->29374 29377->29374 29378->29374 29379->29374 29380->29374 29381->29374 29382 7890f80 29383 789110b 29382->29383 29384 7890fa6 29382->29384 29384->29383 29387 78911f9 29384->29387 29390 7891200 PostMessageW 29384->29390 29388 7891200 PostMessageW 29387->29388 29389 789126c 29388->29389 29389->29384 29391 789126c 29390->29391 29391->29384 29392 2814528 29393 281452a 29392->29393 29396 28143d4 29393->29396 29395 281453e 29397 28143df 29396->29397 29400 28144b4 29397->29400 29399 2814925 29399->29395 29401 28144bf 29400->29401 29404 28144e4 29401->29404 29403 2814a15 29403->29399 29405 28144ef 29404->29405 29408 2814aa0 29405->29408 29407 2814f0a 29407->29403 29409 2814aab 29408->29409 29412 2814ad0 29409->29412 29411 2815014 29411->29407 29413 2814adb 29412->29413 29421 28179b8 29413->29421 29415 2817c98 29417 2817e83 29415->29417 29426 281a8b8 29415->29426 29416 2817ec1 29416->29411 29417->29416 29430 281c9b0 29417->29430 29435 281c9a0 29417->29435 29422 28179c3 29421->29422 29423 281948a 29422->29423 29440 28194d8 29422->29440 29444 28194e8 29422->29444 29423->29415 29448 281a8e0 29426->29448 29453 281a8f0 29426->29453 29427 281a8ce 29427->29417 29431 281c9d1 29430->29431 29432 281c9f5 29431->29432 29467 281cb51 29431->29467 29471 281cb60 29431->29471 29432->29416 29436 281c9d1 29435->29436 29437 281cb51 4 API calls 29436->29437 29438 281cb60 4 API calls 29436->29438 29439 281c9f5 29436->29439 29437->29439 29438->29439 29439->29416 29441 281952b 29440->29441 29442 2819536 KiUserCallbackDispatcher 29441->29442 29443 2819560 29441->29443 29442->29443 29443->29423 29445 281952b 29444->29445 29446 2819536 KiUserCallbackDispatcher 29445->29446 29447 2819560 29445->29447 29446->29447 29447->29423 29449 281a8f0 29448->29449 29457 281a9e8 29449->29457 29462 281a9da 29449->29462 29450 281a8ff 29450->29427 29455 281a9e8 GetModuleHandleW 29453->29455 29456 281a9da GetModuleHandleW 29453->29456 29454 281a8ff 29454->29427 29455->29454 29456->29454 29458 281aa1c 29457->29458 29459 281a9f9 29457->29459 29458->29450 29459->29458 29460 281ac20 GetModuleHandleW 29459->29460 29461 281ac4d 29460->29461 29461->29450 29463 281aa1c 29462->29463 29464 281a9f9 29462->29464 29463->29450 29464->29463 29465 281ac20 GetModuleHandleW 29464->29465 29466 281ac4d 29465->29466 29466->29450 29468 281cb6d 29467->29468 29469 281cba7 29468->29469 29475 281b3c0 29468->29475 29469->29432 29472 281cb6d 29471->29472 29473 281cba7 29472->29473 29474 281b3c0 4 API calls 29472->29474 29473->29432 29474->29473 29476 281b3cb 29475->29476 29478 281d8b8 29476->29478 29479 281ccc4 29476->29479 29478->29478 29480 281cccf 29479->29480 29481 2814ad0 4 API calls 29480->29481 29482 281d927 29481->29482 29482->29478 29483 281d078 29484 281d0be 29483->29484 29488 281d248 29484->29488 29491 281d258 29484->29491 29485 281d1ab 29494 281b3d0 29488->29494 29492 281d286 29491->29492 29493 281b3d0 DuplicateHandle 29491->29493 29492->29485 29493->29492 29495 281d2c0 DuplicateHandle 29494->29495 29496 281d286 29495->29496 29496->29485
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2203039179.0000000007890000.00000040.00000800.00020000.00000000.sdmp, Offset: 07890000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7890000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3b4c9e71b366a855b73376302fd6b7e5e685875d9350d26550a4a2e6773e910b
                                              • Instruction ID: 1320e4ee08ed5d859227ea53db18ae92ba6c8fe488c48709ecbe9090f8cdf92c
                                              • Opcode Fuzzy Hash: 3b4c9e71b366a855b73376302fd6b7e5e685875d9350d26550a4a2e6773e910b
                                              • Instruction Fuzzy Hash: E9328CB4B012059FDB19DFA9D854BAEBBF6AF89300F184069E506DB3A0CB35ED01CB51
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2203039179.0000000007890000.00000040.00000800.00020000.00000000.sdmp, Offset: 07890000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7890000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 60f69fa2441c77f47c4a28a691578ad5351eb878c6472e5140a1701aa813254e
                                              • Instruction ID: 22b435f68d3646029018a720e24fca7ec1b6a81497b20e3b229a03861a327507
                                              • Opcode Fuzzy Hash: 60f69fa2441c77f47c4a28a691578ad5351eb878c6472e5140a1701aa813254e
                                              • Instruction Fuzzy Hash: C07127B1D0522ECBEF64CF66CC407E9BBB6BF99304F1491AAD509A6244EB705AC5CF40

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 6f2e9a4-6f2ea45 6 6f2ea47-6f2ea51 0->6 7 6f2ea7e-6f2ea9e 0->7 6->7 8 6f2ea53-6f2ea55 6->8 14 6f2eaa0-6f2eaaa 7->14 15 6f2ead7-6f2eb06 7->15 9 6f2ea57-6f2ea61 8->9 10 6f2ea78-6f2ea7b 8->10 12 6f2ea63 9->12 13 6f2ea65-6f2ea74 9->13 10->7 12->13 13->13 17 6f2ea76 13->17 14->15 16 6f2eaac-6f2eaae 14->16 23 6f2eb08-6f2eb12 15->23 24 6f2eb3f-6f2ebf9 CreateProcessA 15->24 18 6f2eab0-6f2eaba 16->18 19 6f2ead1-6f2ead4 16->19 17->10 21 6f2eabe-6f2eacd 18->21 22 6f2eabc 18->22 19->15 21->21 25 6f2eacf 21->25 22->21 23->24 26 6f2eb14-6f2eb16 23->26 35 6f2ec02-6f2ec88 24->35 36 6f2ebfb-6f2ec01 24->36 25->19 28 6f2eb18-6f2eb22 26->28 29 6f2eb39-6f2eb3c 26->29 30 6f2eb26-6f2eb35 28->30 31 6f2eb24 28->31 29->24 30->30 33 6f2eb37 30->33 31->30 33->29 46 6f2ec8a-6f2ec8e 35->46 47 6f2ec98-6f2ec9c 35->47 36->35 46->47 48 6f2ec90 46->48 49 6f2ec9e-6f2eca2 47->49 50 6f2ecac-6f2ecb0 47->50 48->47 49->50 51 6f2eca4 49->51 52 6f2ecb2-6f2ecb6 50->52 53 6f2ecc0-6f2ecc4 50->53 51->50 52->53 56 6f2ecb8 52->56 54 6f2ecd6-6f2ecdd 53->54 55 6f2ecc6-6f2eccc 53->55 57 6f2ecf4 54->57 58 6f2ecdf-6f2ecee 54->58 55->54 56->53 60 6f2ecf5 57->60 58->57 60->60
                                              APIs
                                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 06F2EBE6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: 9e946562854f6acc73186da7ca2afe3b7cce9cf876451e529ee380038570a2dc
                                              • Instruction ID: 6502b0c41350b60e32dfdeb9e8f89cc488a73697a02c07235d1c76ddc4162236
                                              • Opcode Fuzzy Hash: 9e946562854f6acc73186da7ca2afe3b7cce9cf876451e529ee380038570a2dc
                                              • Instruction Fuzzy Hash: C6A13C71D0062ADFEF64CFA8C8417EDBBB2BF48710F1485A9E809A7240DB749985CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 61 6f2e9b0-6f2ea45 64 6f2ea47-6f2ea51 61->64 65 6f2ea7e-6f2ea9e 61->65 64->65 66 6f2ea53-6f2ea55 64->66 72 6f2eaa0-6f2eaaa 65->72 73 6f2ead7-6f2eb06 65->73 67 6f2ea57-6f2ea61 66->67 68 6f2ea78-6f2ea7b 66->68 70 6f2ea63 67->70 71 6f2ea65-6f2ea74 67->71 68->65 70->71 71->71 75 6f2ea76 71->75 72->73 74 6f2eaac-6f2eaae 72->74 81 6f2eb08-6f2eb12 73->81 82 6f2eb3f-6f2ebf9 CreateProcessA 73->82 76 6f2eab0-6f2eaba 74->76 77 6f2ead1-6f2ead4 74->77 75->68 79 6f2eabe-6f2eacd 76->79 80 6f2eabc 76->80 77->73 79->79 83 6f2eacf 79->83 80->79 81->82 84 6f2eb14-6f2eb16 81->84 93 6f2ec02-6f2ec88 82->93 94 6f2ebfb-6f2ec01 82->94 83->77 86 6f2eb18-6f2eb22 84->86 87 6f2eb39-6f2eb3c 84->87 88 6f2eb26-6f2eb35 86->88 89 6f2eb24 86->89 87->82 88->88 91 6f2eb37 88->91 89->88 91->87 104 6f2ec8a-6f2ec8e 93->104 105 6f2ec98-6f2ec9c 93->105 94->93 104->105 106 6f2ec90 104->106 107 6f2ec9e-6f2eca2 105->107 108 6f2ecac-6f2ecb0 105->108 106->105 107->108 109 6f2eca4 107->109 110 6f2ecb2-6f2ecb6 108->110 111 6f2ecc0-6f2ecc4 108->111 109->108 110->111 114 6f2ecb8 110->114 112 6f2ecd6-6f2ecdd 111->112 113 6f2ecc6-6f2eccc 111->113 115 6f2ecf4 112->115 116 6f2ecdf-6f2ecee 112->116 113->112 114->111 118 6f2ecf5 115->118 116->115 118->118
                                              APIs
                                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 06F2EBE6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: dd2f564e387b0c56cb239ccb71132177bff28779df29cbe5b8cd9cd09dcc096e
                                              • Instruction ID: 7e81bfa2f443f9c59980bc633e44389f5e7028c4d014a90dca0069ae735bb646
                                              • Opcode Fuzzy Hash: dd2f564e387b0c56cb239ccb71132177bff28779df29cbe5b8cd9cd09dcc096e
                                              • Instruction Fuzzy Hash: 97914D71D0062ADFEF64CFA8C8417EDBBB2BF48714F1485A9E809A7240DB749985CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 119 281a9e8-281a9f7 120 281aa23-281aa27 119->120 121 281a9f9-281aa06 call 2819d40 119->121 123 281aa29-281aa33 120->123 124 281aa3b-281aa7c 120->124 128 281aa08 121->128 129 281aa1c 121->129 123->124 130 281aa89-281aa97 124->130 131 281aa7e-281aa86 124->131 176 281aa0e call 281ac80 128->176 177 281aa0e call 281ac70 128->177 129->120 132 281aa99-281aa9e 130->132 133 281aabb-281aabd 130->133 131->130 136 281aaa0-281aaa7 call 2819d4c 132->136 137 281aaa9 132->137 135 281aac0-281aac7 133->135 134 281aa14-281aa16 134->129 138 281ab58-281ac18 134->138 140 281aad4-281aadb 135->140 141 281aac9-281aad1 135->141 142 281aaab-281aab9 136->142 137->142 169 281ac20-281ac4b GetModuleHandleW 138->169 170 281ac1a-281ac1d 138->170 143 281aae8-281aaf1 call 2819d5c 140->143 144 281aadd-281aae5 140->144 141->140 142->135 150 281aaf3-281aafb 143->150 151 281aafe-281ab03 143->151 144->143 150->151 152 281ab21-281ab25 151->152 153 281ab05-281ab0c 151->153 174 281ab28 call 281af80 152->174 175 281ab28 call 281af50 152->175 153->152 155 281ab0e-281ab1e call 2819d6c call 2819d7c 153->155 155->152 158 281ab2b-281ab2e 160 281ab51-281ab57 158->160 161 281ab30-281ab4e 158->161 161->160 171 281ac54-281ac68 169->171 172 281ac4d-281ac53 169->172 170->169 172->171 174->158 175->158 176->134 177->134
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0281AC3E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2196082239.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2810000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 5159b816df57a2b268f0b756ec95bc0d15d9aaaa96863947f2ec9253d1afc5f6
                                              • Instruction ID: a2837ca8ffbc93997e3e25dfb8e1db45a26a6a67e230a2d61af2f8c493a3369e
                                              • Opcode Fuzzy Hash: 5159b816df57a2b268f0b756ec95bc0d15d9aaaa96863947f2ec9253d1afc5f6
                                              • Instruction Fuzzy Hash: 38714778A00B058FD728DF69D15475ABBF6FF88304F008A2ED08AD7A80DB74E855CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 178 6f2e2e8-6f2e33e 181 6f2e340-6f2e34c 178->181 182 6f2e34e-6f2e38d WriteProcessMemory 178->182 181->182 184 6f2e396-6f2e3c6 182->184 185 6f2e38f-6f2e395 182->185 185->184
                                              APIs
                                              • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06F2E380
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: 5f166410ab72f99c974a70e8700a6ff8173ee715d07488d96f16ac2fd9f07c79
                                              • Instruction ID: 5b048426b54fc7f4169d154e4146194d60d4ae8f84b4a8e505b4600c3ee4901a
                                              • Opcode Fuzzy Hash: 5f166410ab72f99c974a70e8700a6ff8173ee715d07488d96f16ac2fd9f07c79
                                              • Instruction Fuzzy Hash: D221447190035A9FDB10CFAAC881BEEBBF5FF48310F10842AE919A7250C7789954CBA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 189 6f2e2f0-6f2e33e 191 6f2e340-6f2e34c 189->191 192 6f2e34e-6f2e38d WriteProcessMemory 189->192 191->192 194 6f2e396-6f2e3c6 192->194 195 6f2e38f-6f2e395 192->195 195->194
                                              APIs
                                              • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06F2E380
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: db9609d131b16ed6281d7553c6c290dd3805d1647698779c2d08b7603d234b92
                                              • Instruction ID: 13e8529315909ee352f80abedd557612f4cd82b9ba3500ccf477eb3ce3ee56c7
                                              • Opcode Fuzzy Hash: db9609d131b16ed6281d7553c6c290dd3805d1647698779c2d08b7603d234b92
                                              • Instruction Fuzzy Hash: 4D21137290035A9FDB10CFAAC885BDEBBF5BF48310F10842AE919A7250C7789954CBA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 199 6f2e810-6f2e8a5 ReadProcessMemory 202 6f2e8a7-6f2e8ad 199->202 203 6f2e8ae-6f2e8de 199->203 202->203
                                              APIs
                                              • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06F2E898
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: c12d544a2d7f5c1721998da36bb997f6fe02c2cf4f19f301227d3d56827d0d8f
                                              • Instruction ID: cb8ca933596108658653e0d3eff138d5cc91866de261f8ab0ee0dbc8adf9d4ec
                                              • Opcode Fuzzy Hash: c12d544a2d7f5c1721998da36bb997f6fe02c2cf4f19f301227d3d56827d0d8f
                                              • Instruction Fuzzy Hash: 23212771C013499FDB10DFAAC885ADEBBF5FF48310F108429E559A7240C7789551CBA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 207 281d2ba-281d354 DuplicateHandle 208 281d356-281d35c 207->208 209 281d35d-281d37a 207->209 208->209
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0281D286,?,?,?,?,?), ref: 0281D347
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2196082239.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2810000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 252a8fec9b59f044535ae5a67cab83162975e6389f74d76799fd7b96e187b7db
                                              • Instruction ID: 1ea232f44c82003e17b2e248a713cdde773ceae4e3472f323d4a075d5a6f8720
                                              • Opcode Fuzzy Hash: 252a8fec9b59f044535ae5a67cab83162975e6389f74d76799fd7b96e187b7db
                                              • Instruction Fuzzy Hash: 2221E5B5900249DFDB10CFAAD584ADEBFF4EB48320F14801AE918A7250D375A955CF61

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 212 281b3d0-281d354 DuplicateHandle 214 281d356-281d35c 212->214 215 281d35d-281d37a 212->215 214->215
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0281D286,?,?,?,?,?), ref: 0281D347
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2196082239.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2810000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: c6b1544e940d502ffc0903a44722b9f62e3da64ae08779ac0dcd8812703cf410
                                              • Instruction ID: 301f6257654977a944e3e954d3307d0e1929347852f9d4e508fea05eb71b6156
                                              • Opcode Fuzzy Hash: c6b1544e940d502ffc0903a44722b9f62e3da64ae08779ac0dcd8812703cf410
                                              • Instruction Fuzzy Hash: 0D21E5B5900249DFDB10CF9AD584ADEBFF8EB48324F14805AE914A3350D378A954CFA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 218 6f2e152-6f2e1a3 221 6f2e1b3-6f2e1e3 Wow64SetThreadContext 218->221 222 6f2e1a5-6f2e1b1 218->222 224 6f2e1e5-6f2e1eb 221->224 225 6f2e1ec-6f2e21c 221->225 222->221 224->225
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06F2E1D6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: afb0dc4e4779825c463a57086e3ab5aeed6327f3ffd973c6b096cd2a34049349
                                              • Instruction ID: 51ca3db83bb81e5adff1abbe76b41ea6aa92f2bce12b9e7571525345e901f39d
                                              • Opcode Fuzzy Hash: afb0dc4e4779825c463a57086e3ab5aeed6327f3ffd973c6b096cd2a34049349
                                              • Instruction Fuzzy Hash: E0217C71D0030A8FDB10DFAAC8857EEBBF4EF48320F14842AD519A7240C7789544CFA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 229 6f2e158-6f2e1a3 231 6f2e1b3-6f2e1e3 Wow64SetThreadContext 229->231 232 6f2e1a5-6f2e1b1 229->232 234 6f2e1e5-6f2e1eb 231->234 235 6f2e1ec-6f2e21c 231->235 232->231 234->235
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06F2E1D6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: dd5aa0e7c374bb97d1f64705f975c6a1d0d0204878950cb9c4859625189c34cd
                                              • Instruction ID: 5014a1a14c5d43eeaacd66fc300fd11c09f837ef185b32a0a20a23cb2713182e
                                              • Opcode Fuzzy Hash: dd5aa0e7c374bb97d1f64705f975c6a1d0d0204878950cb9c4859625189c34cd
                                              • Instruction Fuzzy Hash: 25214971D0030A8FDB50DFAAC8857EEBBF4EF88324F14842AD519A7240CB789944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 239 6f2e818-6f2e8a5 ReadProcessMemory 242 6f2e8a7-6f2e8ad 239->242 243 6f2e8ae-6f2e8de 239->243 242->243
                                              APIs
                                              • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06F2E898
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: e745becb00deb6ec31db11742b7af2a12096b4b6d47e5c8d2dac9f9e12fb0fb9
                                              • Instruction ID: c064fc839988dab88fb2385305e2d35ac3ef5d0e1d98224a77a3084ebe811db7
                                              • Opcode Fuzzy Hash: e745becb00deb6ec31db11742b7af2a12096b4b6d47e5c8d2dac9f9e12fb0fb9
                                              • Instruction Fuzzy Hash: BF211671D003599FDF10CFAAC881ADEBBF5FF48310F10842AE559A7240C7789550CBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 247 6f2e228-6f2e2ab VirtualAllocEx 250 6f2e2b4-6f2e2d9 247->250 251 6f2e2ad-6f2e2b3 247->251 251->250
                                              APIs
                                              • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06F2E29E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: d8b09b6fdeb7f03225732d69142071673ba7762ae6c20e7dabe7ed718f6364c1
                                              • Instruction ID: eb213297aa1abc4a147ec1e92ccd5bbfd1b3e9ad4a06304214a3360219fb898f
                                              • Opcode Fuzzy Hash: d8b09b6fdeb7f03225732d69142071673ba7762ae6c20e7dabe7ed718f6364c1
                                              • Instruction Fuzzy Hash: EF1159B690024A9FDF10DFAAC845BDFBBF5EF88320F208419E519A7250C7759550CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 255 28194d8-2819534 257 2819582-281959b 255->257 258 2819536-281955e KiUserCallbackDispatcher 255->258 259 2819560-2819566 258->259 260 2819567-281957b 258->260 259->260 260->257
                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 0281954D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2196082239.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2810000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID:
                                              • API String ID: 2492992576-0
                                              • Opcode ID: ff1083db651550c1a2af6920ecfe817c42d40e023764880eb318676dc6be58d3
                                              • Instruction ID: 2719b75fdab2281b2ace8bfad7c8736081b5712bec0a4329d4fe06a6425a736c
                                              • Opcode Fuzzy Hash: ff1083db651550c1a2af6920ecfe817c42d40e023764880eb318676dc6be58d3
                                              • Instruction Fuzzy Hash: C411D2B9804788CFDB11CF59D5043DEBFF4EB04314F144099C599B3682C3795609CBA2

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 262 6f2e0a0-6f2e117 ResumeThread 266 6f2e120-6f2e145 262->266 267 6f2e119-6f2e11f 262->267 267->266
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: 9f73cb9abfc545b204b2eb733445ff756ec3b3b05572b09782d86dfd16ecfef2
                                              • Instruction ID: 9400dbd041e56ba75cf760ba8f73ab6e47369d2cbfc4af9c6ddfd38e0e925e5b
                                              • Opcode Fuzzy Hash: 9f73cb9abfc545b204b2eb733445ff756ec3b3b05572b09782d86dfd16ecfef2
                                              • Instruction Fuzzy Hash: A5114671D007498BDB20DFAAC845BDEFBF4EF88724F24881AD519A7240CB79A544CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 271 6f2e230-6f2e2ab VirtualAllocEx 274 6f2e2b4-6f2e2d9 271->274 275 6f2e2ad-6f2e2b3 271->275 275->274
                                              APIs
                                              • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06F2E29E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 8196d47e4872647d43f2dff1c38eb3445d9db395dfb9f0f903cff24d21d7ecb8
                                              • Instruction ID: fa53f72f6fd1e964bf3d1d3eefe4ed59b4d8fd17434dcdc9fb65cb7515e7eebe
                                              • Opcode Fuzzy Hash: 8196d47e4872647d43f2dff1c38eb3445d9db395dfb9f0f903cff24d21d7ecb8
                                              • Instruction Fuzzy Hash: 6B11267290024A9FDF10DFAAC845BDEBBF5AF88324F248419E519A7250C775A550CFA1
                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 0281954D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2196082239.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2810000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID:
                                              • API String ID: 2492992576-0
                                              • Opcode ID: e7a4c0b65e2fd7d66ad276bf7b22822a9945547739802abd8e169fb6623d0634
                                              • Instruction ID: 26ffe5660f2d3e68ffac3b8f57781e54a7bbbeeb890d4d4c5e23c31a29e452ef
                                              • Opcode Fuzzy Hash: e7a4c0b65e2fd7d66ad276bf7b22822a9945547739802abd8e169fb6623d0634
                                              • Instruction Fuzzy Hash: F21179B9804788CFDB10CF99D1043EEBFF8EB04314F504499D599A3682C3B9A608CBA2
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: bce9711d8fcb9add3eb0d43b8d5e90e1a675f8de50f5f8425c90b02fa22e8ddb
                                              • Instruction ID: 668ec586f4a6dcae2d51e2c30ac424ee8d4f1bb463bb0880839d4a4fad307414
                                              • Opcode Fuzzy Hash: bce9711d8fcb9add3eb0d43b8d5e90e1a675f8de50f5f8425c90b02fa22e8ddb
                                              • Instruction Fuzzy Hash: 12112871D003498FDB10DFAAC84579EFBF4AF88724F248419D519A7240CB79A544CF95
                                              APIs
                                              • PostMessageW.USER32(?,?,?,?), ref: 0789125D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2203039179.0000000007890000.00000040.00000800.00020000.00000000.sdmp, Offset: 07890000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7890000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: 33c27cf7bf0909ec82f558914ec411a66708496000d69d60db3d4b68a51138cb
                                              • Instruction ID: 3472e98cba1dfd838b50489f65c9405e48fc5539018879678fb4c6b28f7eb08e
                                              • Opcode Fuzzy Hash: 33c27cf7bf0909ec82f558914ec411a66708496000d69d60db3d4b68a51138cb
                                              • Instruction Fuzzy Hash: 0711F5B5800349DFDB10DF9AD549BDEBFF9EB48320F10841AE518A3200C3B5A544CFA1
                                              APIs
                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0281AC3E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2196082239.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2810000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 1cec6067445101ed3b58955174210fa9a9a3d9f02f97fe24ff19f04950c59107
                                              • Instruction ID: 1fd20dd25a672568245db560f2378f96aa020e87a1cc21d8c766baaa18cbdf08
                                              • Opcode Fuzzy Hash: 1cec6067445101ed3b58955174210fa9a9a3d9f02f97fe24ff19f04950c59107
                                              • Instruction Fuzzy Hash: 2B1140BAC007498FDB14CF9AD544BCEFBF8AF88324F10841AD519A3200C3B9A544CFA0
                                              APIs
                                              • PostMessageW.USER32(?,?,?,?), ref: 0789125D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2203039179.0000000007890000.00000040.00000800.00020000.00000000.sdmp, Offset: 07890000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7890000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: c9482d3196583ff7e1d6b8e8b9b70879a04b1fac1eb73d010d3862cd647bc31b
                                              • Instruction ID: 09704a73cb6a9f0b488cafa0b6d8f4898c82ae5f69afcaff62cf224997b2277b
                                              • Opcode Fuzzy Hash: c9482d3196583ff7e1d6b8e8b9b70879a04b1fac1eb73d010d3862cd647bc31b
                                              • Instruction Fuzzy Hash: 8F11F2B5800349DFDB10DF9AD588BDEBBF8EB48320F20841AD518A3200C3B5A544CFA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2195599570.00000000027CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027CD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_27cd000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c7fb9727465f5a7f67cf7227f996d7bcf1113f6f041be1a053c12943c1979071
                                              • Instruction ID: e097ef0cbc9932d239a8aa8bf439a99acf5826ff232484eec67551142a444126
                                              • Opcode Fuzzy Hash: c7fb9727465f5a7f67cf7227f996d7bcf1113f6f041be1a053c12943c1979071
                                              • Instruction Fuzzy Hash: 8B2122B5504204EFDB24DF24D9C0B26BBA2FB88314F30C57DD90A4B352C77AD846CA61
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2195599570.00000000027CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027CD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_27cd000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3c97b35d1c0841f6c04df505c55715b685d546be53c19de8ed17c2d89db1d305
                                              • Instruction ID: 2798995d57eb4e60a1fe24bfdcf2ce8fe4eae4a469fa085171910abaca2f57d0
                                              • Opcode Fuzzy Hash: 3c97b35d1c0841f6c04df505c55715b685d546be53c19de8ed17c2d89db1d305
                                              • Instruction Fuzzy Hash: 782146B5604204EFDB24DF20D9C0B26BFA1FB88314F30C57DE80A0B252C37AD806CA61
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2195599570.00000000027CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027CD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_27cd000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 60843469088974c2152f39ff2bab4dffe721777c5b1106797744badb990278af
                                              • Instruction ID: eb3109175fd9ea111dcf5463157d55860e10928f0946a66b6363d7df4a71f04f
                                              • Opcode Fuzzy Hash: 60843469088974c2152f39ff2bab4dffe721777c5b1106797744badb990278af
                                              • Instruction Fuzzy Hash: 6F21A1755043849FDB12CF20D984B15BFB1EB49314F29C5AED8494B3A7C33AD816CB62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2195599570.00000000027CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027CD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_27cd000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                              • Instruction ID: d2f0deb2ed6c6f3cb8b3d107e2aa811938a9fea010b64c72847977dfcd1f61a2
                                              • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                              • Instruction Fuzzy Hash: 2C119D75504284DFCB15CF20D9C4B19BFB1FB84318F24C6AED8494B656C33AD44ACB61
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2195560114.00000000027BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_27bd000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 467a4f033968c215083cfbb924919c9daa7c96254098031d9103b73e62a82080
                                              • Instruction ID: f82a8e30f94349d189e9b95ca315764fff549ecb8e954ba6f093eb09dddf1fd5
                                              • Opcode Fuzzy Hash: 467a4f033968c215083cfbb924919c9daa7c96254098031d9103b73e62a82080
                                              • Instruction Fuzzy Hash: DB012672004341DAE7318A26CD84BE6FF98EF41724F18C41AEE095A686C7B99840C6B1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2195560114.00000000027BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_27bd000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c6c823b431cce55eeb0fed2f31ed0a1784e3047ef4369baa8a78986ac063c60c
                                              • Instruction ID: 70b314779e743c27087abf9298345e880dead3debf63207ef737423af9be63e9
                                              • Opcode Fuzzy Hash: c6c823b431cce55eeb0fed2f31ed0a1784e3047ef4369baa8a78986ac063c60c
                                              • Instruction Fuzzy Hash: 24F096724053449EE7218E16DDC4BA2FFA8EF51735F18C45AFD084B686C379A844CBB1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: :$~
                                              • API String ID: 0-2431124681
                                              • Opcode ID: e24d6bbd24a0125aeab73098e158bbde4194a1d3bd92bb017a457ae26866cae4
                                              • Instruction ID: d11227e33594ce5b509c1f21f14be25a5410c6b5bbdf8a3c7b7dde5af15e8711
                                              • Opcode Fuzzy Hash: e24d6bbd24a0125aeab73098e158bbde4194a1d3bd92bb017a457ae26866cae4
                                              • Instruction Fuzzy Hash: B542F276E00229DFDB55CFA8C984B99BBB2FF48304F1580E9E509AB261DB319D91CF50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 32185f4d75af8f860d58e34029b2893b048dc7a94271a5edbc481b1c1e82769d
                                              • Instruction ID: ac517c75375b368a484efcdd3b275141cbc4da51517b535025875945aeb722d5
                                              • Opcode Fuzzy Hash: 32185f4d75af8f860d58e34029b2893b048dc7a94271a5edbc481b1c1e82769d
                                              • Instruction Fuzzy Hash: 70E12D74E042698FDB54DF99C580AAEFBF2FF89304F248269D414AB355D731A982CF60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 817e0ec4484d925a6548d15eaaaac57007d322eeb1e972337b4b2da1b6542eae
                                              • Instruction ID: 918bd898be5ee8558bde17040634e0e9c84f4432e794f8acacb5a79df5b16c85
                                              • Opcode Fuzzy Hash: 817e0ec4484d925a6548d15eaaaac57007d322eeb1e972337b4b2da1b6542eae
                                              • Instruction Fuzzy Hash: 7DE12D74E042698FDB54DFA9C580AAEFBF2FF89304F248269D414AB355D731A942CF60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 32c52128432e61c51af554b08baaf65a3abbb23f25ea7f1bcee19e413d502d84
                                              • Instruction ID: e89b3bafd4607b02c416c2576372446ba2fd5869a3975f355b4fd723f80a9e4c
                                              • Opcode Fuzzy Hash: 32c52128432e61c51af554b08baaf65a3abbb23f25ea7f1bcee19e413d502d84
                                              • Instruction Fuzzy Hash: CAE11A74E042698FDB54DFA8D580AAEBBF2FF89304F248159D414AB355D731AD42CFA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9da85e424c53db8bdd785f8b480cf80d646bd679109c00fb5c9ba0bb1f8ee61a
                                              • Instruction ID: 65fed1c1b71c31e29ab88ce3dd02e58a280950f916ae14a72e6f1b2cc75c19f4
                                              • Opcode Fuzzy Hash: 9da85e424c53db8bdd785f8b480cf80d646bd679109c00fb5c9ba0bb1f8ee61a
                                              • Instruction Fuzzy Hash: DBE11D74E042698FDB54DFA9D580AAEFBF2FF88304F248259D414AB355D731A982CF60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3998c029d1e1b5eb1782e6a2d87beb3a6be0316e4b6e5a82985b1c6912fe9a4a
                                              • Instruction ID: 76cfbdc1184370ba74ffaf0dc3d8e07c3c4ff1bd0b4cff3f107d093d4e106909
                                              • Opcode Fuzzy Hash: 3998c029d1e1b5eb1782e6a2d87beb3a6be0316e4b6e5a82985b1c6912fe9a4a
                                              • Instruction Fuzzy Hash: 72E13C74E042698FDB54DFA9D580AAEFBF2FF89304F248169D414AB315D731A942CFA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e12bb2de14a6bce9eb85eaf3d1f9d6aa752cdd0280e75d0520db39792fc29ebb
                                              • Instruction ID: f8cd87c10a31c089448543493b6696d369ad1278fae48274a66eac7e2162cb93
                                              • Opcode Fuzzy Hash: e12bb2de14a6bce9eb85eaf3d1f9d6aa752cdd0280e75d0520db39792fc29ebb
                                              • Instruction Fuzzy Hash: 83D11535D2475ACADB01EF64D990AE9B7B2FF95300F10979AD10A3B214FB706AC4CB91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2196082239.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_2810000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 837ee388adfc90bcf42a2f0205d799f1d9cf577acefbf518009747d1a17a0008
                                              • Instruction ID: 1f7ebbf934bf591c98b25f474492c155791c66f98f2ab93996bcfab76702993f
                                              • Opcode Fuzzy Hash: 837ee388adfc90bcf42a2f0205d799f1d9cf577acefbf518009747d1a17a0008
                                              • Instruction Fuzzy Hash: 77A17E3AE102098FCF09DFB8C94059EB7B6FF84304B15856AE905EB2A1DB35E915CF80
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b90ed2ea1a713ddee26dc20af60f250be507437df4ca0738b9650d1e0b5fdd88
                                              • Instruction ID: 302effd25525c60baeb0e375e97a9e920beca7de3c2a51a9a4d41e13ebd15894
                                              • Opcode Fuzzy Hash: b90ed2ea1a713ddee26dc20af60f250be507437df4ca0738b9650d1e0b5fdd88
                                              • Instruction Fuzzy Hash: 20D1F535D2475ACADB01EF64D990AE9B7B2FF95300F10979AD10A3B214FB706AC4CB91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 08700c5874faaa5222ac6e3b85e992fe871b2d0e6de9550d4a0f93f01fcd3874
                                              • Instruction ID: 89dff718678fc1f01ff11a2ed105caf8a9ad1f6d4587b5523ad97762752d054a
                                              • Opcode Fuzzy Hash: 08700c5874faaa5222ac6e3b85e992fe871b2d0e6de9550d4a0f93f01fcd3874
                                              • Instruction Fuzzy Hash: CE511A74E042698FDB54DFA9C5805AEFBF6FF89300F248169D418AB315D7319942CFA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9d887a835ef78042278569b5a4e03ae1859900c21c3e248b6f27cc417689a25d
                                              • Instruction ID: 687311e21eabd11eab93ae461a2d65fcf04373637b83f9ede8d1a7865a9a453f
                                              • Opcode Fuzzy Hash: 9d887a835ef78042278569b5a4e03ae1859900c21c3e248b6f27cc417689a25d
                                              • Instruction Fuzzy Hash: 95512A74E0426A8FDB54DFA9C5805AEFBF6FF89300F248169D418AB316D7319942CFA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2202428478.0000000006F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_6f20000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 36d97b9c5990b7370647ab934a67e6a4c3b2787ed29318ef1ea22a3c6ee24f8d
                                              • Instruction ID: 04c36dd9373ae1c8b8e3674b1c37a7f393f35e503681e04b00683b79425fdf0d
                                              • Opcode Fuzzy Hash: 36d97b9c5990b7370647ab934a67e6a4c3b2787ed29318ef1ea22a3c6ee24f8d
                                              • Instruction Fuzzy Hash: 4441A971E016298BEB68CF6BCC407CABBF3AFC9200F14C1A9D509A7254EB705985CF51
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2203039179.0000000007890000.00000040.00000800.00020000.00000000.sdmp, Offset: 07890000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7890000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6b0f62972025f2e1b6ae23a02bfe3a40e0e213594870f4e4cc2baac7c9a7c9f3
                                              • Instruction ID: 0ac2ab1535e279a7f7ae630b7e56bd2a880701b64308be9a706e3104d73b3233
                                              • Opcode Fuzzy Hash: 6b0f62972025f2e1b6ae23a02bfe3a40e0e213594870f4e4cc2baac7c9a7c9f3
                                              • Instruction Fuzzy Hash: A93110B1D093598FEB15CF668C147D9BBF6AF96304F08C0F6C448AA251E7740A85CF51

                                              Execution Graph

                                              Execution Coverage:10.2%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:9.4%
                                              Total number of Nodes:32
                                              Total number of Limit Nodes:4
                                              execution_graph 25126 111ad70 25127 111adb6 DeleteFileW 25126->25127 25129 111adef 25127->25129 25130 11170b8 25131 11170fc CheckRemoteDebuggerPresent 25130->25131 25132 111713e 25131->25132 25133 111ecb8 25134 111ecfe 25133->25134 25135 111edeb 25134->25135 25137 111eef8 25134->25137 25138 111ee0c 25137->25138 25139 111eeff DuplicateHandle 25137->25139 25138->25135 25141 111ef96 25139->25141 25141->25135 25142 1110848 25143 111084e 25142->25143 25144 111091b 25143->25144 25146 1111380 25143->25146 25148 111136c 25146->25148 25147 111137c 25147->25143 25148->25147 25150 111af48 25148->25150 25151 111af52 25150->25151 25154 111af6c 25151->25154 25155 6a6ea40 25151->25155 25160 6a6ea2f 25151->25160 25154->25148 25157 6a6ea55 25155->25157 25156 6a6ec6a 25156->25154 25157->25156 25158 6a6f088 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25157->25158 25159 6a6f098 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25157->25159 25158->25157 25159->25157 25162 6a6ea40 25160->25162 25161 6a6ec6a 25161->25154 25162->25161 25163 6a6f088 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25162->25163 25164 6a6f098 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25162->25164 25163->25162 25164->25162

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1190 11170b8-111713c CheckRemoteDebuggerPresent 1192 1117145-1117180 1190->1192 1193 111713e-1117144 1190->1193 1193->1192
                                              APIs
                                              • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0111712F
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.3417204912.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_1110000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: CheckDebuggerPresentRemote
                                              • String ID:
                                              • API String ID: 3662101638-0
                                              • Opcode ID: e7d05a41be06b10b009b1bd9fe3e136ecaad9f39d65a06f7c37fe25a38d6ad36
                                              • Instruction ID: 483d0719ce9136e0165bab77c64f70f10981d0bc58db5e020d4c9f3546bb1c47
                                              • Opcode Fuzzy Hash: e7d05a41be06b10b009b1bd9fe3e136ecaad9f39d65a06f7c37fe25a38d6ad36
                                              • Instruction Fuzzy Hash: 8F2139B1800259CFDB14CF9AD984BEEFBF4AF48320F14846AE559A3350D778A944CF61

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1135 6a6f858-6a6f863 1136 6a6f865-6a6f88c call 6a6efd8 1135->1136 1137 6a6f88d-6a6f8ac call 6a6efe4 1135->1137 1144 6a6f8b2-6a6f911 1137->1144 1145 6a6f8ae-6a6f8b1 1137->1145 1152 6a6f917-6a6f9a4 GlobalMemoryStatusEx 1144->1152 1153 6a6f913-6a6f916 1144->1153 1157 6a6f9a6-6a6f9ac 1152->1157 1158 6a6f9ad-6a6f9d5 1152->1158 1157->1158
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.3441963775.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_6a60000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 023e463b9655eeed8601bc7603d69f97fdee7924e3d11f537a0bfa0c61a077be
                                              • Instruction ID: 7f0f5bc54f6f6cbac7dc70fd2f23b6ba30f825d00d4becd84e6be9d1eb314d45
                                              • Opcode Fuzzy Hash: 023e463b9655eeed8601bc7603d69f97fdee7924e3d11f537a0bfa0c61a077be
                                              • Instruction Fuzzy Hash: 70413632D0439A9FCB04DF7AD80069EBBF5EF88210F14856AE504AB351DB749841CBD1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1161 111eef8-111eefd 1162 111ee90 1161->1162 1163 111eeff-111ef94 DuplicateHandle 1161->1163 1164 111ee51 1162->1164 1165 111ee92-111eec1 call 111e958 1162->1165 1170 111ef96-111ef9c 1163->1170 1171 111ef9d-111efba 1163->1171 1168 111ee52-111ee85 1164->1168 1169 111ee0c-111ee1a 1164->1169 1172 111eec6-111eeec 1165->1172 1173 111ee23-111ee47 1169->1173 1174 111ee1c-111ee22 1169->1174 1170->1171 1173->1168 1174->1173
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0111EF87
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.3417204912.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_1110000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 8564c973e4ce5f6d0ac4eeb977b719f0112033d49b15e45b2d8707e001f960d6
                                              • Instruction ID: c507e1b8fdcf5ebf3881ca095721e560c0044de4d18a9f1b964897bc6184c976
                                              • Opcode Fuzzy Hash: 8564c973e4ce5f6d0ac4eeb977b719f0112033d49b15e45b2d8707e001f960d6
                                              • Instruction Fuzzy Hash: 0B414775900259AFCB01CF99D844ADEBFFAFF88314F14806AFA58A7310D335A950CBA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1183 11170b0-111713c CheckRemoteDebuggerPresent 1186 1117145-1117180 1183->1186 1187 111713e-1117144 1183->1187 1187->1186
                                              APIs
                                              • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0111712F
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.3417204912.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_1110000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: CheckDebuggerPresentRemote
                                              • String ID:
                                              • API String ID: 3662101638-0
                                              • Opcode ID: dd321606ed449a5c649fd882da6bfc74809b29f811c7455f26e48883ee0e33c5
                                              • Instruction ID: b63840667867e7764b523aa880539b5d6e2ec3d263ff78e649a7493927e25d6d
                                              • Opcode Fuzzy Hash: dd321606ed449a5c649fd882da6bfc74809b29f811c7455f26e48883ee0e33c5
                                              • Instruction Fuzzy Hash: AC214A718002598FDB14CF9AD9447EEFBF4AF48320F14855AE455B3390D7789944CF60

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1196 111ef00-111ef94 DuplicateHandle 1197 111ef96-111ef9c 1196->1197 1198 111ef9d-111efba 1196->1198 1197->1198
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0111EF87
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.3417204912.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_1110000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 9d23c003dcadb49453718dc7ce3ca0fe19e9daab65877cdaf68cf8a7e5b9cb7d
                                              • Instruction ID: 4bed4a86a56598a38045352e19f6ab9d194f531d2e4dbbda31706ce0780d3aaf
                                              • Opcode Fuzzy Hash: 9d23c003dcadb49453718dc7ce3ca0fe19e9daab65877cdaf68cf8a7e5b9cb7d
                                              • Instruction Fuzzy Hash: 0F21E3B59002499FDB10CF9AD984ADEFFF4EB48320F14801AE918A3350D378A950CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1201 111ad69-111adba 1204 111adc2-111aded DeleteFileW 1201->1204 1205 111adbc-111adbf 1201->1205 1206 111adf6-111ae1e 1204->1206 1207 111adef-111adf5 1204->1207 1205->1204 1207->1206
                                              APIs
                                              • DeleteFileW.KERNELBASE(00000000), ref: 0111ADE0
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.3417204912.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_1110000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: DeleteFile
                                              • String ID:
                                              • API String ID: 4033686569-0
                                              • Opcode ID: 3664b00e71535d0580fb2e2897607d7666ce96f206942222be6ca2ba856fa69f
                                              • Instruction ID: 9c007218edfdab9d58ef26c4edbe1a87002d2fc82768e158c158041d2dfbc948
                                              • Opcode Fuzzy Hash: 3664b00e71535d0580fb2e2897607d7666ce96f206942222be6ca2ba856fa69f
                                              • Instruction Fuzzy Hash: 282127B2C0065A9FDB14CF9AD54479EFBB4FF48720F10812AD918A7240D778A950CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1210 111ad70-111adba 1212 111adc2-111aded DeleteFileW 1210->1212 1213 111adbc-111adbf 1210->1213 1214 111adf6-111ae1e 1212->1214 1215 111adef-111adf5 1212->1215 1213->1212 1215->1214
                                              APIs
                                              • DeleteFileW.KERNELBASE(00000000), ref: 0111ADE0
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.3417204912.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_1110000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: DeleteFile
                                              • String ID:
                                              • API String ID: 4033686569-0
                                              • Opcode ID: d9f566bb7bede78acc9c8fbdda50729c9f40f08dcc19df76a4dfca030ebd1056
                                              • Instruction ID: f9c5ff4b3ba2ec6efd25bcf321935f05c0b5fc23e975a7c51521469bc564447c
                                              • Opcode Fuzzy Hash: d9f566bb7bede78acc9c8fbdda50729c9f40f08dcc19df76a4dfca030ebd1056
                                              • Instruction Fuzzy Hash: 5C1133B2C00A5A9FDB14CF9AD544B9EFBB4FF48720F10812AD918A7240D778A950CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1218 6a6efe4-6a6f9a4 GlobalMemoryStatusEx 1221 6a6f9a6-6a6f9ac 1218->1221 1222 6a6f9ad-6a6f9d5 1218->1222 1221->1222
                                              APIs
                                              • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06A6F8AA), ref: 06A6F997
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.3441963775.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_6a60000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: 4a1a678f3752128ac2dc46b998a57171be4ee3b6d78ddb81e4914f81003bfa4a
                                              • Instruction ID: 48fe3c8b3f54d7574c3d4aaa6b2ac51760146bf88db0bf68cda8b62442538293
                                              • Opcode Fuzzy Hash: 4a1a678f3752128ac2dc46b998a57171be4ee3b6d78ddb81e4914f81003bfa4a
                                              • Instruction Fuzzy Hash: 141133B2C0065A9FCB10DF9AD544B9EFBF4EF48224F10812AE918A7240D378A950CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1225 6a6f928-6a6f96e 1226 6a6f976-6a6f9a4 GlobalMemoryStatusEx 1225->1226 1227 6a6f9a6-6a6f9ac 1226->1227 1228 6a6f9ad-6a6f9d5 1226->1228 1227->1228
                                              APIs
                                              • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06A6F8AA), ref: 06A6F997
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.3441963775.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_6a60000_nuevo orden.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: b9b4d8c839742fb4e03e9dad642ad09206aa3e4ba9b1fe1c7fed1544779e2202
                                              • Instruction ID: 4f9f73c30e53c79c094e9c657096381981aaa8322f0b4d1f23626aeed31c7699
                                              • Opcode Fuzzy Hash: b9b4d8c839742fb4e03e9dad642ad09206aa3e4ba9b1fe1c7fed1544779e2202
                                              • Instruction Fuzzy Hash: 641147B1C0065ADFCB10DFAAD544BDEFBB4AF48324F14815AE918B7241D778A950CFA1
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.3416601008.00000000010CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_10cd000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 026a07e2a9d74c11b4e07d0b427bcbc8ad9a2bf7c0c9d1b6050eebe77c9e8e57
                                              • Instruction ID: 054ab4f6130a422831493b282518ecb18ae939801a3f245e9f257dfb4f704679
                                              • Opcode Fuzzy Hash: 026a07e2a9d74c11b4e07d0b427bcbc8ad9a2bf7c0c9d1b6050eebe77c9e8e57
                                              • Instruction Fuzzy Hash: A7210371504204EFDB15DF98D9C0B2ABBA1EB84B14F30C5BEE9890A252C376D446CFA1
                                              Memory Dump Source
                                              • Source File: 00000005.00000002.3416601008.00000000010CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_5_2_10cd000_nuevo orden.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                              • Instruction ID: 6e6e37d502b735769a4af7b9ff3918352dda63abc19397fc35de23d670619bee
                                              • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                              • Instruction Fuzzy Hash: 1011BE75504284DFCB12CF58D5C0B19BBA2FB84714F24C6AEE8894B657C33AD44ACFA1

                                              Execution Graph

                                              Execution Coverage:8.9%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:199
                                              Total number of Limit Nodes:6
                                              execution_graph 30261 6e92938 CloseHandle 30262 6e92992 30261->30262 30077 f6a8f0 30081 f6a9e8 30077->30081 30086 f6a9db 30077->30086 30078 f6a8ff 30082 f6a9f9 30081->30082 30083 f6aa1c 30081->30083 30082->30083 30084 f6ac20 GetModuleHandleW 30082->30084 30083->30078 30085 f6ac4d 30084->30085 30085->30078 30087 f6a9f9 30086->30087 30088 f6aa1c 30086->30088 30087->30088 30089 f6ac20 GetModuleHandleW 30087->30089 30088->30078 30090 f6ac4d 30089->30090 30090->30078 30329 6e90f80 30330 6e9110b 30329->30330 30331 6e90fa6 30329->30331 30331->30330 30334 6e911f9 PostMessageW 30331->30334 30336 6e91200 PostMessageW 30331->30336 30335 6e9126c 30334->30335 30335->30331 30337 6e9126c 30336->30337 30337->30331 30091 f6d078 30092 f6d0be 30091->30092 30096 f6d258 30092->30096 30099 f6d248 30092->30099 30093 f6d1ab 30102 f6b3d0 30096->30102 30100 f6d286 30099->30100 30101 f6b3d0 DuplicateHandle 30099->30101 30100->30093 30101->30100 30103 f6d2c0 DuplicateHandle 30102->30103 30104 f6d286 30103->30104 30104->30093 30263 f64528 30264 f64537 30263->30264 30267 f643d4 30264->30267 30266 f6453e 30268 f643df 30267->30268 30271 f644b4 30268->30271 30270 f64925 30270->30266 30272 f644bf 30271->30272 30275 f644e4 30272->30275 30274 f64a15 30274->30270 30276 f644ef 30275->30276 30279 f64aa0 30276->30279 30278 f64f0a 30278->30274 30280 f64aab 30279->30280 30283 f64ad0 30280->30283 30282 f65014 30282->30278 30284 f64adb 30283->30284 30290 f679b8 30284->30290 30286 f67ec1 30286->30282 30287 f67c98 30287->30286 30295 f6c9b0 30287->30295 30300 f6c9a0 30287->30300 30291 f679c3 30290->30291 30292 f6948a 30291->30292 30305 f694e8 30291->30305 30309 f694d8 30291->30309 30292->30287 30296 f6c9d1 30295->30296 30297 f6c9f5 30296->30297 30313 f6cb60 30296->30313 30317 f6cb51 30296->30317 30297->30286 30301 f6c9d1 30300->30301 30302 f6c9f5 30301->30302 30303 f6cb60 2 API calls 30301->30303 30304 f6cb51 2 API calls 30301->30304 30302->30286 30303->30302 30304->30302 30306 f6952b 30305->30306 30307 f69536 KiUserCallbackDispatcher 30306->30307 30308 f69560 30306->30308 30307->30308 30308->30292 30310 f6952b 30309->30310 30311 f69536 KiUserCallbackDispatcher 30310->30311 30312 f69560 30310->30312 30311->30312 30312->30292 30314 f6cb6d 30313->30314 30315 f6cba7 30314->30315 30321 f6b3c0 30314->30321 30315->30297 30318 f6cb6d 30317->30318 30319 f6cba7 30318->30319 30320 f6b3c0 2 API calls 30318->30320 30319->30297 30320->30319 30322 f6b3cb 30321->30322 30324 f6d8b8 30322->30324 30325 f6ccc4 30322->30325 30324->30324 30326 f6cccf 30325->30326 30327 f64ad0 2 API calls 30326->30327 30328 f6d927 30327->30328 30328->30324 30105 73dee32 30107 73dedc6 30105->30107 30106 73deddb 30107->30106 30110 73df979 30107->30110 30126 73df980 30107->30126 30111 73df99a 30110->30111 30142 6e907a9 30111->30142 30146 6e903f6 30111->30146 30154 6e906f7 30111->30154 30158 6e90394 30111->30158 30163 6e9003b 30111->30163 30169 6e90859 30111->30169 30173 6e902e7 30111->30173 30178 6e90105 30111->30178 30184 6e908a3 30111->30184 30192 6e90980 30111->30192 30197 6e90040 30111->30197 30203 6e9056f 30111->30203 30208 6e900ef 30111->30208 30112 73df9a2 30112->30107 30127 73df99a 30126->30127 30129 6e907a9 2 API calls 30127->30129 30130 6e900ef 2 API calls 30127->30130 30131 6e9056f 2 API calls 30127->30131 30132 6e90040 2 API calls 30127->30132 30133 6e90980 2 API calls 30127->30133 30134 6e908a3 4 API calls 30127->30134 30135 6e90105 2 API calls 30127->30135 30136 6e902e7 2 API calls 30127->30136 30137 6e90859 2 API calls 30127->30137 30138 6e9003b 2 API calls 30127->30138 30139 6e90394 2 API calls 30127->30139 30140 6e906f7 2 API calls 30127->30140 30141 6e903f6 4 API calls 30127->30141 30128 73df9a2 30128->30107 30129->30128 30130->30128 30131->30128 30132->30128 30133->30128 30134->30128 30135->30128 30136->30128 30137->30128 30138->30128 30139->30128 30140->30128 30141->30128 30213 73de158 30142->30213 30217 73de153 30142->30217 30143 6e907c3 30147 6e90518 30146->30147 30148 6e9052b 30146->30148 30229 73de2eb 30147->30229 30233 73de2f0 30147->30233 30221 73de22b 30148->30221 30225 73de230 30148->30225 30149 6e90961 30156 73de2eb WriteProcessMemory 30154->30156 30157 73de2f0 WriteProcessMemory 30154->30157 30155 6e90725 30156->30155 30157->30155 30159 6e9039d 30158->30159 30161 73de2eb WriteProcessMemory 30159->30161 30162 73de2f0 WriteProcessMemory 30159->30162 30160 6e90a14 30161->30160 30162->30160 30165 6e90073 30163->30165 30164 6e90133 30164->30112 30165->30164 30237 73de9a4 30165->30237 30241 73de9b0 30165->30241 30245 73de818 30169->30245 30249 73de810 30169->30249 30170 6e90884 30174 6e902f4 30173->30174 30253 73de0a8 30174->30253 30257 73de0a0 30174->30257 30175 6e909ac 30179 6e900f8 30178->30179 30180 6e90133 30179->30180 30182 73de9a4 CreateProcessA 30179->30182 30183 73de9b0 CreateProcessA 30179->30183 30180->30112 30181 6e901fd 30181->30112 30182->30181 30183->30181 30185 6e908b0 30184->30185 30186 6e908f7 30184->30186 30190 73de158 Wow64SetThreadContext 30185->30190 30191 73de153 Wow64SetThreadContext 30185->30191 30188 73de0a8 ResumeThread 30186->30188 30189 73de0a0 ResumeThread 30186->30189 30187 6e909ac 30188->30187 30189->30187 30190->30186 30191->30186 30193 6e90986 30192->30193 30195 73de0a8 ResumeThread 30193->30195 30196 73de0a0 ResumeThread 30193->30196 30194 6e909ac 30195->30194 30196->30194 30199 6e90073 30197->30199 30198 6e90133 30198->30112 30199->30198 30201 73de9a4 CreateProcessA 30199->30201 30202 73de9b0 CreateProcessA 30199->30202 30200 6e901fd 30200->30112 30201->30200 30202->30200 30204 6e90518 30203->30204 30206 73de2eb WriteProcessMemory 30204->30206 30207 73de2f0 WriteProcessMemory 30204->30207 30205 6e90961 30206->30205 30207->30205 30209 6e900f8 30208->30209 30211 73de9a4 CreateProcessA 30209->30211 30212 73de9b0 CreateProcessA 30209->30212 30210 6e901fd 30210->30112 30211->30210 30212->30210 30214 73de19d Wow64SetThreadContext 30213->30214 30216 73de1e5 30214->30216 30216->30143 30218 73de159 Wow64SetThreadContext 30217->30218 30220 73de1e5 30218->30220 30220->30143 30222 73de270 VirtualAllocEx 30221->30222 30224 73de2ad 30222->30224 30224->30147 30226 73de270 VirtualAllocEx 30225->30226 30228 73de2ad 30226->30228 30228->30147 30230 73de338 WriteProcessMemory 30229->30230 30232 73de38f 30230->30232 30232->30149 30234 73de338 WriteProcessMemory 30233->30234 30236 73de38f 30234->30236 30236->30149 30238 73de9a9 CreateProcessA 30237->30238 30240 73debfb 30238->30240 30242 73de9b3 CreateProcessA 30241->30242 30244 73debfb 30242->30244 30246 73de863 ReadProcessMemory 30245->30246 30248 73de8a7 30246->30248 30248->30170 30250 73de863 ReadProcessMemory 30249->30250 30252 73de8a7 30250->30252 30252->30170 30254 73de0e8 ResumeThread 30253->30254 30256 73de119 30254->30256 30256->30175 30258 73de0e8 ResumeThread 30257->30258 30260 73de119 30258->30260 30260->30175

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 73de9a4-73dea45 5 73dea7e-73dea9e 0->5 6 73dea47-73dea51 0->6 11 73dead7-73deb06 5->11 12 73deaa0-73deaaa 5->12 6->5 7 73dea53-73dea55 6->7 9 73dea78-73dea7b 7->9 10 73dea57-73dea61 7->10 9->5 13 73dea65-73dea74 10->13 14 73dea63 10->14 22 73deb3f-73debf9 CreateProcessA 11->22 23 73deb08-73deb12 11->23 12->11 15 73deaac-73deaae 12->15 13->13 16 73dea76 13->16 14->13 17 73dead1-73dead4 15->17 18 73deab0-73deaba 15->18 16->9 17->11 20 73deabc 18->20 21 73deabe-73deacd 18->21 20->21 21->21 24 73deacf 21->24 34 73debfb-73dec01 22->34 35 73dec02-73dec88 22->35 23->22 25 73deb14-73deb16 23->25 24->17 27 73deb39-73deb3c 25->27 28 73deb18-73deb22 25->28 27->22 29 73deb24 28->29 30 73deb26-73deb35 28->30 29->30 30->30 31 73deb37 30->31 31->27 34->35 45 73dec98-73dec9c 35->45 46 73dec8a-73dec8e 35->46 48 73decac-73decb0 45->48 49 73dec9e-73deca2 45->49 46->45 47 73dec90 46->47 47->45 51 73decc0-73decc4 48->51 52 73decb2-73decb6 48->52 49->48 50 73deca4 49->50 50->48 53 73decd6-73decdd 51->53 54 73decc6-73deccc 51->54 52->51 55 73decb8 52->55 56 73decdf-73decee 53->56 57 73decf4 53->57 54->53 55->51 56->57 59 73decf5 57->59 59->59
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073DEBE6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323599975.00000000073D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_73d0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID: mW$mW
                                              • API String ID: 963392458-2417662838
                                              • Opcode ID: 93114ce0e5f1a3a891250a3f990282bdf8af64d9dbdd5d4ef3d56e76ce042842
                                              • Instruction ID: d13b64c7de1e8ebac189eb0564978822e5ef58042b9c9b975af33c19b87262db
                                              • Opcode Fuzzy Hash: 93114ce0e5f1a3a891250a3f990282bdf8af64d9dbdd5d4ef3d56e76ce042842
                                              • Instruction Fuzzy Hash: E9A14DB2D1021ADFEB24DF68D841BDDBBB2BF48310F148569E849AB240DB749D85CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 60 73de9b0-73dea45 63 73dea7e-73dea9e 60->63 64 73dea47-73dea51 60->64 69 73dead7-73deb06 63->69 70 73deaa0-73deaaa 63->70 64->63 65 73dea53-73dea55 64->65 67 73dea78-73dea7b 65->67 68 73dea57-73dea61 65->68 67->63 71 73dea65-73dea74 68->71 72 73dea63 68->72 80 73deb3f-73debf9 CreateProcessA 69->80 81 73deb08-73deb12 69->81 70->69 73 73deaac-73deaae 70->73 71->71 74 73dea76 71->74 72->71 75 73dead1-73dead4 73->75 76 73deab0-73deaba 73->76 74->67 75->69 78 73deabc 76->78 79 73deabe-73deacd 76->79 78->79 79->79 82 73deacf 79->82 92 73debfb-73dec01 80->92 93 73dec02-73dec88 80->93 81->80 83 73deb14-73deb16 81->83 82->75 85 73deb39-73deb3c 83->85 86 73deb18-73deb22 83->86 85->80 87 73deb24 86->87 88 73deb26-73deb35 86->88 87->88 88->88 89 73deb37 88->89 89->85 92->93 103 73dec98-73dec9c 93->103 104 73dec8a-73dec8e 93->104 106 73decac-73decb0 103->106 107 73dec9e-73deca2 103->107 104->103 105 73dec90 104->105 105->103 109 73decc0-73decc4 106->109 110 73decb2-73decb6 106->110 107->106 108 73deca4 107->108 108->106 111 73decd6-73decdd 109->111 112 73decc6-73deccc 109->112 110->109 113 73decb8 110->113 114 73decdf-73decee 111->114 115 73decf4 111->115 112->111 113->109 114->115 117 73decf5 115->117 117->117
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073DEBE6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323599975.00000000073D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_73d0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID: mW$mW
                                              • API String ID: 963392458-2417662838
                                              • Opcode ID: 730970f2c674fdc3e04e843ee3841d66c1e1e51b342112a313b0374e4db4207e
                                              • Instruction ID: 30414b596af5a1e7bb3fdabe78faf451a4a777f30c44ae9a6a4f3ea969883dce
                                              • Opcode Fuzzy Hash: 730970f2c674fdc3e04e843ee3841d66c1e1e51b342112a313b0374e4db4207e
                                              • Instruction Fuzzy Hash: B9914DB1D0021ADFEB24DF68D8417DDBBB2BF48310F148569E849AB240DB749985CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 118 f6a9e8-f6a9f7 119 f6aa23-f6aa27 118->119 120 f6a9f9-f6aa06 call f69d40 118->120 122 f6aa3b-f6aa7c 119->122 123 f6aa29-f6aa33 119->123 125 f6aa1c 120->125 126 f6aa08 120->126 129 f6aa7e-f6aa86 122->129 130 f6aa89-f6aa97 122->130 123->122 125->119 175 f6aa0e call f6ac80 126->175 176 f6aa0e call f6ac70 126->176 129->130 131 f6aabb-f6aabd 130->131 132 f6aa99-f6aa9e 130->132 137 f6aac0-f6aac7 131->137 134 f6aaa0-f6aaa7 call f69d4c 132->134 135 f6aaa9 132->135 133 f6aa14-f6aa16 133->125 136 f6ab58-f6ac18 133->136 139 f6aaab-f6aab9 134->139 135->139 168 f6ac20-f6ac4b GetModuleHandleW 136->168 169 f6ac1a-f6ac1d 136->169 140 f6aad4-f6aadb 137->140 141 f6aac9-f6aad1 137->141 139->137 143 f6aadd-f6aae5 140->143 144 f6aae8-f6aaf1 call f69d5c 140->144 141->140 143->144 149 f6aaf3-f6aafb 144->149 150 f6aafe-f6ab03 144->150 149->150 151 f6ab05-f6ab0c 150->151 152 f6ab21-f6ab25 150->152 151->152 154 f6ab0e-f6ab1e call f69d6c call f69d7c 151->154 173 f6ab28 call f6af80 152->173 174 f6ab28 call f6af50 152->174 154->152 157 f6ab2b-f6ab2e 159 f6ab30-f6ab4e 157->159 160 f6ab51-f6ab57 157->160 159->160 170 f6ac54-f6ac68 168->170 171 f6ac4d-f6ac53 168->171 169->168 171->170 173->157 174->157 175->133 176->133
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00F6AC3E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2317882682.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_f60000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID: mW
                                              • API String ID: 4139908857-3395524699
                                              • Opcode ID: 651549cb0103fae44a0b16cb0296cd6884ec27f184355900d7d97d682c847dc4
                                              • Instruction ID: be07649ad0429d060e4dbdd614b0f7c84eaefa6d140556786479c2be7d8fe8ba
                                              • Opcode Fuzzy Hash: 651549cb0103fae44a0b16cb0296cd6884ec27f184355900d7d97d682c847dc4
                                              • Instruction Fuzzy Hash: C4711170A00B058FDB24DF69D54175ABBF1FB88310F008A2AD48AA7A50DB78E945DF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 177 73de2eb-73de33e 179 73de34e-73de38d WriteProcessMemory 177->179 180 73de340-73de34c 177->180 182 73de38f-73de395 179->182 183 73de396-73de3c6 179->183 180->179 182->183
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073DE380
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323599975.00000000073D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_73d0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID: mW
                                              • API String ID: 3559483778-3395524699
                                              • Opcode ID: 30ab9873da1cc621a9e9de6ee93ca8ba4a072fe9c65453f3543d67eda105faeb
                                              • Instruction ID: 9f4b6e2c2aa3fd40d5cc871ca26e0d1ad60fd27ea664712dca57d691515968a4
                                              • Opcode Fuzzy Hash: 30ab9873da1cc621a9e9de6ee93ca8ba4a072fe9c65453f3543d67eda105faeb
                                              • Instruction Fuzzy Hash: D02137B290034A9FDB10CFA9C881BEEBBF4BF48310F108429E919A7240C7799950CBA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 187 73de2f0-73de33e 189 73de34e-73de38d WriteProcessMemory 187->189 190 73de340-73de34c 187->190 192 73de38f-73de395 189->192 193 73de396-73de3c6 189->193 190->189 192->193
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073DE380
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323599975.00000000073D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_73d0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID: mW
                                              • API String ID: 3559483778-3395524699
                                              • Opcode ID: 05b57d73b60dd4040cc30828bd90d9eb2d3980b4c7e221e7cf0226ae2ce3add5
                                              • Instruction ID: 3f136ea26df65951f6adfacc550e986aa4b31421800060d97320830145706f8e
                                              • Opcode Fuzzy Hash: 05b57d73b60dd4040cc30828bd90d9eb2d3980b4c7e221e7cf0226ae2ce3add5
                                              • Instruction Fuzzy Hash: F4212AB29003499FDF10CFA9C881BEEBBF5FF48710F108429E918A7240C7799950CBA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 197 73de810-73de8a5 ReadProcessMemory 200 73de8ae-73de8de 197->200 201 73de8a7-73de8ad 197->201 201->200
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073DE898
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323599975.00000000073D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_73d0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID: mW
                                              • API String ID: 1726664587-3395524699
                                              • Opcode ID: 39b4fb8110cddf7a5f3911718d21c7a782885bb0c9b5f8da6876c274ff8614b1
                                              • Instruction ID: 6c5b45aba1cefa71876c9918e4f789b3002f9ca38c5242e5a368e9e537df03d2
                                              • Opcode Fuzzy Hash: 39b4fb8110cddf7a5f3911718d21c7a782885bb0c9b5f8da6876c274ff8614b1
                                              • Instruction Fuzzy Hash: 292119B1D0134A9FDB10DFA9C881AEEBBF5FF48710F148829E519A7240C7799950CB65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 205 f6b3d0-f6d354 DuplicateHandle 207 f6d356-f6d35c 205->207 208 f6d35d-f6d37a 205->208 207->208
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00F6D286,?,?,?,?,?), ref: 00F6D347
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2317882682.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_f60000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID: mW
                                              • API String ID: 3793708945-3395524699
                                              • Opcode ID: 74cf708949dea30e8a526b9de5face882c0d313e68cdadfa1bc1e1ec72d0e09c
                                              • Instruction ID: 519de785c0d47e6f801cd462e30c131710ee808e64a5d01b14d3670764c084df
                                              • Opcode Fuzzy Hash: 74cf708949dea30e8a526b9de5face882c0d313e68cdadfa1bc1e1ec72d0e09c
                                              • Instruction Fuzzy Hash: 5221E5B5D00209EFDB10CF9AD984ADEBBF8EB48320F14841AE914A3310D374A950CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 211 73de153-73de1a3 214 73de1a5-73de1b1 211->214 215 73de1b3-73de1e3 Wow64SetThreadContext 211->215 214->215 217 73de1ec-73de21c 215->217 218 73de1e5-73de1eb 215->218 218->217
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 073DE1D6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323599975.00000000073D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_73d0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID: mW
                                              • API String ID: 983334009-3395524699
                                              • Opcode ID: ee4603f2df6da7117e6a7e34623698bd54a57af3efe6968830784b11e6443261
                                              • Instruction ID: 3d800d0483bfe0cee3cde34d7a54c45f3e4e3188996675332195ae8caa238e96
                                              • Opcode Fuzzy Hash: ee4603f2df6da7117e6a7e34623698bd54a57af3efe6968830784b11e6443261
                                              • Instruction Fuzzy Hash: 31211AB1D003099FEB10DFAAC885BEEBBF4EF88324F148429D519A7241D7789944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 222 73de158-73de1a3 224 73de1a5-73de1b1 222->224 225 73de1b3-73de1e3 Wow64SetThreadContext 222->225 224->225 227 73de1ec-73de21c 225->227 228 73de1e5-73de1eb 225->228 228->227
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 073DE1D6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323599975.00000000073D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_73d0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID: mW
                                              • API String ID: 983334009-3395524699
                                              • Opcode ID: 3a73f5656ff7d0f098210fc0fc90660fe1396ca8c7aaca1ef415ca433ea232dc
                                              • Instruction ID: d209a38fd7f833eac51ebfbb8ce731da721b3cd7dc72145b76a9096bc4b2f334
                                              • Opcode Fuzzy Hash: 3a73f5656ff7d0f098210fc0fc90660fe1396ca8c7aaca1ef415ca433ea232dc
                                              • Instruction Fuzzy Hash: 24211AB1D003099FEB10DFAAC8857AEBBF4AF48714F148429D519A7241D7789944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 232 73de818-73de8a5 ReadProcessMemory 235 73de8ae-73de8de 232->235 236 73de8a7-73de8ad 232->236 236->235
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073DE898
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323599975.00000000073D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_73d0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID: mW
                                              • API String ID: 1726664587-3395524699
                                              • Opcode ID: 20f388181176efb9122bfa2e247e753fc99c0d34eacfe8b792e75a434456e1be
                                              • Instruction ID: 44da99cc8dbb1ff95f236146bc89978fdb52c217a8e2a54917e59c7d6f1daccf
                                              • Opcode Fuzzy Hash: 20f388181176efb9122bfa2e247e753fc99c0d34eacfe8b792e75a434456e1be
                                              • Instruction Fuzzy Hash: 0D2116B1C003499FDB10DFAAC881AEEBBF5FF48710F108829E518A7240C7799950CBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 240 f6d2bb-f6d354 DuplicateHandle 241 f6d356-f6d35c 240->241 242 f6d35d-f6d37a 240->242 241->242
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00F6D286,?,?,?,?,?), ref: 00F6D347
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2317882682.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_f60000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID: mW
                                              • API String ID: 3793708945-3395524699
                                              • Opcode ID: 7538418450f535982e430b9f953fbb9c9a67386a1d0fd664247514043654de46
                                              • Instruction ID: 95cdc84957f9edbb37cdea7e2937a9068af441629c99007639db5381fb6c43b6
                                              • Opcode Fuzzy Hash: 7538418450f535982e430b9f953fbb9c9a67386a1d0fd664247514043654de46
                                              • Instruction Fuzzy Hash: 5F21C2B5D00209DFDB10CFAAD984ADEBBF9FB48320F14841AE918A7350D379A954CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 245 73de22b-73de2ab VirtualAllocEx 248 73de2ad-73de2b3 245->248 249 73de2b4-73de2d9 245->249 248->249
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073DE29E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323599975.00000000073D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_73d0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID: mW
                                              • API String ID: 4275171209-3395524699
                                              • Opcode ID: cfee80d4c9bb0b176600acc9f955704c0d761e1ca7511352ec4f8aa774dca35e
                                              • Instruction ID: 83c54717621c0f03ad86321440af9ce0af76a8940ca2a377d784a5f5bb235a20
                                              • Opcode Fuzzy Hash: cfee80d4c9bb0b176600acc9f955704c0d761e1ca7511352ec4f8aa774dca35e
                                              • Instruction Fuzzy Hash: 7A1159729003499FDB10DFA9C945BDFBBF5AF88310F148819E519A7250D7759910CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 253 f694d8-f69534 255 f69536-f6955e KiUserCallbackDispatcher 253->255 256 f69582-f6959b 253->256 257 f69567-f6957b 255->257 258 f69560-f69566 255->258 257->256 258->257
                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 00F6954D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2317882682.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_f60000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID: mW
                                              • API String ID: 2492992576-3395524699
                                              • Opcode ID: fe05479deb556eaab4655658a6583c25a2df10d66b4a9b60fcf2bf284d6694ed
                                              • Instruction ID: 9c6a755043a6f5d4862523662470a4e32eeb23dc33a3646a2902602ad5711209
                                              • Opcode Fuzzy Hash: fe05479deb556eaab4655658a6583c25a2df10d66b4a9b60fcf2bf284d6694ed
                                              • Instruction Fuzzy Hash: E52103B1808389CFDB11CF99D9043EEBFF4EB05718F144099C599A7242C3B9AA05DFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 260 73de230-73de2ab VirtualAllocEx 263 73de2ad-73de2b3 260->263 264 73de2b4-73de2d9 260->264 263->264
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073DE29E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323599975.00000000073D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_73d0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID: mW
                                              • API String ID: 4275171209-3395524699
                                              • Opcode ID: 62bf587408c1c52f870b4c38125f338f47640bc6b0cf81e3bad44785497462f6
                                              • Instruction ID: 3542394fd4a7cf07846257c03fcb845d6b6f5254f88184e42bd3263a968a8fa1
                                              • Opcode Fuzzy Hash: 62bf587408c1c52f870b4c38125f338f47640bc6b0cf81e3bad44785497462f6
                                              • Instruction Fuzzy Hash: 4E1156728003499FDB10DFAAC845BDEBBF5AF88320F108819E519A7250C775A910CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 268 73de0a0-73de117 ResumeThread 271 73de119-73de11f 268->271 272 73de120-73de145 268->272 271->272
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323599975.00000000073D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_73d0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID: mW
                                              • API String ID: 947044025-3395524699
                                              • Opcode ID: 79aeb93b785a94b7bfd535bcfc22f1d246ea32051caa52c42c4c5de50cde5e81
                                              • Instruction ID: 7742af11ec683af89c3612286bbf65b3d99cc468719cf253130cf2ec11987709
                                              • Opcode Fuzzy Hash: 79aeb93b785a94b7bfd535bcfc22f1d246ea32051caa52c42c4c5de50cde5e81
                                              • Instruction Fuzzy Hash: A8115BB1D0034A8FDB20DFAAC94579EFBF4AF88720F248819D519A7240C779A944CB95
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323599975.00000000073D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_73d0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID: mW
                                              • API String ID: 947044025-3395524699
                                              • Opcode ID: 143902655f6f29354c5529783ce28ff194aebf35a4bb629ea1dbab33920be306
                                              • Instruction ID: 8088a3cf41a3b95ab527ebe7eb095e18e1d2c7a8371bbf339d3088db4a7d897c
                                              • Opcode Fuzzy Hash: 143902655f6f29354c5529783ce28ff194aebf35a4bb629ea1dbab33920be306
                                              • Instruction Fuzzy Hash: CF113AB1D003498FDB10DFAAC84579EFBF4EF88724F248819D519A7240CB79A940CF95
                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 00F6954D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2317882682.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_f60000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID: mW
                                              • API String ID: 2492992576-3395524699
                                              • Opcode ID: b05b70e4967c8831c5123c0aa578cef00b26249fdca7e9aa435699c9fca16e33
                                              • Instruction ID: 06d2df98f4d6c959a27b51fc589cc1b2f49d967585d0aba7b37ff05449db59e6
                                              • Opcode Fuzzy Hash: b05b70e4967c8831c5123c0aa578cef00b26249fdca7e9aa435699c9fca16e33
                                              • Instruction Fuzzy Hash: 9D11BFB1808789CFDB11CF99D9053EEBFF8EB04714F148059D559A3242C3B9AA04DFA5
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00F6AC3E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2317882682.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_f60000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID: mW
                                              • API String ID: 4139908857-3395524699
                                              • Opcode ID: 1cb3c4937647b7ee95af4171f5153406eff30aafe903b745683a312e473de78a
                                              • Instruction ID: 51bc89b3677efb855e1ecd16357684aa7a43f73538a9cdce8144f36eb65b0782
                                              • Opcode Fuzzy Hash: 1cb3c4937647b7ee95af4171f5153406eff30aafe903b745683a312e473de78a
                                              • Instruction Fuzzy Hash: 24110FB6C003498FDB10CF9AC544A9EFBF8AB88324F10841AD828B7200C3B9A545CFA5
                                              APIs
                                              • PostMessageW.USER32(?,?,?,?), ref: 06E9125D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323300559.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6e90000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID: mW
                                              • API String ID: 410705778-3395524699
                                              • Opcode ID: 38682740a24e7e0e6d5496c1eab0277183e2a894e3e5e67a4905d2b64deb6563
                                              • Instruction ID: 0773cfb4b311836977152a635c3c1f59c4568ceff09a3baf578c00713563f4c8
                                              • Opcode Fuzzy Hash: 38682740a24e7e0e6d5496c1eab0277183e2a894e3e5e67a4905d2b64deb6563
                                              • Instruction Fuzzy Hash: D011F2B58003499FDB10DF99D985BDEBBF8EB48320F20841AE918A7200C375AA54CFA0
                                              APIs
                                              • PostMessageW.USER32(?,?,?,?), ref: 06E9125D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323300559.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6e90000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID: mW
                                              • API String ID: 410705778-3395524699
                                              • Opcode ID: d43145fb179f72737881fad5eccb56fd636f8a81a5411958fb15bbe23a902c38
                                              • Instruction ID: 4b4a9b6c57775a27f0619b5dc1316a9333208738c1c56812327740b6d051b36d
                                              • Opcode Fuzzy Hash: d43145fb179f72737881fad5eccb56fd636f8a81a5411958fb15bbe23a902c38
                                              • Instruction Fuzzy Hash: 8D11D3B58003499FDB10DF9AD985BDEFBF8EB48724F20841AD518A7200D3B5A554CFA5
                                              APIs
                                              • CloseHandle.KERNELBASE(?), ref: 06E92990
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323300559.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6e90000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID: mW
                                              • API String ID: 2962429428-3395524699
                                              • Opcode ID: 452c03f6d2a20e5bb5e57f0ced68ce75e8f4203597851efa97766e0c81ebca2d
                                              • Instruction ID: da4f3cbc42c7cf68cc97d33bba0dd92004ea7f57194ab011309f20d4572d4c62
                                              • Opcode Fuzzy Hash: 452c03f6d2a20e5bb5e57f0ced68ce75e8f4203597851efa97766e0c81ebca2d
                                              • Instruction Fuzzy Hash: F111E3B58007499FDB10DF9AC945BDEBBF8EF48320F10841AD958A7240D779A644CBA5
                                              APIs
                                              • CloseHandle.KERNELBASE(?), ref: 06E92990
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2323300559.0000000006E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_6e90000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID: mW
                                              • API String ID: 2962429428-3395524699
                                              • Opcode ID: 2bc4d29098f7b4c5c2720e254953083495255f9b2b1103af7027cdd149b5c357
                                              • Instruction ID: 160759c484e0beca324d48f78de36aeb5a58c36dab4650f88f046a5548010930
                                              • Opcode Fuzzy Hash: 2bc4d29098f7b4c5c2720e254953083495255f9b2b1103af7027cdd149b5c357
                                              • Instruction Fuzzy Hash: 1211F2B5C003499FDB10DF9AC545BDEBBF4EF48320F20841AD958A7240D779A644CFA5
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2316019613.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_c8d000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9ff6ddb07ba8424d39e5494cc5d1b60523cd3f0a0a11289e52b9e5ffb94e750f
                                              • Instruction ID: 3068ee07f3b6df73c44209e9e812bfc9c55cde2db597600bcb81f979127dd881
                                              • Opcode Fuzzy Hash: 9ff6ddb07ba8424d39e5494cc5d1b60523cd3f0a0a11289e52b9e5ffb94e750f
                                              • Instruction Fuzzy Hash: 1521F275504304EFDB04EF14D9C8B2ABBA5FF84328F20C56DE90A4B296C77AD846CB61
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2316019613.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_c8d000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6b92c0c29f42972901f05c0557f444f8091baed6fe8e324b9a59ddb43e9e1678
                                              • Instruction ID: 1c831ddad6afb91d1cb8d787b6091f3ecb2ae8195c3491498565238a2acab70e
                                              • Opcode Fuzzy Hash: 6b92c0c29f42972901f05c0557f444f8091baed6fe8e324b9a59ddb43e9e1678
                                              • Instruction Fuzzy Hash: 5721F575504204EFDB04EF14D5C0B26BBB5FB84728F24C56DE90A4B2A2C77AD846CB66
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2316019613.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_c8d000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                              • Instruction ID: 387ca7b63bbfaedba5eb04c6bac4df40b0b0c25636a388c6193ba98f4184c066
                                              • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                              • Instruction Fuzzy Hash: CB119D75504284DFCB05DF10D5C4B19BFB2FB84328F24C6A9D84A4B6A6C33AD94ACB62
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2315955968.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_c7d000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 08adebbfe76dda84d21be663a106a2d59ba089a05d7bf1e418f050a06bd6fbcd
                                              • Instruction ID: 25694bbe296c9ba2d0086fc764a19dfa2a5fd6eef17ad1d2f419acf35cdb631c
                                              • Opcode Fuzzy Hash: 08adebbfe76dda84d21be663a106a2d59ba089a05d7bf1e418f050a06bd6fbcd
                                              • Instruction Fuzzy Hash: BD01F2714043409AE7184A2ADD80B66BFA8EF41320F18C41AED1E4A28AC7B99840C6B1
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.2315955968.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_c7d000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 301d3245d9af514620273b09fc02664bc120c4171e9ccb26bff0a7351f6b3a2e
                                              • Instruction ID: fd56f7cef4cbd4fe2ebb637a8ecd1fd6edd1b4fe5d233aadad84815e770d154f
                                              • Opcode Fuzzy Hash: 301d3245d9af514620273b09fc02664bc120c4171e9ccb26bff0a7351f6b3a2e
                                              • Instruction Fuzzy Hash: F4F0C2714043449EE7148A06DCC4B62FFACEF51734F18C45AED1D0E286C379A840CAB1

                                              Execution Graph

                                              Execution Coverage:11%
                                              Dynamic/Decrypted Code Coverage:92.9%
                                              Signature Coverage:0%
                                              Total number of Nodes:14
                                              Total number of Limit Nodes:2
                                              execution_graph 28556 f970b8 28557 f970fc CheckRemoteDebuggerPresent 28556->28557 28558 f9713e 28557->28558 28559 f9edd0 DuplicateHandle 28560 f9ee66 28559->28560 28561 667f858 28562 667f865 28561->28562 28563 667f88d 28561->28563 28569 667efc0 28563->28569 28566 667f8ae 28567 667f976 GlobalMemoryStatusEx 28568 667f9a6 28567->28568 28570 667f930 GlobalMemoryStatusEx 28569->28570 28572 667f8aa 28570->28572 28572->28566 28572->28567

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1216 667f858-667f863 1217 667f865-667f88c call 667efb4 1216->1217 1218 667f88d-667f8ac call 667efc0 1216->1218 1224 667f8b2-667f911 1218->1224 1225 667f8ae-667f8b1 1218->1225 1232 667f917-667f9a4 GlobalMemoryStatusEx 1224->1232 1233 667f913-667f916 1224->1233 1237 667f9a6-667f9ac 1232->1237 1238 667f9ad-667f9d5 1232->1238 1237->1238
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3442743268.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_6670000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f9c4bcefc7bf7123c8eef00b4978f40a79fb3e389e545dcf5456257557dbb112
                                              • Instruction ID: 43a2238c043b4298f881c7ea80f450aefdebde12c2e9875e153d7471bb91da51
                                              • Opcode Fuzzy Hash: f9c4bcefc7bf7123c8eef00b4978f40a79fb3e389e545dcf5456257557dbb112
                                              • Instruction Fuzzy Hash: 69412272D043999FCB04CFBAD8006AEBBF5AFC9210F1485AAD508E7341DB789845CBE1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1241 f970b0-f9713c CheckRemoteDebuggerPresent 1244 f9713e-f97144 1241->1244 1245 f97145-f97180 1241->1245 1244->1245
                                              APIs
                                              • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 00F9712F
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3419955097.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_f90000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CheckDebuggerPresentRemote
                                              • String ID:
                                              • API String ID: 3662101638-0
                                              • Opcode ID: c5dd9fd1c72476cc1f6acbfa8164a17fdfe4bb4b29036772b856dca73eece444
                                              • Instruction ID: 01c7a0fc7ed76c2db00e9a253fdc971e1da533b33a6c5d5e55e18b7f5634d1bb
                                              • Opcode Fuzzy Hash: c5dd9fd1c72476cc1f6acbfa8164a17fdfe4bb4b29036772b856dca73eece444
                                              • Instruction Fuzzy Hash: 91213971900359CFDB04CFAAD4847EEBBF4AF48320F14845EE459A7250D778A944CF60

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1248 f9edc8-f9edcf 1249 f9edd0-f9ee64 DuplicateHandle 1248->1249 1250 f9ee6d-f9ee8a 1249->1250 1251 f9ee66-f9ee6c 1249->1251 1251->1250
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00F9EE57
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3419955097.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_f90000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: df4a4b7bef686ce496c30531a16c3ca4ddee889b7e07b342ef9be40ea6c29878
                                              • Instruction ID: 3cdcce5cc529a605fcd11dd18c1ac0e9500521d7ec1ae2028e6a89879b5c56bc
                                              • Opcode Fuzzy Hash: df4a4b7bef686ce496c30531a16c3ca4ddee889b7e07b342ef9be40ea6c29878
                                              • Instruction Fuzzy Hash: 1D2105B5D00248AFDB10CFAAD884ADEBFF8FB48320F14801AE918A3350D375A950CF64

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1254 f970b8-f9713c CheckRemoteDebuggerPresent 1256 f9713e-f97144 1254->1256 1257 f97145-f97180 1254->1257 1256->1257
                                              APIs
                                              • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 00F9712F
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3419955097.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_f90000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CheckDebuggerPresentRemote
                                              • String ID:
                                              • API String ID: 3662101638-0
                                              • Opcode ID: d0cab74a140c30c359d309c5bb71de80a3eb01d2d1d86e51c07abd4c219fce44
                                              • Instruction ID: cfea4eb7a12210bc039fb4ab7609fe7c871d579d3ec5fa17bd0be46ebff48a2b
                                              • Opcode Fuzzy Hash: d0cab74a140c30c359d309c5bb71de80a3eb01d2d1d86e51c07abd4c219fce44
                                              • Instruction Fuzzy Hash: 962125B28003598FDB14CFAAD884BEEBBF4AF48320F14845AE459A3250D778A944CF61

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1260 f9edd0-f9ee64 DuplicateHandle 1261 f9ee6d-f9ee8a 1260->1261 1262 f9ee66-f9ee6c 1260->1262 1262->1261
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00F9EE57
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3419955097.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_f90000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 9f3eddc28b352bd8d8045cf09ac401002cd4767c555c227b5ca06b0652dc1c0d
                                              • Instruction ID: 7660cca0e1aaf8263d1d3c32c9d5f5c8eb2767ca75ac542f0ea13d21e38a04e5
                                              • Opcode Fuzzy Hash: 9f3eddc28b352bd8d8045cf09ac401002cd4767c555c227b5ca06b0652dc1c0d
                                              • Instruction Fuzzy Hash: 5221E3B5D002099FDB10CFAAD984ADEBBF4FB48320F14841AE918A3210D379A950CF64

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1265 667efc0-667f9a4 GlobalMemoryStatusEx 1268 667f9a6-667f9ac 1265->1268 1269 667f9ad-667f9d5 1265->1269 1268->1269
                                              APIs
                                              • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0667F8AA), ref: 0667F997
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3442743268.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_6670000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: 9af90678edd1d3ee8794651bb904d04ebd9dbc326db2fea6b167afdc34f8f11d
                                              • Instruction ID: 82dbf61ff701d03b4802aa350e943f992764499489f26fe27ff82178e4624a0a
                                              • Opcode Fuzzy Hash: 9af90678edd1d3ee8794651bb904d04ebd9dbc326db2fea6b167afdc34f8f11d
                                              • Instruction Fuzzy Hash: B61133B1C0065A9FCB10CFAAC444B9EFBF4BF48220F10812AE918A7240D378A910CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1272 667f928-667f96e 1274 667f976-667f9a4 GlobalMemoryStatusEx 1272->1274 1275 667f9a6-667f9ac 1274->1275 1276 667f9ad-667f9d5 1274->1276 1275->1276
                                              APIs
                                              • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0667F8AA), ref: 0667F997
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3442743268.0000000006670000.00000040.00000800.00020000.00000000.sdmp, Offset: 06670000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_6670000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: 5c2c71fe3e54a941fc405c6c8d71239ef21804b25c854c19f3f4e2fa868fd8b9
                                              • Instruction ID: d5318c1e86a7efd481f613b2ac22e9b6b9c991d5a8ebb8dde7633efb7e70600c
                                              • Opcode Fuzzy Hash: 5c2c71fe3e54a941fc405c6c8d71239ef21804b25c854c19f3f4e2fa868fd8b9
                                              • Instruction Fuzzy Hash: 641136B1C0065A9FDB10CF9AC944BDEFBF4BF48324F10815AE518A7240D778A954CFA5
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3416570450.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_ccd000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e71e232b27502a9a5dff602f2a2bff60a7b5db4c26df2930c68dce796b3a38a9
                                              • Instruction ID: b5c3e83412d077f8281046f2a09e7371c404c3036a85b6b5f848a5b1e1fbe3b8
                                              • Opcode Fuzzy Hash: e71e232b27502a9a5dff602f2a2bff60a7b5db4c26df2930c68dce796b3a38a9
                                              • Instruction Fuzzy Hash: EF21D075504244EFDB14DF18D9C0F26BBA5EB84314F24C5BDD90A4A292C77AD846CA62
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3416570450.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_ccd000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f269e984bca6b5cf8dafae82a4541c93f3404a4e70b73a7b87a563436c2c5245
                                              • Instruction ID: 5a8cdfea321b078383d42db0b147c1684abe3115de211bb4fe27490958679b2d
                                              • Opcode Fuzzy Hash: f269e984bca6b5cf8dafae82a4541c93f3404a4e70b73a7b87a563436c2c5245
                                              • Instruction Fuzzy Hash: A621307550D3C09FD713CF24C990B15BF71AB46214F29C5EBD8898F6A7C23A980ACB62

                                              Execution Graph

                                              Execution Coverage:8.9%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:216
                                              Total number of Limit Nodes:10
                                              execution_graph 26317 99d078 26318 99d0be GetCurrentProcess 26317->26318 26320 99d109 26318->26320 26321 99d110 GetCurrentThread 26318->26321 26320->26321 26322 99d14d GetCurrentProcess 26321->26322 26323 99d146 26321->26323 26324 99d183 GetCurrentThreadId 26322->26324 26323->26322 26326 99d1dc 26324->26326 26341 994528 26342 994537 26341->26342 26345 9943d4 26342->26345 26344 99453e 26346 9943df 26345->26346 26349 9944b4 26346->26349 26348 994925 26348->26344 26350 9944bf 26349->26350 26353 9944e4 26350->26353 26352 994a15 26352->26348 26354 9944ef 26353->26354 26357 994aa0 26354->26357 26356 994f0a 26356->26352 26358 994aab 26357->26358 26361 994ad0 26358->26361 26360 995014 26360->26356 26362 994adb 26361->26362 26367 9979b8 26362->26367 26364 997ec1 26364->26360 26365 997c98 26365->26364 26372 99c9b0 26365->26372 26368 9979c3 26367->26368 26369 99948a 26368->26369 26376 9994e8 26368->26376 26380 9994e0 26368->26380 26369->26365 26373 99c9d1 26372->26373 26374 99c9f5 26373->26374 26384 99cb60 26373->26384 26374->26364 26377 99952b 26376->26377 26378 999560 26377->26378 26379 999536 KiUserCallbackDispatcher 26377->26379 26378->26369 26379->26378 26381 99952b 26380->26381 26382 999536 KiUserCallbackDispatcher 26381->26382 26383 999560 26381->26383 26382->26383 26383->26369 26386 99cb6d 26384->26386 26385 99cba7 26385->26374 26386->26385 26388 99b3c0 26386->26388 26389 99b3cb 26388->26389 26390 99d8b8 26389->26390 26392 99ccc4 26389->26392 26393 99cccf 26392->26393 26394 994ad0 2 API calls 26393->26394 26395 99d927 26394->26395 26395->26390 26305 6c30f80 26306 6c3110b 26305->26306 26307 6c30fa6 26305->26307 26307->26306 26310 6c31200 PostMessageW 26307->26310 26312 6c311f8 26307->26312 26311 6c3126c 26310->26311 26311->26307 26313 6c31200 PostMessageW 26312->26313 26314 6c3126c 26313->26314 26314->26307 26315 99d2c0 DuplicateHandle 26316 99d356 26315->26316 26327 99a8f0 26331 99a9e8 26327->26331 26336 99a9e3 26327->26336 26328 99a8ff 26332 99aa1c 26331->26332 26333 99a9f9 26331->26333 26332->26328 26333->26332 26334 99ac20 GetModuleHandleW 26333->26334 26335 99ac4d 26334->26335 26335->26328 26337 99aa1c 26336->26337 26338 99a9f9 26336->26338 26337->26328 26338->26337 26339 99ac20 GetModuleHandleW 26338->26339 26340 99ac4d 26339->26340 26340->26328 26396 709ee32 26397 709edc6 26396->26397 26398 709eecc 26396->26398 26399 709eddb 26397->26399 26403 709f970 26397->26403 26420 709f9e6 26397->26420 26438 709f980 26397->26438 26404 709f974 26403->26404 26455 6c308a3 26404->26455 26463 6c30859 26404->26463 26467 6c30456 26404->26467 26472 6c303f6 26404->26472 26480 6c306f7 26404->26480 26484 6c300ef 26404->26484 26489 6c3056f 26404->26489 26494 6c307a9 26404->26494 26498 6c3038b 26404->26498 26503 6c30105 26404->26503 26509 6c302e7 26404->26509 26514 6c30980 26404->26514 26519 6c30040 26404->26519 26525 6c30023 26404->26525 26405 709f9a2 26405->26397 26421 709f974 26420->26421 26422 709f9e9 26420->26422 26424 6c308a3 4 API calls 26421->26424 26425 6c30023 2 API calls 26421->26425 26426 6c30040 2 API calls 26421->26426 26427 6c30980 2 API calls 26421->26427 26428 6c302e7 2 API calls 26421->26428 26429 6c30105 2 API calls 26421->26429 26430 6c3038b 2 API calls 26421->26430 26431 6c307a9 2 API calls 26421->26431 26432 6c3056f 2 API calls 26421->26432 26433 6c300ef 2 API calls 26421->26433 26434 6c306f7 2 API calls 26421->26434 26435 6c303f6 4 API calls 26421->26435 26436 6c30456 2 API calls 26421->26436 26437 6c30859 2 API calls 26421->26437 26422->26397 26423 709f9a2 26423->26397 26424->26423 26425->26423 26426->26423 26427->26423 26428->26423 26429->26423 26430->26423 26431->26423 26432->26423 26433->26423 26434->26423 26435->26423 26436->26423 26437->26423 26439 709f99a 26438->26439 26441 6c308a3 4 API calls 26439->26441 26442 6c30023 2 API calls 26439->26442 26443 6c30040 2 API calls 26439->26443 26444 6c30980 2 API calls 26439->26444 26445 6c302e7 2 API calls 26439->26445 26446 6c30105 2 API calls 26439->26446 26447 6c3038b 2 API calls 26439->26447 26448 6c307a9 2 API calls 26439->26448 26449 6c3056f 2 API calls 26439->26449 26450 6c300ef 2 API calls 26439->26450 26451 6c306f7 2 API calls 26439->26451 26452 6c303f6 4 API calls 26439->26452 26453 6c30456 2 API calls 26439->26453 26454 6c30859 2 API calls 26439->26454 26440 709f9a2 26440->26397 26441->26440 26442->26440 26443->26440 26444->26440 26445->26440 26446->26440 26447->26440 26448->26440 26449->26440 26450->26440 26451->26440 26452->26440 26453->26440 26454->26440 26456 6c308b0 26455->26456 26457 6c308f7 26455->26457 26531 709e158 26456->26531 26535 709e151 26456->26535 26539 709e0a8 26457->26539 26543 709e0a0 26457->26543 26458 6c309ac 26458->26458 26547 709e818 26463->26547 26551 709e810 26463->26551 26464 6c30884 26468 6c30394 26467->26468 26555 709e2e8 26468->26555 26559 709e2f0 26468->26559 26469 6c30a14 26473 6c3052b 26472->26473 26474 6c30518 26472->26474 26563 709e228 26473->26563 26567 709e230 26473->26567 26476 709e2e8 WriteProcessMemory 26474->26476 26477 709e2f0 WriteProcessMemory 26474->26477 26475 6c30961 26476->26475 26477->26475 26482 709e2e8 WriteProcessMemory 26480->26482 26483 709e2f0 WriteProcessMemory 26480->26483 26481 6c30725 26482->26481 26483->26481 26485 6c300f8 26484->26485 26571 709e9b0 26485->26571 26575 709e9a4 26485->26575 26490 6c30518 26489->26490 26492 709e2e8 WriteProcessMemory 26490->26492 26493 709e2f0 WriteProcessMemory 26490->26493 26491 6c30961 26492->26491 26493->26491 26496 709e158 Wow64SetThreadContext 26494->26496 26497 709e151 Wow64SetThreadContext 26494->26497 26495 6c307c3 26496->26495 26497->26495 26499 6c309f0 26498->26499 26501 709e2e8 WriteProcessMemory 26499->26501 26502 709e2f0 WriteProcessMemory 26499->26502 26500 6c30a14 26501->26500 26502->26500 26505 6c300f8 26503->26505 26504 6c30133 26504->26405 26505->26504 26507 709e9b0 CreateProcessA 26505->26507 26508 709e9a4 CreateProcessA 26505->26508 26506 6c301fd 26506->26405 26507->26506 26508->26506 26510 6c302f4 26509->26510 26512 709e0a8 ResumeThread 26510->26512 26513 709e0a0 ResumeThread 26510->26513 26511 6c309ac 26512->26511 26513->26511 26515 6c30986 26514->26515 26517 709e0a8 ResumeThread 26515->26517 26518 709e0a0 ResumeThread 26515->26518 26516 6c309ac 26517->26516 26518->26516 26521 6c30073 26519->26521 26520 6c30133 26520->26405 26521->26520 26523 709e9b0 CreateProcessA 26521->26523 26524 709e9a4 CreateProcessA 26521->26524 26522 6c301fd 26522->26405 26523->26522 26524->26522 26527 6c3003a 26525->26527 26526 6c30133 26526->26405 26527->26526 26529 709e9b0 CreateProcessA 26527->26529 26530 709e9a4 CreateProcessA 26527->26530 26528 6c301fd 26528->26405 26529->26528 26530->26528 26532 709e19d Wow64SetThreadContext 26531->26532 26534 709e1e5 26532->26534 26534->26457 26536 709e159 Wow64SetThreadContext 26535->26536 26538 709e1e5 26536->26538 26538->26457 26540 709e0e8 ResumeThread 26539->26540 26542 709e119 26540->26542 26542->26458 26544 709e0a8 ResumeThread 26543->26544 26546 709e119 26544->26546 26546->26458 26548 709e863 ReadProcessMemory 26547->26548 26550 709e8a7 26548->26550 26550->26464 26552 709e818 ReadProcessMemory 26551->26552 26554 709e8a7 26552->26554 26554->26464 26556 709e338 WriteProcessMemory 26555->26556 26558 709e38f 26556->26558 26558->26469 26560 709e338 WriteProcessMemory 26559->26560 26562 709e38f 26560->26562 26562->26469 26564 709e230 VirtualAllocEx 26563->26564 26566 709e2ad 26564->26566 26566->26474 26568 709e270 VirtualAllocEx 26567->26568 26570 709e2ad 26568->26570 26570->26474 26572 709ea39 CreateProcessA 26571->26572 26574 709ebfb 26572->26574 26576 709e9a9 CreateProcessA 26575->26576 26578 709ebfb 26576->26578 26578->26578 26579 6c32938 CloseHandle 26580 6c32992 26579->26580

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 0099D0F6
                                              • GetCurrentThread.KERNEL32 ref: 0099D133
                                              • GetCurrentProcess.KERNEL32 ref: 0099D170
                                              • GetCurrentThreadId.KERNEL32 ref: 0099D1C9
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2394287652.0000000000990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_990000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: a1d9e1d78c42bf557aef53adda5c212036d08e06d6a2785a7ba5ee0af78e6546
                                              • Instruction ID: 0e492a0014968f5523baab0e324a848e2717e36650abecd813238f6293afd497
                                              • Opcode Fuzzy Hash: a1d9e1d78c42bf557aef53adda5c212036d08e06d6a2785a7ba5ee0af78e6546
                                              • Instruction Fuzzy Hash: B05178B1911349CFDB18CFAAD988B9EBBF1FF88314F208419E109A7260DB749944CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 21 709e9a4-709ea45 25 709ea7e-709ea9e 21->25 26 709ea47-709ea51 21->26 33 709eaa0-709eaaa 25->33 34 709ead7-709eb06 25->34 26->25 27 709ea53-709ea55 26->27 28 709ea78-709ea7b 27->28 29 709ea57-709ea61 27->29 28->25 31 709ea63 29->31 32 709ea65-709ea74 29->32 31->32 32->32 35 709ea76 32->35 33->34 36 709eaac-709eaae 33->36 40 709eb08-709eb12 34->40 41 709eb3f-709ebf9 CreateProcessA 34->41 35->28 38 709ead1-709ead4 36->38 39 709eab0-709eaba 36->39 38->34 42 709eabc 39->42 43 709eabe-709eacd 39->43 40->41 44 709eb14-709eb16 40->44 54 709ebfb-709ec01 41->54 55 709ec02-709ec88 41->55 42->43 43->43 45 709eacf 43->45 46 709eb39-709eb3c 44->46 47 709eb18-709eb22 44->47 45->38 46->41 49 709eb24 47->49 50 709eb26-709eb35 47->50 49->50 50->50 51 709eb37 50->51 51->46 54->55 65 709ec98-709ec9c 55->65 66 709ec8a-709ec8e 55->66 67 709ecac-709ecb0 65->67 68 709ec9e-709eca2 65->68 66->65 69 709ec90 66->69 71 709ecc0-709ecc4 67->71 72 709ecb2-709ecb6 67->72 68->67 70 709eca4 68->70 69->65 70->67 74 709ecd6-709ecdd 71->74 75 709ecc6-709eccc 71->75 72->71 73 709ecb8 72->73 73->71 76 709ecdf-709ecee 74->76 77 709ecf4 74->77 75->74 76->77 78 709ecf5 77->78 78->78
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0709EBE6
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2415054842.0000000007090000.00000040.00000800.00020000.00000000.sdmp, Offset: 07090000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_7090000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: 1cc3553dc91d378fe84ed40e56fd98758bfe05a986589b7aaeafd95652c2229f
                                              • Instruction ID: 4c6c94bd08ace629bfa7bbda7cbf3f5d1c0fe10eadaef2b0483eae90cb792076
                                              • Opcode Fuzzy Hash: 1cc3553dc91d378fe84ed40e56fd98758bfe05a986589b7aaeafd95652c2229f
                                              • Instruction Fuzzy Hash: 83A13BB2D0061ADFEF24CF68C84179EBBF2BF48310F148669E849A7250DB749985DF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 80 709e9b0-709ea45 82 709ea7e-709ea9e 80->82 83 709ea47-709ea51 80->83 90 709eaa0-709eaaa 82->90 91 709ead7-709eb06 82->91 83->82 84 709ea53-709ea55 83->84 85 709ea78-709ea7b 84->85 86 709ea57-709ea61 84->86 85->82 88 709ea63 86->88 89 709ea65-709ea74 86->89 88->89 89->89 92 709ea76 89->92 90->91 93 709eaac-709eaae 90->93 97 709eb08-709eb12 91->97 98 709eb3f-709ebf9 CreateProcessA 91->98 92->85 95 709ead1-709ead4 93->95 96 709eab0-709eaba 93->96 95->91 99 709eabc 96->99 100 709eabe-709eacd 96->100 97->98 101 709eb14-709eb16 97->101 111 709ebfb-709ec01 98->111 112 709ec02-709ec88 98->112 99->100 100->100 102 709eacf 100->102 103 709eb39-709eb3c 101->103 104 709eb18-709eb22 101->104 102->95 103->98 106 709eb24 104->106 107 709eb26-709eb35 104->107 106->107 107->107 108 709eb37 107->108 108->103 111->112 122 709ec98-709ec9c 112->122 123 709ec8a-709ec8e 112->123 124 709ecac-709ecb0 122->124 125 709ec9e-709eca2 122->125 123->122 126 709ec90 123->126 128 709ecc0-709ecc4 124->128 129 709ecb2-709ecb6 124->129 125->124 127 709eca4 125->127 126->122 127->124 131 709ecd6-709ecdd 128->131 132 709ecc6-709eccc 128->132 129->128 130 709ecb8 129->130 130->128 133 709ecdf-709ecee 131->133 134 709ecf4 131->134 132->131 133->134 135 709ecf5 134->135 135->135
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0709EBE6
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2415054842.0000000007090000.00000040.00000800.00020000.00000000.sdmp, Offset: 07090000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_7090000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: a7c5848d8316407e544a036bc759c02dfde22d4c823f0269ec5159f83ba5b11c
                                              • Instruction ID: b70d77d1150cef9e8a3d376f09e266359162d34227fbf33a2a7d914868c9bac2
                                              • Opcode Fuzzy Hash: a7c5848d8316407e544a036bc759c02dfde22d4c823f0269ec5159f83ba5b11c
                                              • Instruction Fuzzy Hash: 8E913AB2D0061ADFEF24CF68C84179EBBF2BF48310F148669E849A7250DB749985DF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 137 99a9e8-99a9f7 138 99a9f9-99aa06 call 999d40 137->138 139 99aa23-99aa27 137->139 144 99aa08 138->144 145 99aa1c 138->145 141 99aa29-99aa33 139->141 142 99aa3b-99aa7c 139->142 141->142 148 99aa89-99aa97 142->148 149 99aa7e-99aa86 142->149 195 99aa0e call 99ac7f 144->195 196 99aa0e call 99ac80 144->196 145->139 150 99aa99-99aa9e 148->150 151 99aabb-99aabd 148->151 149->148 153 99aaa9 150->153 154 99aaa0-99aaa7 call 999d4c 150->154 156 99aac0-99aac7 151->156 152 99aa14-99aa16 152->145 155 99ab58-99ac18 152->155 158 99aaab-99aab9 153->158 154->158 188 99ac1a-99ac1d 155->188 189 99ac20-99ac4b GetModuleHandleW 155->189 159 99aac9-99aad1 156->159 160 99aad4-99aadb 156->160 158->156 159->160 162 99aae8-99aaf1 call 999d5c 160->162 163 99aadd-99aae5 160->163 168 99aafe-99ab03 162->168 169 99aaf3-99aafb 162->169 163->162 170 99ab21-99ab25 168->170 171 99ab05-99ab0c 168->171 169->168 193 99ab28 call 99af80 170->193 194 99ab28 call 99af50 170->194 171->170 173 99ab0e-99ab1e call 999d6c call 999d7c 171->173 173->170 176 99ab2b-99ab2e 178 99ab51-99ab57 176->178 179 99ab30-99ab4e 176->179 179->178 188->189 190 99ac4d-99ac53 189->190 191 99ac54-99ac68 189->191 190->191 193->176 194->176 195->152 196->152
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0099AC3E
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2394287652.0000000000990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_990000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: d8de7a0793260ed2d54ee7af115cc1e1a64656db89b3a37a12b75a91e4d2245c
                                              • Instruction ID: ef005266c8987a6da73208bb63c12aa89e2e0209a8f441d54c0db4876b9ec29d
                                              • Opcode Fuzzy Hash: d8de7a0793260ed2d54ee7af115cc1e1a64656db89b3a37a12b75a91e4d2245c
                                              • Instruction Fuzzy Hash: F6713570A00B058FDB24DF69D54575ABBF6FF88300F108A2DE48ADBA50DB75E845CB92

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 197 709e2e8-709e33e 199 709e34e-709e38d WriteProcessMemory 197->199 200 709e340-709e34c 197->200 202 709e38f-709e395 199->202 203 709e396-709e3c6 199->203 200->199 202->203
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0709E380
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2415054842.0000000007090000.00000040.00000800.00020000.00000000.sdmp, Offset: 07090000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_7090000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: 73fd52930c5e843e3cb8cf61a14f246de6f8c07ef2a2e9b0d64a6a31f67b58c2
                                              • Instruction ID: 15afce7e3722c0d13d392ba9786d952956d21c96a50d67688b851c3dc586235e
                                              • Opcode Fuzzy Hash: 73fd52930c5e843e3cb8cf61a14f246de6f8c07ef2a2e9b0d64a6a31f67b58c2
                                              • Instruction Fuzzy Hash: B32126B290135A9FDF10CFA9C885BDEBBF1BF48310F10852AE919A7240D7789954DBA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 207 709e2f0-709e33e 209 709e34e-709e38d WriteProcessMemory 207->209 210 709e340-709e34c 207->210 212 709e38f-709e395 209->212 213 709e396-709e3c6 209->213 210->209 212->213
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0709E380
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2415054842.0000000007090000.00000040.00000800.00020000.00000000.sdmp, Offset: 07090000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_7090000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: 76f62cb2fac1523dd59926e4c8be8f3ff50cbf191077c605a958db83f714e23b
                                              • Instruction ID: 6c01a260ace981e41d7f2fe9aac12b34ba397a0d4fc956500e01ec00d6a75d41
                                              • Opcode Fuzzy Hash: 76f62cb2fac1523dd59926e4c8be8f3ff50cbf191077c605a958db83f714e23b
                                              • Instruction Fuzzy Hash: DF2126B290034A9FDF10CFAAC885BDEBBF5FF48310F108529E918A7240D7789954DBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 217 709e810-709e8a5 ReadProcessMemory 221 709e8ae-709e8de 217->221 222 709e8a7-709e8ad 217->222 222->221
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0709E898
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2415054842.0000000007090000.00000040.00000800.00020000.00000000.sdmp, Offset: 07090000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_7090000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: 4cc57e2753dce9ac12de96e91aef64770b03aba52df41ca2e33fa31bf59b5252
                                              • Instruction ID: 1aee22121cc459f22f765b3b17e273446cd770ac04433ebd31c20aa337d42a06
                                              • Opcode Fuzzy Hash: 4cc57e2753dce9ac12de96e91aef64770b03aba52df41ca2e33fa31bf59b5252
                                              • Instruction Fuzzy Hash: A921F8B1C003499FDB10DF99C881AEEFBF5FF48310F14842AE519A7240C7749955DBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 226 709e151-709e1a3 229 709e1b3-709e1e3 Wow64SetThreadContext 226->229 230 709e1a5-709e1b1 226->230 232 709e1ec-709e21c 229->232 233 709e1e5-709e1eb 229->233 230->229 233->232
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0709E1D6
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2415054842.0000000007090000.00000040.00000800.00020000.00000000.sdmp, Offset: 07090000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_7090000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: 9b37a699d5b2a93a9e4939aa93ecc6cd16de072a0519262f8013ac9da4415cdd
                                              • Instruction ID: 731d265711088b1ebc2d746d4bfd130d1c0a9a4e839acfb04b310f5960f99c93
                                              • Opcode Fuzzy Hash: 9b37a699d5b2a93a9e4939aa93ecc6cd16de072a0519262f8013ac9da4415cdd
                                              • Instruction Fuzzy Hash: 222139B2D003099FDB10DFAAC8857EEBBF4AF48310F14842AD559A7241C7789944CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 237 709e158-709e1a3 239 709e1b3-709e1e3 Wow64SetThreadContext 237->239 240 709e1a5-709e1b1 237->240 242 709e1ec-709e21c 239->242 243 709e1e5-709e1eb 239->243 240->239 243->242
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0709E1D6
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2415054842.0000000007090000.00000040.00000800.00020000.00000000.sdmp, Offset: 07090000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_7090000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: f5d9d5b09d054280b69d97caab14ad4e406ac74c65c5ee56f86f2a832ee23c52
                                              • Instruction ID: 229071ea5af4e7a496dbab9a2dd67a16eb3b4b0fc6ce532f6bf22d7e87d483dd
                                              • Opcode Fuzzy Hash: f5d9d5b09d054280b69d97caab14ad4e406ac74c65c5ee56f86f2a832ee23c52
                                              • Instruction Fuzzy Hash: 32211AB1D003099FDB10DFAAC8857EEBBF4AF48314F14842AD519A7341D7789944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 247 709e818-709e8a5 ReadProcessMemory 250 709e8ae-709e8de 247->250 251 709e8a7-709e8ad 247->251 251->250
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0709E898
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2415054842.0000000007090000.00000040.00000800.00020000.00000000.sdmp, Offset: 07090000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_7090000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: 7c0505b0094f065a475b5f5c36a8b84c0f76547c25f907327bda7da4f139296f
                                              • Instruction ID: f0db3c55a1c7fe40fbab4629189e29bb361d8634eaffe17cf507fd0a58ac152d
                                              • Opcode Fuzzy Hash: 7c0505b0094f065a475b5f5c36a8b84c0f76547c25f907327bda7da4f139296f
                                              • Instruction Fuzzy Hash: 952105B1C003499FDF10DFAAC881AEEBBF5FF48310F10882AE518A7240C7789954DBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 255 99d2c0-99d354 DuplicateHandle 256 99d35d-99d37a 255->256 257 99d356-99d35c 255->257 257->256
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0099D347
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2394287652.0000000000990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_990000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 82cd46f886e30592e75aba19f58dba5ec7f2f16778b8d5406fc4959af0784a73
                                              • Instruction ID: 535b9dc75b386433a8912c5da4d158d1d116d4732e7d0ccf5d669f182a892c68
                                              • Opcode Fuzzy Hash: 82cd46f886e30592e75aba19f58dba5ec7f2f16778b8d5406fc4959af0784a73
                                              • Instruction Fuzzy Hash: 4621E3B59002099FDB10CF9AD984ADEBBF8EB48320F14841AE918A3210D378A954CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 260 709e228-709e2ab VirtualAllocEx 264 709e2ad-709e2b3 260->264 265 709e2b4-709e2d9 260->265 264->265
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0709E29E
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2415054842.0000000007090000.00000040.00000800.00020000.00000000.sdmp, Offset: 07090000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_7090000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 783e07c3c5f69487167f575ad782b58097c96e8ac603cb985e8acfa797100302
                                              • Instruction ID: 35fe367ec98ff0ffba450eaacac88b9b97e37cead4f6a7a782f6a0e9dcb2d78e
                                              • Opcode Fuzzy Hash: 783e07c3c5f69487167f575ad782b58097c96e8ac603cb985e8acfa797100302
                                              • Instruction Fuzzy Hash: BF2167B290024A9FDF20DFAAC845BDFBBF5EF88320F148819E519A7250C7759910DFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 269 709e0a0-709e117 ResumeThread 273 709e119-709e11f 269->273 274 709e120-709e145 269->274 273->274
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2415054842.0000000007090000.00000040.00000800.00020000.00000000.sdmp, Offset: 07090000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_7090000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: da2122305c489fa26eec2c75a1ad6e6f02315c1213d1ab56555c7ee594be31c1
                                              • Instruction ID: 7fc229506a82a61a53cbb2b5db9bab5e5f4ac282727d89b6fb2126a6405026fc
                                              • Opcode Fuzzy Hash: da2122305c489fa26eec2c75a1ad6e6f02315c1213d1ab56555c7ee594be31c1
                                              • Instruction Fuzzy Hash: 8C1149B19003498FDB20DFAAC845BDFFBF4AF88620F248819D559A7240CB75A944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 278 709e230-709e2ab VirtualAllocEx 281 709e2ad-709e2b3 278->281 282 709e2b4-709e2d9 278->282 281->282
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0709E29E
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2415054842.0000000007090000.00000040.00000800.00020000.00000000.sdmp, Offset: 07090000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_7090000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 0a2fafa6b54eed0fadfd16f804a11ceababcb618db4376a105fe092e02f50cd4
                                              • Instruction ID: 09b91e8cacade2105f46acbf14f3601596f940fab43b0bb0cf5178a1b7896245
                                              • Opcode Fuzzy Hash: 0a2fafa6b54eed0fadfd16f804a11ceababcb618db4376a105fe092e02f50cd4
                                              • Instruction Fuzzy Hash: BC11567280024A9FDF10DFAAC845BDEBBF5AF88320F148819E519A7250C775A914CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 286 6c311f8-6c3126a PostMessageW 288 6c31273-6c31287 286->288 289 6c3126c-6c31272 286->289 289->288
                                              APIs
                                              • PostMessageW.USER32(?,?,?,?), ref: 06C3125D
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2414075097.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_6c30000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: 61740cc86d2b3f1250f3fbf4c7638ab9468992b7acb235e57f1af69dc7a40ec3
                                              • Instruction ID: b4a637ad8a55a113e3c2e8866f417844d02d5595ed4b490c876630c91d81acd9
                                              • Opcode Fuzzy Hash: 61740cc86d2b3f1250f3fbf4c7638ab9468992b7acb235e57f1af69dc7a40ec3
                                              • Instruction Fuzzy Hash: 5711E3B58003599FDB10DF9AD985BDEBFF8EB49320F148419E518A7601C3B5A544CFA1
                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 0099954D
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2394287652.0000000000990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_990000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID:
                                              • API String ID: 2492992576-0
                                              • Opcode ID: 527d0777865c4a1010d26a0feadafcff6fae2306c7c6b39cc22f776ab07c2bb2
                                              • Instruction ID: a85c2d50a6b18d793d39cf469f31894be396bcd3136bd510a05d86cabf1ec7c3
                                              • Opcode Fuzzy Hash: 527d0777865c4a1010d26a0feadafcff6fae2306c7c6b39cc22f776ab07c2bb2
                                              • Instruction Fuzzy Hash: EA119DB1808789CEDB11CF99D4047DEBFF8AB04314F50809DD559A3242C3B9AA48CFA2
                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 0099954D
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2394287652.0000000000990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_990000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID:
                                              • API String ID: 2492992576-0
                                              • Opcode ID: fd410784995e018363450ceb87280c26a8c37bd9532e1921155776462afbb974
                                              • Instruction ID: 78c9f11f63e9a15b0846ef4e29c03a18ae52fea7978b55d2a46758553a2101c5
                                              • Opcode Fuzzy Hash: fd410784995e018363450ceb87280c26a8c37bd9532e1921155776462afbb974
                                              • Instruction Fuzzy Hash: 3E11BEB1808789CEDB11CF99D4047DEBFF4EB04314F14809DD599A3241C3786644CFA2
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2415054842.0000000007090000.00000040.00000800.00020000.00000000.sdmp, Offset: 07090000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_7090000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: fb128eff2f67c942f1a39e274c48fd8aa163a214da33e4bedffca3a379d2e050
                                              • Instruction ID: 83e39cb5377b7f1f2babb1bd0585d50230f9a83e78ce07b530c32b3cb33b80e7
                                              • Opcode Fuzzy Hash: fb128eff2f67c942f1a39e274c48fd8aa163a214da33e4bedffca3a379d2e050
                                              • Instruction Fuzzy Hash: 781128B1D00349CFDB10DFAAC84579EFBF4AF88624F248819D519A7240CB79A944CFA5
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0099AC3E
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2394287652.0000000000990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00990000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_990000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 7a763bb668fc0e5e203a31c9214005c5424a080f1a54c03ee27d190368d79e9a
                                              • Instruction ID: daea6fd51f935c66f4cf9ca96652361f3e0840d0ad0a3c7725cd4de7a39e3825
                                              • Opcode Fuzzy Hash: 7a763bb668fc0e5e203a31c9214005c5424a080f1a54c03ee27d190368d79e9a
                                              • Instruction Fuzzy Hash: 471102B5C007498FDB10CF9AD544BDEFBF4EB88324F10841AD458A7210D3B9A545CFA1
                                              APIs
                                              • PostMessageW.USER32(?,?,?,?), ref: 06C3125D
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2414075097.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_6c30000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: 615d4d780301d6bfc2b50ce931b62a16d583ebc7a5166d780b60f5974a5aa636
                                              • Instruction ID: e4419f5d5e6114fcb827238d238d52d483b0b9d0a3f3ee9f2e986878f848e37b
                                              • Opcode Fuzzy Hash: 615d4d780301d6bfc2b50ce931b62a16d583ebc7a5166d780b60f5974a5aa636
                                              • Instruction Fuzzy Hash: 9811D3B58003499FDB10DF9AD985BDEFBF8EB48320F14841AD518A7600C3B5A544CFA5
                                              APIs
                                              • CloseHandle.KERNELBASE(?), ref: 06C32990
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2414075097.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_6c30000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID:
                                              • API String ID: 2962429428-0
                                              • Opcode ID: 4480f5e3afc2bdd636090df30db0db159d6fab09bfe0e069b27a91c627fdd398
                                              • Instruction ID: b5966a8f66dc32eea23a703fab37d3e1d0fa8d23d8a04bccfe9802dca6305af8
                                              • Opcode Fuzzy Hash: 4480f5e3afc2bdd636090df30db0db159d6fab09bfe0e069b27a91c627fdd398
                                              • Instruction Fuzzy Hash: 041113B58047498FDB10DFAAD845BDEFBF4EF48320F20841AD558A7240D778A644CFA5
                                              APIs
                                              • CloseHandle.KERNELBASE(?), ref: 06C32990
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2414075097.0000000006C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_6c30000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID:
                                              • API String ID: 2962429428-0
                                              • Opcode ID: dc0162fe9a6f1e8f84852fee264bd66b188ae1a2353b21ab45f3a7a46806ec3c
                                              • Instruction ID: 6f9b42666c938d975f343e43087ba15a439789419f107736d27d64bcbc98389f
                                              • Opcode Fuzzy Hash: dc0162fe9a6f1e8f84852fee264bd66b188ae1a2353b21ab45f3a7a46806ec3c
                                              • Instruction Fuzzy Hash: 7C1103B5C00749CFDB50DF9AC545BDEBBF4EB48320F20841AD558A7240D778A644CFA5
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2394072675.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_93d000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b8793cbf04e22b7e8b49142c4b6ded7677d053cc8efa2a1c857e75c587eebd02
                                              • Instruction ID: 7a549dbc2cc502df1f3e849ad614dd70dbae440ae949796da8f903dc8b9ceea0
                                              • Opcode Fuzzy Hash: b8793cbf04e22b7e8b49142c4b6ded7677d053cc8efa2a1c857e75c587eebd02
                                              • Instruction Fuzzy Hash: 12212675604204EFDB04DF14E9D0B26BBA5FB84718F24C96DD90A4B252C77ADC46CE62
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2394072675.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_93d000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 53e5a8497d421810097b6ccd47df3a0f731b98a6536c5d8f1e112c0362eca7a6
                                              • Instruction ID: ab84dd0c9362faf27de5f5cd419009d331058540ad670de74bd9721b59cd08ca
                                              • Opcode Fuzzy Hash: 53e5a8497d421810097b6ccd47df3a0f731b98a6536c5d8f1e112c0362eca7a6
                                              • Instruction Fuzzy Hash: 7A2137B5508304EFDB08DF50E9D0B26BB65FB84314F20C56DD9090B256C37BD846CE61
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2394072675.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_93d000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                              • Instruction ID: c53aaadab64832de5bc45bb09fe037bbbf6add22b2f09e29bd2b77ef6beeb53d
                                              • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                              • Instruction Fuzzy Hash: 68119D75504284DFCB06CF10E5D4B19BFB1FB84318F24C6A9D8494B656C33AD84ACF62
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2393769557.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_92d000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4a910fcbcb5e309f1f78f9d71e0c96e7313f732af3acde614a7b5fa4bc189c5a
                                              • Instruction ID: 6df57d22a29343918ea56a746a8a990dc3d9889938bb3e8aa21a634266c056f5
                                              • Opcode Fuzzy Hash: 4a910fcbcb5e309f1f78f9d71e0c96e7313f732af3acde614a7b5fa4bc189c5a
                                              • Instruction Fuzzy Hash: 620126B1006350DAF7104A25ED80B66FFDCEF41320F18C81AED084A28AC7BC9840CBB1
                                              Memory Dump Source
                                              • Source File: 00000009.00000002.2393769557.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_9_2_92d000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 40c05530d7f80ae19f5dde11cace7a8970013b11f57941b043b171045bdfd4cb
                                              • Instruction ID: 9944bba82331ced6b8d7a49df202c8140522dc94a01420694d610e86af14f26b
                                              • Opcode Fuzzy Hash: 40c05530d7f80ae19f5dde11cace7a8970013b11f57941b043b171045bdfd4cb
                                              • Instruction Fuzzy Hash: 54F0C2B14053549EE7108A06EC84B62FFECEF50724F18C45AED080B28AC379A840CBB1

                                              Execution Graph

                                              Execution Coverage:9.6%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:117
                                              Total number of Limit Nodes:14
                                              execution_graph 36123 69592d0 36124 6959338 CreateWindowExW 36123->36124 36126 69593f4 36124->36126 36126->36126 36127 11f70b8 36128 11f70fc CheckRemoteDebuggerPresent 36127->36128 36129 11f713e 36128->36129 36130 11ff457 36131 11ff416 36130->36131 36132 11ff466 36130->36132 36135 11fe8d4 36131->36135 36134 11ff425 36136 11fe8df 36135->36136 36137 11ffad7 36136->36137 36140 695e1dd 36136->36140 36144 695e578 36136->36144 36137->36134 36143 695e577 36140->36143 36141 695ea40 WaitMessage 36141->36143 36142 695e62a 36142->36137 36143->36141 36143->36142 36146 695e5dd 36144->36146 36145 695ea40 WaitMessage 36145->36146 36146->36145 36147 695e62a 36146->36147 36147->36137 36183 108d030 36184 108d048 36183->36184 36186 108d0a2 36184->36186 36191 6956684 36184->36191 36200 6959488 36184->36200 36204 695a1d8 36184->36204 36213 6959479 36184->36213 36217 69594d7 36184->36217 36192 695668f 36191->36192 36193 695a249 36192->36193 36195 695a239 36192->36195 36238 69567ac 36193->36238 36222 695a844 36195->36222 36228 695a778 36195->36228 36233 695a771 36195->36233 36196 695a247 36201 69594ae 36200->36201 36202 6956684 CallWindowProcW 36201->36202 36203 69594cf 36202->36203 36203->36186 36205 695a1e8 36204->36205 36206 695a249 36205->36206 36208 695a239 36205->36208 36207 69567ac CallWindowProcW 36206->36207 36209 695a247 36207->36209 36210 695a844 CallWindowProcW 36208->36210 36211 695a771 CallWindowProcW 36208->36211 36212 695a778 CallWindowProcW 36208->36212 36210->36209 36211->36209 36212->36209 36214 6959488 36213->36214 36215 6956684 CallWindowProcW 36214->36215 36216 69594cf 36215->36216 36216->36186 36218 69594e6 36217->36218 36219 69594c8 36217->36219 36218->36186 36220 6956684 CallWindowProcW 36219->36220 36221 69594cf 36220->36221 36221->36186 36223 695a802 36222->36223 36224 695a852 36222->36224 36242 695a821 36223->36242 36246 695a830 36223->36246 36225 695a818 36225->36196 36229 695a78c 36228->36229 36231 695a821 CallWindowProcW 36229->36231 36232 695a830 CallWindowProcW 36229->36232 36230 695a818 36230->36196 36231->36230 36232->36230 36235 695a778 36233->36235 36234 695a818 36234->36196 36236 695a821 CallWindowProcW 36235->36236 36237 695a830 CallWindowProcW 36235->36237 36236->36234 36237->36234 36239 69567b7 36238->36239 36240 695baba CallWindowProcW 36239->36240 36241 695ba69 36239->36241 36240->36241 36241->36196 36243 695a830 36242->36243 36244 695a841 36243->36244 36249 695b9f1 36243->36249 36244->36225 36247 695a841 36246->36247 36248 695b9f1 CallWindowProcW 36246->36248 36247->36225 36248->36247 36250 69567ac CallWindowProcW 36249->36250 36251 695ba0a 36250->36251 36251->36244 36252 6a2f858 36253 6a2f865 36252->36253 36254 6a2f88d 36252->36254 36260 6a2efc0 36254->36260 36256 6a2f8ae 36258 6a2f976 GlobalMemoryStatusEx 36259 6a2f9a6 36258->36259 36261 6a2f930 GlobalMemoryStatusEx 36260->36261 36263 6a2f8aa 36261->36263 36263->36256 36263->36258 36148 6956e38 36150 6956e69 36148->36150 36151 6956eb5 36148->36151 36149 6956e75 36150->36149 36154 69570b0 36150->36154 36157 69570a0 36150->36157 36161 69570f0 36154->36161 36155 69570ba 36155->36151 36158 69570b0 36157->36158 36160 69570f0 GetModuleHandleW 36158->36160 36159 69570ba 36159->36151 36160->36159 36162 6957134 36161->36162 36163 6957111 36161->36163 36162->36155 36163->36162 36164 6957338 GetModuleHandleW 36163->36164 36165 6957365 36164->36165 36165->36155 36166 695dbd8 36167 695dee0 36166->36167 36168 695dc00 36166->36168 36169 695dc09 36168->36169 36174 695d0fc 36168->36174 36171 695df23 36173 695dc2c 36173->36171 36178 695d118 36173->36178 36175 695d107 36174->36175 36176 695df23 36175->36176 36177 695d118 OleInitialize 36175->36177 36176->36173 36177->36176 36179 695df58 OleInitialize 36178->36179 36180 695dfbc 36179->36180 36180->36171 36181 11fedd0 DuplicateHandle 36182 11fee66 36181->36182

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 839 695e578-695e5db 840 695e5dd-695e607 839->840 841 695e60a-695e628 839->841 840->841 846 695e631-695e668 841->846 847 695e62a-695e62c 841->847 851 695e66e-695e682 846->851 852 695ea99 846->852 849 695eaea-695eaff 847->849 853 695e684-695e6ae 851->853 854 695e6b1-695e6d0 851->854 855 695ea9e-695eab4 852->855 853->854 861 695e6d2-695e6d8 854->861 862 695e6e8-695e6ea 854->862 855->849 864 695e6dc-695e6de 861->864 865 695e6da 861->865 866 695e6ec-695e704 862->866 867 695e709-695e712 862->867 864->862 865->862 866->855 868 695e71a-695e721 867->868 869 695e723-695e729 868->869 870 695e72b-695e732 868->870 871 695e73f-695e75c call 695d178 869->871 872 695e734-695e73a 870->872 873 695e73c 870->873 876 695e8b1-695e8b5 871->876 877 695e762-695e769 871->877 872->871 873->871 878 695ea84-695ea97 876->878 879 695e8bb-695e8bf 876->879 877->852 880 695e76f-695e7ac 877->880 878->855 881 695e8c1-695e8d4 879->881 882 695e8d9-695e8e2 879->882 888 695e7b2-695e7b7 880->888 889 695ea7a-695ea7e 880->889 881->855 883 695e8e4-695e90e 882->883 884 695e911-695e918 882->884 883->884 886 695e9b7-695e9cc 884->886 887 695e91e-695e925 884->887 886->889 902 695e9d2-695e9d4 886->902 891 695e954-695e976 887->891 892 695e927-695e951 887->892 893 695e7e9-695e7fe call 695d19c 888->893 894 695e7b9-695e7c7 call 695d184 888->894 889->868 889->878 891->886 929 695e978-695e982 891->929 892->891 900 695e803-695e807 893->900 894->893 904 695e7c9-695e7e7 call 695d190 894->904 905 695e809-695e81b call 695e164 900->905 906 695e878-695e885 900->906 907 695e9d6-695ea0f 902->907 908 695ea21-695ea3e call 695d178 902->908 904->900 933 695e81d-695e84d 905->933 934 695e85b-695e873 905->934 906->889 921 695e88b-695e895 call 695d1a8 906->921 924 695ea11-695ea17 907->924 925 695ea18-695ea1f 907->925 908->889 920 695ea40-695ea6c WaitMessage 908->920 926 695ea73 920->926 927 695ea6e 920->927 935 695e8a4-695e8ac call 695e180 921->935 936 695e897-695e89f call 695e174 921->936 924->925 925->889 926->889 927->926 940 695e984-695e98a 929->940 941 695e99a-695e99d 929->941 943 695e854 933->943 944 695e84f 933->944 934->855 935->889 936->889 947 695e98c 940->947 948 695e98e-695e990 940->948 949 695e9a6-695e9b5 941->949 943->934 944->943 947->941 948->941 949->886 949->929
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3442752429.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6950000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1f266550f42b56efacd18af3bca36875801cba96f02baac6240a8e587ef4ebe3
                                              • Instruction ID: e4ea4a53c7505427d5bb10054ced6d5b012a173e2b6bc58c3f1691ee3be8adc3
                                              • Opcode Fuzzy Hash: 1f266550f42b56efacd18af3bca36875801cba96f02baac6240a8e587ef4ebe3
                                              • Instruction Fuzzy Hash: B7F18F30E00309CFEB54DFA9C854B9DBBF5FF88314F258568E805AB665DB71AA45CB80

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 951 69570f0-695710f 952 6957111-695711e call 69564a0 951->952 953 695713b-695713f 951->953 960 6957134 952->960 961 6957120 952->961 954 6957141-695714b 953->954 955 6957153-6957194 953->955 954->955 962 6957196-695719e 955->962 963 69571a1-69571af 955->963 960->953 1007 6957126 call 6957398 961->1007 1008 6957126 call 6957388 961->1008 962->963 964 69571b1-69571b6 963->964 965 69571d3-69571d5 963->965 968 69571c1 964->968 969 69571b8-69571bf call 69564ac 964->969 967 69571d8-69571df 965->967 966 695712c-695712e 966->960 970 6957270-6957330 966->970 971 69571e1-69571e9 967->971 972 69571ec-69571f3 967->972 974 69571c3-69571d1 968->974 969->974 1002 6957332-6957335 970->1002 1003 6957338-6957363 GetModuleHandleW 970->1003 971->972 975 69571f5-69571fd 972->975 976 6957200-6957209 972->976 974->967 975->976 981 6957216-695721b 976->981 982 695720b-6957213 976->982 983 695721d-6957224 981->983 984 6957239-6957246 981->984 982->981 983->984 986 6957226-6957236 call 6955008 call 69564bc 983->986 990 6957269-695726f 984->990 991 6957248-6957266 984->991 986->984 991->990 1002->1003 1004 6957365-695736b 1003->1004 1005 695736c-6957380 1003->1005 1004->1005 1007->966 1008->966
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 06957356
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3442752429.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6950000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: fd16a100c7bac7c9a6c8f6624d4233f383ffe02d3bd3156d322dbbe6e4d3c78a
                                              • Instruction ID: f476ab66cd5338f2d727a48451971e5af77d912174af601494d85584bfb693ec
                                              • Opcode Fuzzy Hash: fd16a100c7bac7c9a6c8f6624d4233f383ffe02d3bd3156d322dbbe6e4d3c78a
                                              • Instruction Fuzzy Hash: 8B816570A00B058FDB64DFA9D45479ABBF6FF88210F10892DD88ADBA50DB74E905CB90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1009 6a2f858-6a2f863 1010 6a2f865-6a2f88c call 6a2efb4 1009->1010 1011 6a2f88d-6a2f8ac call 6a2efc0 1009->1011 1017 6a2f8b2-6a2f911 1011->1017 1018 6a2f8ae-6a2f8b1 1011->1018 1025 6a2f913-6a2f916 1017->1025 1026 6a2f917-6a2f9a4 GlobalMemoryStatusEx 1017->1026 1030 6a2f9a6-6a2f9ac 1026->1030 1031 6a2f9ad-6a2f9d5 1026->1031 1030->1031
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3443035794.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6a20000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9ab7db9df0308c9b390446d1bb74b9991bc3435cdb1008f83ec1692e98bfaf05
                                              • Instruction ID: 88e1d08053b6fac9f363958203b612aa15587fb0ed9f876a4955fbb60478a287
                                              • Opcode Fuzzy Hash: 9ab7db9df0308c9b390446d1bb74b9991bc3435cdb1008f83ec1692e98bfaf05
                                              • Instruction Fuzzy Hash: D5412372D0435A8FCB04DFBAD8006DEFBF5AF89210F158A6AD544A7241EB749845CBD1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1034 6959271-6959336 1037 6959341-6959348 1034->1037 1038 6959338-695933e 1034->1038 1039 6959353-695938b 1037->1039 1040 695934a-6959350 1037->1040 1038->1037 1041 6959393-69593f2 CreateWindowExW 1039->1041 1040->1039 1042 69593f4-69593fa 1041->1042 1043 69593fb-6959433 1041->1043 1042->1043 1047 6959435-6959438 1043->1047 1048 6959440 1043->1048 1047->1048 1049 6959441 1048->1049 1049->1049
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 069593E2
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3442752429.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6950000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: 808e995fe61b25cd818fd05cab66f8bab6f8d9a75d99d8eec89602dd560c2744
                                              • Instruction ID: 8a5ec69596f640dbd57c643f9c17ca44f11680ea03e0edba8f92e290dfbbfcbc
                                              • Opcode Fuzzy Hash: 808e995fe61b25cd818fd05cab66f8bab6f8d9a75d99d8eec89602dd560c2744
                                              • Instruction Fuzzy Hash: 4B51AFB1D00359DFEB14CF99C884ADEBBB5BF88310F25852AE819AB250D775A845CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1050 69592c5-6959336 1052 6959341-6959348 1050->1052 1053 6959338-695933e 1050->1053 1054 6959353-695938b 1052->1054 1055 695934a-6959350 1052->1055 1053->1052 1056 6959393-69593f2 CreateWindowExW 1054->1056 1055->1054 1057 69593f4-69593fa 1056->1057 1058 69593fb-6959433 1056->1058 1057->1058 1062 6959435-6959438 1058->1062 1063 6959440 1058->1063 1062->1063 1064 6959441 1063->1064 1064->1064
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 069593E2
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3442752429.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6950000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: 7fa44d31c31ce04e3e4194158336dde5921043aaa1aecd4ac120b5ed5d7b451c
                                              • Instruction ID: 9ec7e4fe7cd29e0064059bcb16156eb1614f9810eafd0c6dba1fa62f9f57ab6d
                                              • Opcode Fuzzy Hash: 7fa44d31c31ce04e3e4194158336dde5921043aaa1aecd4ac120b5ed5d7b451c
                                              • Instruction Fuzzy Hash: 9451BFB1D00359DFDB14CF9AC884ADEBBB5FF88310F25852AE819AB250D775A845CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1065 69592d0-6959336 1066 6959341-6959348 1065->1066 1067 6959338-695933e 1065->1067 1068 6959353-69593f2 CreateWindowExW 1066->1068 1069 695934a-6959350 1066->1069 1067->1066 1071 69593f4-69593fa 1068->1071 1072 69593fb-6959433 1068->1072 1069->1068 1071->1072 1076 6959435-6959438 1072->1076 1077 6959440 1072->1077 1076->1077 1078 6959441 1077->1078 1078->1078
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 069593E2
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3442752429.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6950000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: 35c09d124d5fc6ad54c24586fed7ec4337aae49ca6cccecea1c4c726b8e36454
                                              • Instruction ID: dc29c1ce8be0780f684b43d2db3acf170ee4a98a345a1cb967563cd126476c50
                                              • Opcode Fuzzy Hash: 35c09d124d5fc6ad54c24586fed7ec4337aae49ca6cccecea1c4c726b8e36454
                                              • Instruction Fuzzy Hash: 2441B0B1D00349DFDF14CF9AC884ADEBBB5BF88310F25852AE819AB250D7759845CF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1079 69567ac-695ba5c 1082 695ba62-695ba67 1079->1082 1083 695bb0c-695bb2c call 6956684 1079->1083 1085 695ba69-695baa0 1082->1085 1086 695baba-695baf2 CallWindowProcW 1082->1086 1090 695bb2f-695bb3c 1083->1090 1093 695baa2-695baa8 1085->1093 1094 695baa9-695bab8 1085->1094 1087 695baf4-695bafa 1086->1087 1088 695bafb-695bb0a 1086->1088 1087->1088 1088->1090 1093->1094 1094->1090
                                              APIs
                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 0695BAE1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3442752429.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6950000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CallProcWindow
                                              • String ID:
                                              • API String ID: 2714655100-0
                                              • Opcode ID: 49a1e0c060c88c5ddf10bc98d93a0e548ea0ef5a2e6502748e73da2f9bc7526c
                                              • Instruction ID: 8859ed4a992595eb8032c37cd5974d6595f88419cf072245191362b17b0200b7
                                              • Opcode Fuzzy Hash: 49a1e0c060c88c5ddf10bc98d93a0e548ea0ef5a2e6502748e73da2f9bc7526c
                                              • Instruction Fuzzy Hash: 384127B4900309CFDB54CF99C498AAABBF5FF88324F25C459D919AB325D774A841CBA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1096 11f70b0-11f713c CheckRemoteDebuggerPresent 1098 11f713e-11f7144 1096->1098 1099 11f7145-11f7180 1096->1099 1098->1099
                                              APIs
                                              • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 011F712F
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3417335292.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11f0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CheckDebuggerPresentRemote
                                              • String ID:
                                              • API String ID: 3662101638-0
                                              • Opcode ID: e2fd612b359ff334c480659b05662e83b533abd2208e06b2f52563bbeca8b52f
                                              • Instruction ID: 9dc2d7aab29111f00edf8ef3a362ec8875488cc20b2f0da5d3fc24a9e675a288
                                              • Opcode Fuzzy Hash: e2fd612b359ff334c480659b05662e83b533abd2208e06b2f52563bbeca8b52f
                                              • Instruction Fuzzy Hash: 9D2136B1C002598FDB54CF9AD484BEEBBF4AF48324F24852AE959B3250D778A944CF60

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1108 11fedc8-11fedce 1109 11fedd0-11fee64 DuplicateHandle 1108->1109 1110 11fee6d-11fee8a 1109->1110 1111 11fee66-11fee6c 1109->1111 1111->1110
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 011FEE57
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3417335292.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11f0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 16f11de64bc02b47a655da182aaa3516d10a8aab7ce144155f7d8fc2a30ead3f
                                              • Instruction ID: f114caa1af2b78a35867de8f335aba44827c3b7cbd3d80312751d0b4984db008
                                              • Opcode Fuzzy Hash: 16f11de64bc02b47a655da182aaa3516d10a8aab7ce144155f7d8fc2a30ead3f
                                              • Instruction Fuzzy Hash: F121F2B59002189FDB10CFAAD984ADEBBF5FF48320F10841AE958A3350D375A950CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1102 11f70b8-11f713c CheckRemoteDebuggerPresent 1104 11f713e-11f7144 1102->1104 1105 11f7145-11f7180 1102->1105 1104->1105
                                              APIs
                                              • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 011F712F
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3417335292.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11f0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: CheckDebuggerPresentRemote
                                              • String ID:
                                              • API String ID: 3662101638-0
                                              • Opcode ID: af88da3bd95e1150dae73702f290bd58e2e4b1458ef97da547f118a79bf6afb5
                                              • Instruction ID: 96909626d5c22d72285f6913d0eac5910ef994a1cb570e7c15d2c677863cca9d
                                              • Opcode Fuzzy Hash: af88da3bd95e1150dae73702f290bd58e2e4b1458ef97da547f118a79bf6afb5
                                              • Instruction Fuzzy Hash: F42125B28002598FDB14CF9AD884BEEFBF5AF49320F14845AE959A3250D778A944CF61

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1114 11fedd0-11fee64 DuplicateHandle 1115 11fee6d-11fee8a 1114->1115 1116 11fee66-11fee6c 1114->1116 1116->1115
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 011FEE57
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3417335292.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11f0000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 8f709cd1970be64795575d41b5e8582cbf8eefd9ff81cc7be73de113be1e33b2
                                              • Instruction ID: c83f76186ac6551727e6391069720f3354849dd2932c09883cf6cacc712d3cf2
                                              • Opcode Fuzzy Hash: 8f709cd1970be64795575d41b5e8582cbf8eefd9ff81cc7be73de113be1e33b2
                                              • Instruction Fuzzy Hash: 8621E3B59002099FDB10CF9AD984ADEBBF5FB48320F14841AE918A3210D374A950CF60

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1119 6a2efc0-6a2f9a4 GlobalMemoryStatusEx 1122 6a2f9a6-6a2f9ac 1119->1122 1123 6a2f9ad-6a2f9d5 1119->1123 1122->1123
                                              APIs
                                              • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06A2F8AA), ref: 06A2F997
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3443035794.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6a20000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: 0f8f8da4e1ed17d8858a2acff70382e70cfdd48f2f4d7ab6c99bfc7233529099
                                              • Instruction ID: 9efd3fa5054d01bc0a4b52473d202d11dc101fafab6dec06ad823aa775c00f3a
                                              • Opcode Fuzzy Hash: 0f8f8da4e1ed17d8858a2acff70382e70cfdd48f2f4d7ab6c99bfc7233529099
                                              • Instruction Fuzzy Hash: A21147B1C0065A9FCB10DF9AC544B9EFBF4BF48620F10812AD918B7240D378A910CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1126 6a2f928-6a2f96e 1128 6a2f976-6a2f9a4 GlobalMemoryStatusEx 1126->1128 1129 6a2f9a6-6a2f9ac 1128->1129 1130 6a2f9ad-6a2f9d5 1128->1130 1129->1130
                                              APIs
                                              • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06A2F8AA), ref: 06A2F997
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3443035794.0000000006A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A20000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6a20000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: 61c17a8aabf9052e990a6c65169db724cfb156ea925189293a11aa2f1559517b
                                              • Instruction ID: 6f5d327f57119de0fe02ec4072ff20051e7a0dd1ad9b4fbf521a3a469cb43f22
                                              • Opcode Fuzzy Hash: 61c17a8aabf9052e990a6c65169db724cfb156ea925189293a11aa2f1559517b
                                              • Instruction Fuzzy Hash: C01136B1C0065A9FCB10CF9AC544BDEFBF4BF48720F11856AD918A7240D778A954CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1133 69572f0-6957330 1134 6957332-6957335 1133->1134 1135 6957338-6957363 GetModuleHandleW 1133->1135 1134->1135 1136 6957365-695736b 1135->1136 1137 695736c-6957380 1135->1137 1136->1137
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 06957356
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3442752429.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6950000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 2b4e1f3a00c5e2db0c34dd3218071354d26efc99596f5ae347f64c235271487e
                                              • Instruction ID: bd31f8139517d0986912fefe50c1c5355795ec0b1b986fabda72a97c2e150a3f
                                              • Opcode Fuzzy Hash: 2b4e1f3a00c5e2db0c34dd3218071354d26efc99596f5ae347f64c235271487e
                                              • Instruction Fuzzy Hash: 0011E3B5C007498FDB10CF9AD444BDEFBF4AF88624F15841AD819B7610D375A545CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1139 695d118-695dfba OleInitialize 1141 695dfc3-695dfe0 1139->1141 1142 695dfbc-695dfc2 1139->1142 1142->1141
                                              APIs
                                              • OleInitialize.OLE32(00000000), ref: 0695DFAD
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3442752429.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6950000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: Initialize
                                              • String ID:
                                              • API String ID: 2538663250-0
                                              • Opcode ID: c797c7d5c445a9a62490680a11f92d5df641293ad81925aeddfcf37d1138aeda
                                              • Instruction ID: 0922b07f9c8a103a53261c6ee7a658620eeb712c4c583111b4073a12c5f9ea4d
                                              • Opcode Fuzzy Hash: c797c7d5c445a9a62490680a11f92d5df641293ad81925aeddfcf37d1138aeda
                                              • Instruction Fuzzy Hash: 7C1103B18047498FDB50DF9AD448B9EBBF8EF48220F208459E919A7610D378A944CFA5
                                              APIs
                                              • OleInitialize.OLE32(00000000), ref: 0695DFAD
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3442752429.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_6950000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID: Initialize
                                              • String ID:
                                              • API String ID: 2538663250-0
                                              • Opcode ID: a6d470cc6c1ff6149e7fde8d54ed606da5382d5b979fc5dc430bf9c925b4f59d
                                              • Instruction ID: 5e9f7c4dc60646235dd7769f6fa095a847be542e25262a19db23f5c873a62220
                                              • Opcode Fuzzy Hash: a6d470cc6c1ff6149e7fde8d54ed606da5382d5b979fc5dc430bf9c925b4f59d
                                              • Instruction Fuzzy Hash: C41133B58003488FCB10DF9AD444BDEBFF4EF48220F208419E918A7600C374A544CFA5
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3416540360.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_108d000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 95d9bd28142d89af90926bdff61de9e586fe36df9e35c9385b3d927c853e9420
                                              • Instruction ID: c323895ab4745acfb47f682c1a9c9cb41e45e595100e14ba5145c87b12caf44b
                                              • Opcode Fuzzy Hash: 95d9bd28142d89af90926bdff61de9e586fe36df9e35c9385b3d927c853e9420
                                              • Instruction Fuzzy Hash: 6E212571508204EFDB15EF94D9C0B2ABBA1FB84314F20C6ADE9894B292C776D447CF62
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.3416540360.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_108d000_ZUHFqcY.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                              • Instruction ID: 4f6dc057aac6b53e3997b3d6f9f757b3a37d1d9e1b20a7fd8650b56c0f715e40
                                              • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                              • Instruction Fuzzy Hash: A211BE75508284DFCB12DF54D5C0B15BBA2FB84314F24C6AAE8894B697C33AD44BCF61