Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rNuevaorden_pdf.exe

Overview

General Information

Sample name:rNuevaorden_pdf.exe
Analysis ID:1586732
MD5:5c56f7b36c3eb8ef883c56b817deb84a
SHA1:4cd5ac8d38c6a404060f8256bbeb3c47f4c6bf9f
SHA256:04bdc8b7b3fef8114c7be89c4eb90769e91dc50c8af12d518f724f15519d71a8
Tags:exeuser-Porcupine
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Initial sample is a PE file and has a suspicious name
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • rNuevaorden_pdf.exe (PID: 5968 cmdline: "C:\Users\user\Desktop\rNuevaorden_pdf.exe" MD5: 5C56F7B36C3EB8EF883C56B817DEB84A)
    • RegAsm.exe (PID: 1196 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.lampadari.gr", "Username": "apamadick@lampadari.gr", "Password": "P8P[uVeJU=vh"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1332113164.00000000022F2000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.1332113164.00000000022F2000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000003.1328318463.000000000047E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000003.1328318463.000000000047E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000003.1328615566.000000000049D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            0.3.rNuevaorden_pdf.exe.49ddfc.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.3.rNuevaorden_pdf.exe.49ddfc.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.3.rNuevaorden_pdf.exe.49ddfc.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x3262b:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x3269d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x32727:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x327b9:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x32823:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x32895:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x3292b:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x329bb:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.3.rNuevaorden_pdf.exe.49ddfc.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                • 0x2f811:$s2: GetPrivateProfileString
                • 0x2ef33:$s3: get_OSFullName
                • 0x3057e:$s5: remove_Key
                • 0x30722:$s5: remove_Key
                • 0x31675:$s6: FtpWebRequest
                • 0x3260d:$s7: logins
                • 0x32b7f:$s7: logins
                • 0x35862:$s7: logins
                • 0x35942:$s7: logins
                • 0x37295:$s7: logins
                • 0x364dc:$s9: 1.85 (Hash, version 2, native byte-order)
                0.3.rNuevaorden_pdf.exe.49ddf8.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 32 entries
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: rNuevaorden_pdf.exeAvira: detected
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.lampadari.gr", "Username": "apamadick@lampadari.gr", "Password": "P8P[uVeJU=vh"}
                  Source: rNuevaorden_pdf.exeReversingLabs: Detection: 50%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: rNuevaorden_pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

                  Networking

                  barindex
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddf8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.rNuevaorden_pdf.exe.22f0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddfc.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: rNuevaorden_pdf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                  Source: rNuevaorden_pdf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                  Source: rNuevaorden_pdf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                  Source: rNuevaorden_pdf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: rNuevaorden_pdf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: rNuevaorden_pdf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                  Source: rNuevaorden_pdf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                  Source: rNuevaorden_pdf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: rNuevaorden_pdf.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                  Source: RegAsm.exe, 00000008.00000002.3710941669.0000000003161000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.3710941669.0000000003243000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.3710941669.0000000003228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: rNuevaorden_pdf.exe, 00000000.00000003.1328318463.000000000047E000.00000004.00000020.00020000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000003.1328615566.000000000049D000.00000004.00000020.00020000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000002.1332113164.00000000022F2000.00000040.10000000.00040000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000003.1328738169.0000000003DF1000.00000004.00000020.00020000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000003.1328860723.000000000049D000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.3710941669.0000000003161000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.3707413394.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegAsm.exe, 00000008.00000002.3710941669.0000000003228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: rNuevaorden_pdf.exeString found in binary or memory: http://ocsp.digicert.com0
                  Source: rNuevaorden_pdf.exeString found in binary or memory: http://ocsp.digicert.com0A
                  Source: rNuevaorden_pdf.exeString found in binary or memory: http://ocsp.digicert.com0C
                  Source: rNuevaorden_pdf.exeString found in binary or memory: http://ocsp.digicert.com0X
                  Source: RegAsm.exe, 00000008.00000002.3710941669.0000000003161000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.3710941669.0000000003228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: rNuevaorden_pdf.exeString found in binary or memory: http://www.digicert.com/CPS0
                  Source: rNuevaorden_pdf.exe, 00000000.00000003.1328318463.000000000047E000.00000004.00000020.00020000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000003.1328615566.000000000049D000.00000004.00000020.00020000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000002.1332113164.00000000022F2000.00000040.10000000.00040000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000003.1328738169.0000000003DF1000.00000004.00000020.00020000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000003.1328860723.000000000049D000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.3707413394.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: rNuevaorden_pdf.exeString found in binary or memory: https://github.com/mullvad/mullvadvpn-app#readme0

                  System Summary

                  barindex
                  Source: 0.3.rNuevaorden_pdf.exe.49ddfc.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.3.rNuevaorden_pdf.exe.49ddfc.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.rNuevaorden_pdf.exe.22f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.rNuevaorden_pdf.exe.22f0000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.3.rNuevaorden_pdf.exe.49ddfc.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.3.rNuevaorden_pdf.exe.49ddfc.0.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000000.00000002.1332431486.0000000025E4D000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Auto-generated rule - file scan copy.pdf.r11 Author: Florian Roth
                  Source: initial sampleStatic PE information: Filename: rNuevaorden_pdf.exe
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_260354FB NtAllocateVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,0_2_260354FB
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_260653A0 __vbaFreeVar,NtSetInformationProcess,0_2_260653A0
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_020D2CDF NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_020D2CDF
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_020D2CDA NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_020D2CDA
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_020D01BF NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_020D01BF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0044386F NtDelayExecution,8_2_0044386F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004460F2 NtProtectVirtualMemory,8_2_004460F2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004458B2 NtAllocateVirtualMemory,8_2_004458B2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0044315F NtCreateThreadEx,NtClose,8_2_0044315F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00445F47 NtProtectVirtualMemory,8_2_00445F47
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00445FE2 NtAllocateVirtualMemory,8_2_00445FE2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004438E5 NtCreateThreadEx,NtClose,8_2_004438E5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004458F8 NtAllocateVirtualMemory,8_2_004458F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0044316A NtCreateThreadEx,NtClose,8_2_0044316A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00443DDE NtClose,8_2_00443DDE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00443DB7 NtCreateThreadEx,NtClose,8_2_00443DB7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_030EA6088_2_030EA608
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_030E4A808_2_030E4A80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_030ED9688_2_030ED968
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_030E3E688_2_030E3E68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_030E41B08_2_030E41B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_06A024708_2_06A02470
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_06A012C08_2_06A012C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_06A03C188_2_06A03C18
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_06A035308_2_06A03530
                  Source: rNuevaorden_pdf.exeStatic PE information: invalid certificate
                  Source: rNuevaorden_pdf.exe, 00000000.00000003.1328318463.000000000047E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename756a5eef-0c1c-4bed-83c6-a963e51853c7.exe4 vs rNuevaorden_pdf.exe
                  Source: rNuevaorden_pdf.exe, 00000000.00000003.1328615566.000000000049D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename756a5eef-0c1c-4bed-83c6-a963e51853c7.exe4 vs rNuevaorden_pdf.exe
                  Source: rNuevaorden_pdf.exe, 00000000.00000003.1328738169.0000000003DF1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename756a5eef-0c1c-4bed-83c6-a963e51853c7.exe4 vs rNuevaorden_pdf.exe
                  Source: rNuevaorden_pdf.exe, 00000000.00000000.1255796268.000000002606C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameacvm7qw909e.exe vs rNuevaorden_pdf.exe
                  Source: rNuevaorden_pdf.exe, 00000000.00000002.1332113164.000000000232E000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilename756a5eef-0c1c-4bed-83c6-a963e51853c7.exe4 vs rNuevaorden_pdf.exe
                  Source: rNuevaorden_pdf.exe, 00000000.00000003.1328860723.000000000049D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename756a5eef-0c1c-4bed-83c6-a963e51853c7.exe4 vs rNuevaorden_pdf.exe
                  Source: rNuevaorden_pdf.exeBinary or memory string: OriginalFilenameacvm7qw909e.exe vs rNuevaorden_pdf.exe
                  Source: rNuevaorden_pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  Source: 0.3.rNuevaorden_pdf.exe.49ddfc.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.3.rNuevaorden_pdf.exe.49ddfc.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.rNuevaorden_pdf.exe.22f0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.rNuevaorden_pdf.exe.22f0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.3.rNuevaorden_pdf.exe.49ddfc.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.3.rNuevaorden_pdf.exe.49ddfc.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.3.rNuevaorden_pdf.exe.49ddf8.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000000.00000002.1332431486.0000000025E4D000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: LokiBot_Dropper_Packed_R11_Feb18 date = 2018-02-14, hash1 = 3b248d40fd7acb839cc592def1ed7652734e0e5ef93368be3c36c042883a3029, author = Florian Roth, description = Auto-generated rule - file scan copy.pdf.r11, reference = https://app.any.run/tasks/401df4d9-098b-4fd0-86e0-7a52ce6ddbf5, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\eb42b1a5c308fc11edf1ddbdd25c8486_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                  Source: rNuevaorden_pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegAsm.exe, 00000008.00000002.3710941669.0000000003273000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.3710941669.0000000003261000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: rNuevaorden_pdf.exeReversingLabs: Detection: 50%
                  Source: unknownProcess created: C:\Users\user\Desktop\rNuevaorden_pdf.exe "C:\Users\user\Desktop\rNuevaorden_pdf.exe"
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: msvbvm60.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: vb6zz.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: vb6de.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: vb6de.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0BE35204-8F91-11CE-9DE3-00AA004BB851}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: rNuevaorden_pdf.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: rNuevaorden_pdf.exeStatic file information: File size 2283936 > 1048576
                  Source: rNuevaorden_pdf.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x225000
                  Source: rNuevaorden_pdf.exeStatic PE information: real checksum: 0x237139 should be: 0x2334ff
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_25E4CDB4 push D4006C00h; iretd 0_2_25E4CE05
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_020D2A23 pushad ; ret 0_2_020D2A26
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_020D1E30 pushad ; retf 0_2_020D1E36
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_020D4EBB push ds; ret 0_2_020D4ECC
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_020D12E6 push ss; iretd 0_2_020D12E8
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_020D47AC push es; iretd 0_2_020D47CB
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_020D0DD4 push esp; retf 0_2_020D0DE1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004434B4 push es; iretd 8_2_004434D3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00443BC3 push ds; ret 8_2_00443BD4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_030E9E50 pushfd ; ret 8_2_030EA361
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: rNuevaorden_pdf.exe, 00000000.00000003.1328318463.000000000047E000.00000004.00000020.00020000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000003.1328615566.000000000049D000.00000004.00000020.00020000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000002.1332113164.00000000022F2000.00000040.10000000.00040000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000003.1328738169.0000000003DF1000.00000004.00000020.00020000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000003.1328860723.000000000049D000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.3710941669.0000000003243000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.3707413394.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegAsm.exe, 00000008.00000002.3710941669.0000000003195000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 30A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3160000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 5160000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1352Thread sleep count: 174 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1352Thread sleep time: -174000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: RegAsm.exe, 00000008.00000002.3710941669.0000000003195000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: RegAsm.exe, 00000008.00000002.3710941669.0000000003195000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: RegAsm.exe, 00000008.00000002.3707413394.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                  Source: RegAsm.exe, 00000008.00000002.3712475530.0000000006484000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_030E7138 CheckRemoteDebuggerPresent,8_2_030E7138
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_26035AB1 mov eax, dword ptr fs:[00000030h]0_2_26035AB1
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_020D2CDF mov eax, dword ptr fs:[00000030h]0_2_020D2CDF
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_020D32B0 mov eax, dword ptr fs:[00000030h]0_2_020D32B0
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_020D6F22 mov eax, dword ptr fs:[00000030h]0_2_020D6F22
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_020D6C40 mov eax, dword ptr fs:[00000030h]0_2_020D6C40
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeCode function: 0_2_020D6CA6 mov eax, dword ptr fs:[00000030h]0_2_020D6CA6
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004458B2 mov ecx, dword ptr fs:[00000030h]8_2_004458B2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00445C2A mov eax, dword ptr fs:[00000030h]8_2_00445C2A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004458E8 mov eax, dword ptr fs:[00000030h]8_2_004458E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004458F8 mov ecx, dword ptr fs:[00000030h]8_2_004458F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00445948 mov eax, dword ptr fs:[00000030h]8_2_00445948
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004459AE mov eax, dword ptr fs:[00000030h]8_2_004459AE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00445A2B mov eax, dword ptr fs:[00000030h]8_2_00445A2B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00445690 mov ecx, dword ptr fs:[00000030h]8_2_00445690
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00445ABF mov eax, dword ptr fs:[00000030h]8_2_00445ABF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004457FC mov eax, dword ptr fs:[00000030h]8_2_004457FC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: F95008Jump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\rNuevaorden_pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddfc.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddf8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.rNuevaorden_pdf.exe.22f0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddfc.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddf8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1332113164.00000000022F2000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1328318463.000000000047E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1328615566.000000000049D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3707413394.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1328738169.0000000003DF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1328860723.000000000049D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: rNuevaorden_pdf.exe PID: 5968, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1196, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddfc.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddf8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.rNuevaorden_pdf.exe.22f0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddfc.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddf8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1332113164.00000000022F2000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1328318463.000000000047E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1328615566.000000000049D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3707413394.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1328738169.0000000003DF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1328860723.000000000049D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3710941669.0000000003195000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: rNuevaorden_pdf.exe PID: 5968, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1196, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddfc.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddf8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddf8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.rNuevaorden_pdf.exe.22f0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddfc.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.rNuevaorden_pdf.exe.49ddf8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1332113164.00000000022F2000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1328318463.000000000047E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1328615566.000000000049D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.3707413394.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1328738169.0000000003DF1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1328860723.000000000049D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: rNuevaorden_pdf.exe PID: 5968, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1196, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  211
                  Process Injection
                  1
                  Masquerading
                  1
                  OS Credential Dumping
                  531
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  25
                  Virtualization/Sandbox Evasion
                  LSASS Memory25
                  Virtualization/Sandbox Evasion
                  Remote Desktop Protocol1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  Disable or Modify Tools
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin Shares1
                  Data from Local System
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook211
                  Process Injection
                  NTDS1
                  System Network Configuration Discovery
                  Distributed Component Object ModelInput Capture2
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Obfuscated Files or Information
                  LSA Secrets1
                  File and Directory Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials34
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  rNuevaorden_pdf.exe50%ReversingLabsWin32.Trojan.MintZard
                  rNuevaorden_pdf.exe100%AviraTR/Dropper.Gen
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ip-api.com
                  208.95.112.1
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://ip-api.com/line/?fields=hostingfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://account.dyn.com/rNuevaorden_pdf.exe, 00000000.00000003.1328318463.000000000047E000.00000004.00000020.00020000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000003.1328615566.000000000049D000.00000004.00000020.00020000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000002.1332113164.00000000022F2000.00000040.10000000.00040000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000003.1328738169.0000000003DF1000.00000004.00000020.00020000.00000000.sdmp, rNuevaorden_pdf.exe, 00000000.00000003.1328860723.000000000049D000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.3707413394.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                        high
                        https://github.com/mullvad/mullvadvpn-app#readme0rNuevaorden_pdf.exefalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000008.00000002.3710941669.0000000003161000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.3710941669.0000000003228000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://ip-api.comRegAsm.exe, 00000008.00000002.3710941669.0000000003161000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.3710941669.0000000003243000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.3710941669.0000000003228000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              208.95.112.1
                              ip-api.comUnited States
                              53334TUT-ASUSfalse
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1586732
                              Start date and time:2025-01-09 15:05:17 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 7m 16s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:14
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:rNuevaorden_pdf.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 82%
                              • Number of executed functions: 23
                              • Number of non-executed functions: 11
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 13.107.253.45, 20.12.23.50
                              • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              • VT rate limit hit for: rNuevaorden_pdf.exe
                              TimeTypeDescription
                              10:38:37API Interceptor145x Sleep call for process: RegAsm.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              208.95.112.1I334hDwRjj.exeGet hashmaliciousBlank Grabber, NjratBrowse
                              • ip-api.com/json/?fields=225545
                              startup_str_466.batGet hashmaliciousXWormBrowse
                              • ip-api.com/line/?fields=hosting
                              7dtpow.ps1Get hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              x.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              TR98760H.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              47SXvEQ.exeGet hashmaliciousBlank Grabber, XmrigBrowse
                              • ip-api.com/json/?fields=225545
                              test.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                              • ip-api.com/json/
                              HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                              • ip-api.com/line/?fields=hosting
                              1.exeGet hashmaliciousUnknownBrowse
                              • ip-api.com/json/?fields=hosting,query
                              1.exeGet hashmaliciousUnknownBrowse
                              • ip-api.com/json/?fields=hosting,query
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              ip-api.comI334hDwRjj.exeGet hashmaliciousBlank Grabber, NjratBrowse
                              • 208.95.112.1
                              startup_str_466.batGet hashmaliciousXWormBrowse
                              • 208.95.112.1
                              7dtpow.ps1Get hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              x.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              TR98760H.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              47SXvEQ.exeGet hashmaliciousBlank Grabber, XmrigBrowse
                              • 208.95.112.1
                              test.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                              • 208.95.112.1
                              HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                              • 208.95.112.1
                              1.exeGet hashmaliciousUnknownBrowse
                              • 208.95.112.1
                              1.exeGet hashmaliciousUnknownBrowse
                              • 208.95.112.1
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              TUT-ASUSI334hDwRjj.exeGet hashmaliciousBlank Grabber, NjratBrowse
                              • 208.95.112.1
                              startup_str_466.batGet hashmaliciousXWormBrowse
                              • 208.95.112.1
                              7dtpow.ps1Get hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              x.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              TR98760H.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              47SXvEQ.exeGet hashmaliciousBlank Grabber, XmrigBrowse
                              • 208.95.112.1
                              test.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                              • 208.95.112.1
                              HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                              • 208.95.112.1
                              1.exeGet hashmaliciousUnknownBrowse
                              • 208.95.112.1
                              1.exeGet hashmaliciousUnknownBrowse
                              • 208.95.112.1
                              No context
                              No context
                              Process:C:\Users\user\Desktop\rNuevaorden_pdf.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):50
                              Entropy (8bit):1.5212424590621707
                              Encrypted:false
                              SSDEEP:3:/lvlp:p
                              MD5:C851BF93667BDD6310D56581D955C2AE
                              SHA1:8FC5AEC1542BD7471BF815632863622EFE23A834
                              SHA-256:3C1A3E1EF8840689F0C6EC14E22435FC79EBC3F8771B7CD230F784CC81AE431D
                              SHA-512:D3D597D36DE0EE75AA44F4F8571E56DAD810E7E6C9839F5D5E6BB05846AB6E61FAF1E9530333BD6EC5AB04098AAE935A522DBD149D214A5971A7368E18C3C9B4
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview:........................................user.
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):7.178697695122667
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.15%
                              • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:rNuevaorden_pdf.exe
                              File size:2'283'936 bytes
                              MD5:5c56f7b36c3eb8ef883c56b817deb84a
                              SHA1:4cd5ac8d38c6a404060f8256bbeb3c47f4c6bf9f
                              SHA256:04bdc8b7b3fef8114c7be89c4eb90769e91dc50c8af12d518f724f15519d71a8
                              SHA512:62977535ce741a7be1d9c3e1e4cced8774592081eb6819c869aa982ae69fb4bf6a78bdbabaab8f7d81e82c0bb10ad4f55e4082194d95bf910c5788bf62378844
                              SSDEEP:49152:Y3ASbdYAm4zEbdYAm4zWbdYAm4z23Ag3AWbdYAm4zSbdYAm4zO3AgS+t:qA4drWdr0drkASA0dr4dr8AX
                              TLSH:BBB5BF0322208FAFED86DF3677BA80E443153C5903155A41329F7720EB779BE9D29A5B
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................Rich............PE..L......g.................P"..P......4........`"....%.......
                              Icon Hash:0b3c394969696722
                              Entrypoint:0x25e41234
                              Entrypoint Section:.text
                              Digitally signed:true
                              Imagebase:0x25e40000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                              DLL Characteristics:
                              Time Stamp:0x677FB18F [Thu Jan 9 11:22:55 2025 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:42a4e0f64241075ea237a4cf00d0db9f
                              Signature Valid:false
                              Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                              Signature Validation Error:The digital signature of the object did not verify
                              Error Number:-2146869232
                              Not Before, Not After
                              • 14/03/2024 01:00:00 07/02/2027 00:59:59
                              Subject Chain
                              • CN=Mullvad VPN AB, O=Mullvad VPN AB, L=G\xf6teborg, C=SE, SERIALNUMBER=559238-4001, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=SE
                              Version:3
                              Thumbprint MD5:7068F855B513C1F69538E13DF0A7870D
                              Thumbprint SHA-1:1F5E906F4E2DBE2A3C3226A6B0638E9327F76135
                              Thumbprint SHA-256:4136B97CF51C1779F94FF626978743FF874E0EABB3AFB5CB00CB9E6DBB5440E8
                              Serial:078050BBC100F2FFAF0FE03B15FE221A
                              Instruction
                              push 25E4A54Ch
                              call 00007F3A9908D0A5h
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              xor byte ptr [eax], al
                              add byte ptr [eax], al
                              inc eax
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add dh, al
                              push ebx
                              jns 00007F3A9908D0D5h
                              mov ecx, B04DD8DFh
                              mov byte ptr [edx], ah
                              sbb dword ptr [edx-17h], edx
                              and byte ptr [ebx], dh
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add dword ptr [eax], eax
                              add byte ptr [eax], al
                              sub eax, 30303043h
                              sub eax, 61726543h
                              pop edi
                              push esi
                              popad
                              jno 00007F3A9908D117h
                              popad
                              add byte ptr [esi], dh
                              jnl 00007F3A9908D0D5h
                              xor ch, byte ptr [esi]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              dec esp
                              xor dword ptr [eax], eax
                              add al, al
                              fsub qword ptr [edi+37h]
                              pop ebp
                              fstp dword ptr [edx-019657BCh]
                              int 97h
                              sbb byte ptr [edi-3D100426h], ch
                              mov edx, ecx
                              jno 00007F3A9908D080h
                              inc esp
                              mov ch, 59h
                              xor bl, byte ptr [edx+2Fh]
                              mov dword ptr [4F3A5001h], eax
                              lodsd
                              xor ebx, dword ptr [ecx-48EE309Ah]
                              or al, 00h
                              stosb
                              add byte ptr [eax-2Dh], ah
                              xchg eax, ebx
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              xor dl, byte ptr [ecx+00420000h]
                              add byte ptr [eax], al
                              add byte ptr [726F4600h], al
                              insd
                              xor dword ptr [eax], eax
                              or eax, 46000501h
                              outsd
                              jc 00007F3A9908D11Fh
                              xor dword ptr [eax], eax
                              sbb dword ptr [ecx], eax
                              add byte ptr [edx+00h], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x2264080x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x22c0000x2894.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x22b0000x29a0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x2260000x180.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x224dd40x225000ec8d87c508226191021b0385860d6104unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x2260000xb300x1000247ba9c57e0153ff8ad7a3e5007a70efFalse0.27490234375data3.852615893128322IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x2270000x4bac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x22c0000x28940x30002baf5f70157517665e235b7a5d5d044eFalse0.292724609375data3.958826443751654IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0x22c0e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.33599585062240667
                              RT_GROUP_ICON0x22e6900x14data1.15
                              RT_VERSION0x22e6a40x1f0MS Windows COFF PowerPC object fileGermanGermany0.49798387096774194
                              DLLImport
                              KERNEL32.DLLGetProcAddress, GetModuleHandleW
                              MSVBVM60.DLL__vbaVarSub, _CIcos, _adj_fptan, __vbaVarMove, __vbaVarVargNofree, __vbaFreeVar, __vbaAryMove, __vbaStrVarMove, __vbaLenBstr, __vbaFreeVarList, _adj_fdiv_m64, __vbaNextEachVar, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaBoolErrVar, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenVar, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaRefVarAry, __vbaBoolVarNull, _CIsin, __vbaVargVarMove, __vbaVarZero, __vbaVarCmpGt, __vbaChkstk, EVENT_SINK_AddRef, __vbaVarTstEq, DllFunctionCall, __vbaVarOr, __vbaRedimPreserve, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, __vbaNew, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaInStrVar, __vbaStrVarVal, __vbaUbound, __vbaVarCat, _CIlog, __vbaVar2Vec, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaI4Var, __vbaAryLock, __vbaVarAdd, __vbaVarDup, __vbaStrToAnsi, __vbaVarCopy, __vbaVarLateMemCallLd, _CIatan, __vbaStrMove, __vbaCastObj, __vbaStrVarCopy, __vbaForEachVar, _allmul, _CItan, __vbaAryUnlock, _CIexp, __vbaFreeObj, __vbaFreeStr
                              Language of compilation systemCountry where language is spokenMap
                              GermanGermany
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 9, 2025 15:06:20.502583027 CET4970080192.168.2.7208.95.112.1
                              Jan 9, 2025 15:06:20.507565022 CET8049700208.95.112.1192.168.2.7
                              Jan 9, 2025 15:06:20.507661104 CET4970080192.168.2.7208.95.112.1
                              Jan 9, 2025 15:06:20.508483887 CET4970080192.168.2.7208.95.112.1
                              Jan 9, 2025 15:06:20.513356924 CET8049700208.95.112.1192.168.2.7
                              Jan 9, 2025 15:06:20.962548018 CET8049700208.95.112.1192.168.2.7
                              Jan 9, 2025 15:06:21.008434057 CET4970080192.168.2.7208.95.112.1
                              Jan 9, 2025 15:07:27.843049049 CET8049700208.95.112.1192.168.2.7
                              Jan 9, 2025 15:07:27.843200922 CET4970080192.168.2.7208.95.112.1
                              Jan 9, 2025 15:08:00.979166031 CET4970080192.168.2.7208.95.112.1
                              Jan 9, 2025 15:08:00.984230995 CET8049700208.95.112.1192.168.2.7
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 9, 2025 15:06:20.489489079 CET6103253192.168.2.71.1.1.1
                              Jan 9, 2025 15:06:20.496457100 CET53610321.1.1.1192.168.2.7
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 9, 2025 15:06:20.489489079 CET192.168.2.71.1.1.10x5ad0Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 9, 2025 15:06:20.496457100 CET1.1.1.1192.168.2.70x5ad0No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                              • ip-api.com
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.749700208.95.112.1801196C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              TimestampBytes transferredDirectionData
                              Jan 9, 2025 15:06:20.508483887 CET80OUTGET /line/?fields=hosting HTTP/1.1
                              Host: ip-api.com
                              Connection: Keep-Alive
                              Jan 9, 2025 15:06:20.962548018 CET175INHTTP/1.1 200 OK
                              Date: Thu, 09 Jan 2025 14:06:20 GMT
                              Content-Type: text/plain; charset=utf-8
                              Content-Length: 6
                              Access-Control-Allow-Origin: *
                              X-Ttl: 60
                              X-Rl: 44
                              Data Raw: 66 61 6c 73 65 0a
                              Data Ascii: false


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:09:06:12
                              Start date:09/01/2025
                              Path:C:\Users\user\Desktop\rNuevaorden_pdf.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\rNuevaorden_pdf.exe"
                              Imagebase:0x25e40000
                              File size:2'283'936 bytes
                              MD5 hash:5C56F7B36C3EB8EF883C56B817DEB84A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1332113164.00000000022F2000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1332113164.00000000022F2000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1328318463.000000000047E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1328318463.000000000047E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1328615566.000000000049D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1328615566.000000000049D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: LokiBot_Dropper_Packed_R11_Feb18, Description: Auto-generated rule - file scan copy.pdf.r11, Source: 00000000.00000002.1332431486.0000000025E4D000.00000040.00000001.01000000.00000003.sdmp, Author: Florian Roth
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1328738169.0000000003DF1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1328738169.0000000003DF1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1328860723.000000000049D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1328860723.000000000049D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:8
                              Start time:09:06:19
                              Start date:09/01/2025
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                              Imagebase:0xce0000
                              File size:65'440 bytes
                              MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.3707413394.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.3707413394.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.3710941669.0000000003195000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:17.1%
                                Dynamic/Decrypted Code Coverage:29.2%
                                Signature Coverage:25.5%
                                Total number of Nodes:212
                                Total number of Limit Nodes:13
                                execution_graph 1688 20d2cac 1689 20d2cad 1688->1689 1690 20d32b0 GetPEB 1689->1690 1691 20d2bb7 1689->1691 1692 20d2d3a 1690->1692 1692->1691 1693 20d2ea6 NtCreateSection 1692->1693 1693->1691 1694 20d2edd NtMapViewOfSection 1693->1694 1694->1691 1695 20d2f05 1694->1695 1696 20d3068 GetPEB 1695->1696 1700 20d2fa3 CreateProcessW 1695->1700 1696->1700 1698 20d30ae NtGetContextThread 1699 20d30cf NtReadVirtualMemory 1698->1699 1698->1700 1699->1700 1701 20d30f5 NtWriteVirtualMemory 1699->1701 1700->1691 1700->1698 1701->1700 1702 20d311b NtUnmapViewOfSection NtMapViewOfSection 1701->1702 1702->1700 1703 20d314f NtSetContextThread 1702->1703 1703->1700 1704 20d3180 NtResumeThread 1703->1704 1704->1691 1704->1700 1475 20d2cdf 1476 20d2cf0 1475->1476 1494 20d32b0 GetPEB 1476->1494 1478 20d2d1f 1479 20d31a4 1478->1479 1480 20d32b0 GetPEB 1478->1480 1481 20d2d3a 1480->1481 1481->1479 1482 20d2ea6 NtCreateSection 1481->1482 1482->1479 1483 20d2edd NtMapViewOfSection 1482->1483 1483->1479 1484 20d2f05 1483->1484 1485 20d3068 GetPEB 1484->1485 1489 20d2fa3 CreateProcessW 1484->1489 1485->1489 1487 20d30ae NtGetContextThread 1488 20d30cf NtReadVirtualMemory 1487->1488 1487->1489 1488->1489 1490 20d30f5 NtWriteVirtualMemory 1488->1490 1489->1479 1489->1487 1490->1489 1491 20d311b NtUnmapViewOfSection NtMapViewOfSection 1490->1491 1491->1489 1492 20d314f NtSetContextThread 1491->1492 1492->1489 1493 20d3180 NtResumeThread 1492->1493 1493->1479 1493->1489 1495 20d32c5 1494->1495 1495->1478 1615 25e4a796 1616 26063670 __vbaVarVargNofree __vbaVarCopy __vbaVarTstEq 1615->1616 1618 2606380b __vbaVarTstEq 1616->1618 1619 26063768 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat 1616->1619 1620 26063883 __vbaVarTstEq 1618->1620 1621 26063830 1618->1621 1622 2605ea80 1619->1622 1623 26063975 __vbaVarTstEq 1620->1623 1624 260638ac 9 API calls 1620->1624 1627 2606386e __vbaVargVarMove 1621->1627 1625 260637d7 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1622->1625 1629 2606399e 13 API calls 1623->1629 1630 26063a8a 1623->1630 1628 2605ea80 1624->1628 1626 26063a9c __vbaVarVargNofree __vbaVarCopy __vbaVarTstEq 1625->1626 1633 26063af0 __vbaVarTstEq 1626->1633 1680 26063ae6 1626->1680 1627->1630 1631 26063939 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1628->1631 1632 2605ea80 1629->1632 1630->1626 1631->1626 1636 26063a49 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1632->1636 1634 26063b21 19 API calls 1633->1634 1635 26063c38 __vbaVarTstEq 1633->1635 1637 2605ea80 1634->1637 1638 26063e2b __vbaVarTstEq 1635->1638 1639 26063c69 37 API calls 1635->1639 1636->1626 1640 26063bed __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1637->1640 1642 26063e62 __vbaVarTstEq 1638->1642 1638->1680 1641 2605ea80 1639->1641 1644 26064cb9 __vbaFreeVarList 1640->1644 1645 26063dbc __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1641->1645 1646 26063e93 19 API calls 1642->1646 1647 26063faa __vbaVarTstEq 1642->1647 1643 26064cae __vbaVargVarMove 1643->1644 1645->1644 1649 2605ea80 1646->1649 1650 26064080 __vbaVarTstEq 1647->1650 1651 26063fdb 7 API calls 1647->1651 1654 26063f5f __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1649->1654 1653 260640b7 __vbaVarTstEq 1650->1653 1650->1680 1652 2605ea80 1651->1652 1655 2606404d __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1652->1655 1656 260640ee __vbaVarTstEq 1653->1656 1653->1680 1654->1644 1655->1644 1657 26064125 __vbaVarTstEq 1656->1657 1656->1680 1658 26064156 19 API calls 1657->1658 1659 2606426d __vbaVarTstEq 1657->1659 1660 2605ea80 1658->1660 1661 2606429e 21 API calls 1659->1661 1662 260643c8 __vbaVarTstEq 1659->1662 1665 26064222 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1660->1665 1666 2605ea80 1661->1666 1663 260645f4 __vbaVarTstEq 1662->1663 1664 260643f9 43 API calls 1662->1664 1668 26064625 41 API calls 1663->1668 1669 2606480d __vbaVarTstEq 1663->1669 1667 2605ea80 1664->1667 1665->1644 1670 26064379 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1666->1670 1671 26064579 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1667->1671 1672 2605ea80 1668->1672 1673 2606483e 47 API calls 1669->1673 1674 26064a5f __vbaVarTstEq 1669->1674 1670->1644 1671->1644 1675 26064796 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1672->1675 1676 2605ea80 1673->1676 1677 26064a90 11 API calls 1674->1677 1678 26064b5b __vbaVarTstEq 1674->1678 1675->1644 1681 260649dc __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1676->1681 1682 2605ea80 1677->1682 1679 26064b95 __vbaVarTstEq 1678->1679 1678->1680 1679->1680 1683 26064bc4 __vbaVarTstEq 1679->1683 1680->1643 1681->1644 1684 26064b20 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1682->1684 1683->1680 1685 26064bf3 __vbaVarTstEq 1683->1685 1684->1644 1685->1680 1686 26064c1f __vbaVarTstEq 1685->1686 1686->1680 1687 26064c4b __vbaVarTstEq 1686->1687 1687->1644 1687->1680 1496 25e4ad11 1497 25e4ad2a 1496->1497 1500 25e4af09 1497->1500 1498 26064df9 1501 26064e30 1500->1501 1509 26065320 1501->1509 1505 26064e79 1555 260653a0 1505->1555 1508 26064e98 1508->1498 1559 260354fb 1509->1559 1512 2605ed00 9 API calls 1570 26062bd0 __vbaVarDup #653 __vbaI4Var __vbaFreeVar 1512->1570 1514 2605ee05 7 API calls 1515 26062bd0 10 API calls 1514->1515 1516 2605ee7e 45 API calls 1515->1516 1519 2605f07c 1516->1519 1517 2605f0f5 __vbaObjSetAddref #644 __vbaFreeObj #644 1575 26035bcb 1517->1575 1518 2605f094 __vbaAryLock #644 __vbaAryUnlock 1518->1519 1519->1517 1519->1518 1521 2605f13b __vbaAryLock #644 __vbaAryUnlock #644 1576 26035bae 1521->1576 1523 2605f191 __vbaRedim #644 1577 26035bae 1523->1577 1525 2605f1df #644 1578 26035bae 1525->1578 1527 2605f20c __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 1528 2605f292 __vbaAryUnlock __vbaFreeStr #644 1527->1528 1529 2605f27b __vbaHresultCheckObj 1527->1529 1532 2605f2c7 1528->1532 1529->1528 1530 2605f336 #644 1579 26035bae 1530->1579 1531 2605f2df __vbaAryLock #644 __vbaAryUnlock 1531->1532 1532->1530 1532->1531 1534 2605f35c #644 1580 26035bae 1534->1580 1536 2605f382 #644 1581 26035bae 1536->1581 1538 2605f3a8 #644 1582 26035bae 1538->1582 1540 2605f3ce #644 1583 26035bae 1540->1583 1542 2605f3f4 VirtualProtect 1543 2605f43f __vbaHresultCheckObj 1542->1543 1544 2605f456 1542->1544 1543->1544 1545 2605f4c3 #644 1544->1545 1546 2605f472 __vbaAryLock #644 __vbaAryUnlock 1544->1546 1584 26035bae 1545->1584 1546->1544 1548 2605f4de #644 1585 26035bae 1548->1585 1550 2605f4f3 #644 1551 2605f50f 1550->1551 1586 2605f7c0 1551->1586 1553 2605f518 __vbaFreeVar 1554 2605f58f __vbaAryDestruct 1553->1554 1554->1505 1597 25e4e144 1555->1597 1557 260653e6 NtSetInformationProcess 1558 26064e82 __vbaFreeVar 1557->1558 1558->1508 1560 2603551d 1559->1560 1568 26035ab1 GetPEB 1560->1568 1562 26035527 1563 2603559f NtProtectVirtualMemory 1562->1563 1564 2603557c NtAllocateVirtualMemory 1562->1564 1565 2603559a __vbaFreeVar 1563->1565 1567 260355ca 1563->1567 1564->1563 1564->1565 1565->1512 1566 26035663 NtProtectVirtualMemory 1566->1565 1567->1566 1569 26035ac3 1568->1569 1569->1562 1571 26062c50 1570->1571 1572 26062cc1 __vbaFreeVar 1571->1572 1573 26062c58 #632 __vbaVarCat __vbaStrVarMove __vbaStrMove __vbaFreeVarList 1571->1573 1572->1514 1573->1571 1575->1521 1576->1523 1577->1525 1578->1527 1579->1534 1580->1536 1581->1538 1582->1540 1583->1542 1584->1548 1585->1550 1594 2605fee0 1586->1594 1588 2605f7fb #644 #644 1595 26035bae 1588->1595 1590 2605f82b #644 1596 26035bcb 1590->1596 1592 2605f848 #644 1593 2605f867 1592->1593 1593->1553 1594->1588 1595->1590 1596->1592 1598 25e4e14d 1597->1598 1712 20d2cda 1713 20d2cdf 1712->1713 1714 20d32b0 GetPEB 1713->1714 1715 20d2d1f 1714->1715 1716 20d31a4 1715->1716 1717 20d32b0 GetPEB 1715->1717 1718 20d2d3a 1717->1718 1718->1716 1719 20d2ea6 NtCreateSection 1718->1719 1719->1716 1720 20d2edd NtMapViewOfSection 1719->1720 1720->1716 1721 20d2f05 1720->1721 1722 20d3068 GetPEB 1721->1722 1726 20d2fa3 CreateProcessW 1721->1726 1722->1726 1724 20d30ae NtGetContextThread 1725 20d30cf NtReadVirtualMemory 1724->1725 1724->1726 1725->1726 1727 20d30f5 NtWriteVirtualMemory 1725->1727 1726->1716 1726->1724 1727->1726 1728 20d311b NtUnmapViewOfSection NtMapViewOfSection 1727->1728 1728->1726 1729 20d314f NtSetContextThread 1728->1729 1729->1726 1730 20d3180 NtResumeThread 1729->1730 1730->1716 1730->1726 1599 20d4457 1600 20d4bde 1599->1600 1603 20d6c40 GetPEB 1600->1603 1604 20d6c4c 1603->1604 1731 20d4b67 1734 20d6f22 GetPEB 1731->1734 1705 20d6ca6 GetPEB 1706 25e4a74b 1707 260632b0 19 API calls 1706->1707 1709 26062bd0 10 API calls 1707->1709 1710 260633d2 __vbaStrMove __vbaFreeStrList __vbaFreeVar 1709->1710 1711 26063460 1710->1711

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 61 20d01bf-20d01c3 62 20d022f-20d0239 61->62 63 20d01c5-20d2a6a 61->63 67 20d2bf8-20d2bff 62->67 68 20d023a-20d23e1 62->68 69 20d2c00-20d2c05 67->69 72 20d2c6e-20d2c71 69->72 73 20d2c07-20d2c14 69->73 77 20d2c5a-20d2c64 72->77 78 20d2c73-20d2c76 72->78 75 20d2c18 73->75 76 20d2c16-20d2c17 73->76 79 20d2c1a-20d2c2b 75->79 80 20d2bb7 75->80 76->75 77->72 78->69 83 20d2c78-20d2c7a 78->83 86 20d2c7c-20d2c84 79->86 87 20d2c2d-20d2c59 79->87 81 20d2bb9-20d2bd1 80->81 82 20d2bf3-20d2bf7 80->82 83->86 87->77
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1331946251.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_20d0000_rNuevaorden_pdf.jbxd
                                Similarity
                                • API ID:
                                • String ID: D$P$\Microsoft.NET\Framework\$e$egas$m.ex$:5l
                                • API String ID: 0-870784547
                                • Opcode ID: a5ab6bf26550a7479030c5998fa4104f56a063e691e157acfb111672f830f752
                                • Instruction ID: 4a9d61d38abfc5c6973fdeb61bb928f7c1e4cd1ba500377bcc39067d3eff0ae9
                                • Opcode Fuzzy Hash: a5ab6bf26550a7479030c5998fa4104f56a063e691e157acfb111672f830f752
                                • Instruction Fuzzy Hash: 4902CDB6D0235AAFDF12DFA4CC81AEDBBB9EF04304F1840AAE514A7202D7309955EF51

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 91 20d2cdf-20d2d25 call 20d31ad call 20d32b0 96 20d2d2b-20d2d41 call 20d32b0 91->96 97 20d31a4-20d31aa 91->97 96->97 100 20d2d47-20d2e34 call 20d3201 * 12 96->100 100->97 125 20d2e3a-20d2e3d 100->125 125->97 126 20d2e43-20d2e46 125->126 126->97 127 20d2e4c-20d2e4f 126->127 127->97 128 20d2e55-20d2e58 127->128 128->97 129 20d2e5e-20d2e61 128->129 129->97 130 20d2e67-20d2e6a 129->130 130->97 131 20d2e70-20d2e73 130->131 131->97 132 20d2e79-20d2e7c 131->132 132->97 133 20d2e82-20d2e85 132->133 133->97 134 20d2e8b-20d2e8d 133->134 134->97 135 20d2e93-20d2ea1 134->135 136 20d2ea6-20d2ed7 NtCreateSection 135->136 137 20d2ea3 135->137 136->97 138 20d2edd-20d2eff NtMapViewOfSection 136->138 137->136 138->97 139 20d2f05-20d2f3b call 20d3291 138->139 142 20d2f3d-20d2f43 139->142 143 20d2f73-20d2f9d call 20d32ee call 20d3291 139->143 144 20d2f48-20d2f4c 142->144 154 20d3068-20d3074 GetPEB 143->154 155 20d2fa3-20d301a 143->155 147 20d2f4e-20d2f61 call 20d3291 144->147 148 20d2f64-20d2f71 144->148 147->148 148->143 151 20d2f45 148->151 151->144 156 20d3077-20d307e 154->156 159 20d301c-20d302c 155->159 158 20d308b-20d30a8 CreateProcessW 156->158 158->97 160 20d30ae-20d30c9 NtGetContextThread 158->160 159->159 161 20d302e-20d3031 159->161 162 20d30cf-20d30ef NtReadVirtualMemory 160->162 163 20d3190-20d3193 160->163 164 20d303f-20d3043 161->164 162->163 165 20d30f5-20d3119 NtWriteVirtualMemory 162->165 166 20d319c-20d319f 163->166 167 20d3195-20d3196 163->167 168 20d3045 164->168 169 20d3033-20d303e 164->169 165->163 170 20d311b-20d314d NtUnmapViewOfSection NtMapViewOfSection 165->170 166->158 167->166 171 20d3052-20d3057 168->171 169->164 172 20d318d 170->172 173 20d314f-20d317e NtSetContextThread 170->173 174 20d3059-20d3066 171->174 175 20d3047-20d3051 171->175 172->163 173->172 176 20d3180-20d318b NtResumeThread 173->176 174->156 175->171 176->97 176->172
                                APIs
                                • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 020D2ECB
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 020D2EF8
                                • CreateProcessW.KERNELBASE(?,?,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 020D30A3
                                • NtGetContextThread.NTDLL(?,?), ref: 020D30C2
                                • NtReadVirtualMemory.NTDLL(?,?,?,000001D8,?), ref: 020D30E8
                                • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,?), ref: 020D3112
                                • NtUnmapViewOfSection.NTDLL(?,?), ref: 020D312D
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 020D3146
                                • NtSetContextThread.NTDLL(?,00010003), ref: 020D3177
                                • NtResumeThread.NTDLL(?,00000000), ref: 020D3184
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1331946251.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_20d0000_rNuevaorden_pdf.jbxd
                                Similarity
                                • API ID: Section$ThreadView$ContextCreateMemoryVirtual$ProcessReadResumeUnmapWrite
                                • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                • API String ID: 1951729442-1087957892
                                • Opcode ID: bdfd8c2c08da80d8aef1ac999a3557cfaab083761e6134d184dbc6d082490619
                                • Instruction ID: 8c12874ab9b28be47f8e9ec1d0aeceb0722d5bf7e028eed704562d8f8bd2d00c
                                • Opcode Fuzzy Hash: bdfd8c2c08da80d8aef1ac999a3557cfaab083761e6134d184dbc6d082490619
                                • Instruction Fuzzy Hash: 82E103B6D0235AAFDF11DFA4CC81AEEBBB9EF08304F1444AAE514A7201D730AA45DF55

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 177 20d2cda-20d2d25 call 20d31ad call 20d32b0 183 20d2d2b-20d2d41 call 20d32b0 177->183 184 20d31a4-20d31aa 177->184 183->184 187 20d2d47-20d2e34 call 20d3201 * 12 183->187 187->184 212 20d2e3a-20d2e3d 187->212 212->184 213 20d2e43-20d2e46 212->213 213->184 214 20d2e4c-20d2e4f 213->214 214->184 215 20d2e55-20d2e58 214->215 215->184 216 20d2e5e-20d2e61 215->216 216->184 217 20d2e67-20d2e6a 216->217 217->184 218 20d2e70-20d2e73 217->218 218->184 219 20d2e79-20d2e7c 218->219 219->184 220 20d2e82-20d2e85 219->220 220->184 221 20d2e8b-20d2e8d 220->221 221->184 222 20d2e93-20d2ea1 221->222 223 20d2ea6-20d2ed7 NtCreateSection 222->223 224 20d2ea3 222->224 223->184 225 20d2edd-20d2eff NtMapViewOfSection 223->225 224->223 225->184 226 20d2f05-20d2f3b call 20d3291 225->226 229 20d2f3d-20d2f43 226->229 230 20d2f73-20d2f9d call 20d32ee call 20d3291 226->230 231 20d2f48-20d2f4c 229->231 241 20d3068-20d3074 GetPEB 230->241 242 20d2fa3-20d301a 230->242 234 20d2f4e-20d2f61 call 20d3291 231->234 235 20d2f64-20d2f71 231->235 234->235 235->230 238 20d2f45 235->238 238->231 243 20d3077-20d307e 241->243 246 20d301c-20d302c 242->246 245 20d308b-20d30a8 CreateProcessW 243->245 245->184 247 20d30ae-20d30c9 NtGetContextThread 245->247 246->246 248 20d302e-20d3031 246->248 249 20d30cf-20d30ef NtReadVirtualMemory 247->249 250 20d3190-20d3193 247->250 251 20d303f-20d3043 248->251 249->250 252 20d30f5-20d3119 NtWriteVirtualMemory 249->252 253 20d319c-20d319f 250->253 254 20d3195-20d3196 250->254 255 20d3045 251->255 256 20d3033-20d303e 251->256 252->250 257 20d311b-20d314d NtUnmapViewOfSection NtMapViewOfSection 252->257 253->245 254->253 258 20d3052-20d3057 255->258 256->251 259 20d318d 257->259 260 20d314f-20d317e NtSetContextThread 257->260 261 20d3059-20d3066 258->261 262 20d3047-20d3051 258->262 259->250 260->259 263 20d3180-20d318b NtResumeThread 260->263 261->243 262->258 263->184 263->259
                                APIs
                                • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 020D2ECB
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 020D2EF8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1331946251.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_20d0000_rNuevaorden_pdf.jbxd
                                Similarity
                                • API ID: Section$CreateView
                                • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                • API String ID: 1585966358-1087957892
                                • Opcode ID: cfb7f0904d5fdd6bf2801a2d1db18ae17906b1726f4676b0447f4946eb2ede80
                                • Instruction ID: 74a3fb50fdca538883756ea57bc9ddb8dd3fce8b46def6343f5185cc4cb1139d
                                • Opcode Fuzzy Hash: cfb7f0904d5fdd6bf2801a2d1db18ae17906b1726f4676b0447f4946eb2ede80
                                • Instruction Fuzzy Hash: F6D104B6D0235AAFDF11DFE4CC85AEDBBB9AF08304F1440AAE524A7201D730AA45DF55

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 264 260354fb-2603557a call 260357ee call 26035ab1 call 26035810 call 26035a52 call 26035810 call 26035a52 call 26035810 call 26035a52 281 2603559f-260355c3 NtProtectVirtualMemory 264->281 282 2603557c-26035598 NtAllocateVirtualMemory 264->282 284 260355c5 281->284 285 260355ca-260355cf 281->285 282->281 283 2603559a 282->283 286 260356c2-260356c7 283->286 284->286 287 260355d2-260355d5 285->287 288 26035663-260356bc NtProtectVirtualMemory 287->288 289 260355db-260355f4 call 260340f6 287->289 288->286 292 260355f6-260355f9 289->292 293 260355fb-26035606 289->293 292->293 294 26035608-2603560b 292->294 295 2603565e 293->295 296 26035623-26035626 294->296 297 2603560d-26035621 294->297 295->287 298 26035644-26035647 296->298 299 26035628-2603562b 296->299 297->295 298->295 301 26035649-2603564c 298->301 299->298 300 2603562d-26035642 299->300 300->295 301->295 302 2603564e-26035651 301->302 302->295 303 26035653-2603565b 302->303 303->295
                                APIs
                                • NtAllocateVirtualMemory.NTDLL(000000FF,00000100,00000000,00000100,00003000,00000040,?,NtQueryInformationProcess,2603425F,?,NtQueryInformationProcess,26034279,?,NtQueryInformationProcess,26034248,NtQueryInformationProcess), ref: 26035592
                                • NtProtectVirtualMemory.NTDLL(000000FF,?,00000005,00000040,00000000,?,NtQueryInformationProcess,2603425F,?,NtQueryInformationProcess,26034279,?,NtQueryInformationProcess,26034248,NtQueryInformationProcess,260342EA), ref: 260355BD
                                • NtProtectVirtualMemory.NTDLL(000000FF,?,00000005,00000000,00000000,?,NtQueryInformationProcess,2603425F,?,NtQueryInformationProcess,26034279,?,NtQueryInformationProcess,26034248,NtQueryInformationProcess,260342EA), ref: 260356B9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1332461446.0000000025E56000.00000020.00000001.01000000.00000003.sdmp, Offset: 25E40000, based on PE: true
                                • Associated: 00000000.00000002.1332353553.0000000025E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332394258.0000000025E41000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332431486.0000000025E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332461446.0000000025E4F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332810858.0000000026066000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.0000000026067000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.000000002606B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332915075.000000002606C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25e40000_rNuevaorden_pdf.jbxd
                                Yara matches
                                Similarity
                                • API ID: MemoryVirtual$Protect$Allocate
                                • String ID: NtQueryInformationProcess
                                • API String ID: 955180148-2781105232
                                • Opcode ID: e29e07d13ed49beb9fc8bf793599a9c8a34ec11761ef9bd0636c5ce333de281b
                                • Instruction ID: f4f85828376075ea39488df7df3e35cec4baf85064ef787c7a2b7466b69f47b6
                                • Opcode Fuzzy Hash: e29e07d13ed49beb9fc8bf793599a9c8a34ec11761ef9bd0636c5ce333de281b
                                • Instruction Fuzzy Hash: 5B51C27180420AEFEB01CFA4CC80ADEBFB6EB95712F404755F111A71A1D775A650ABB1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 304 260653a0-260653fd call 25e4e144 NtSetInformationProcess
                                APIs
                                • NtSetInformationProcess.NTDLL(000000FF,00000022,?,00000004), ref: 260653E6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1332461446.0000000025E56000.00000020.00000001.01000000.00000003.sdmp, Offset: 25E40000, based on PE: true
                                • Associated: 00000000.00000002.1332353553.0000000025E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332394258.0000000025E41000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332431486.0000000025E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332461446.0000000025E4F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332810858.0000000026066000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.0000000026067000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.000000002606B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332915075.000000002606C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25e40000_rNuevaorden_pdf.jbxd
                                Yara matches
                                Similarity
                                • API ID: InformationProcess
                                • String ID: 0
                                • API String ID: 1801817001-4108050209
                                • Opcode ID: 7c295924cde36f5c4c15b6beced2371ec29f75a5edf99083c36fa592cc24ae90
                                • Instruction ID: c3e8ed72ecc3a2b7e6757148f14d0ff3a2cd7a40886c6a5fdec68170f8387c69
                                • Opcode Fuzzy Hash: 7c295924cde36f5c4c15b6beced2371ec29f75a5edf99083c36fa592cc24ae90
                                • Instruction Fuzzy Hash: 04E0EDB1840358BBDB11EFD9CE49F9EBEBCEB18B15F500255F60176680D3786A049AA2

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 2605ed00-2605f089 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 GetModuleHandleW __vbaFreeStrList call 26062bd0 __vbaStrMove __vbaStrToAnsi GetProcAddress __vbaFreeStrList __vbaStrCat __vbaStrMove __vbaStrCat call 26062bd0 __vbaStrMove #644 GetModuleHandleW __vbaFreeStrList __vbaFreeVar __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrToAnsi GetProcAddress __vbaFreeStrList __vbaRedim __vbaNew __vbaObjSet __vbaCastObj __vbaObjSet __vbaObjSetAddref __vbaFreeObjList __vbaObjSetAddref #644 __vbaFreeObj #644 call 26035bae call 26035bbd 9 2605f08f-2605f092 0->9 10 2605f0f5-2605f279 __vbaObjSetAddref #644 __vbaFreeObj #644 call 26035bcb __vbaAryLock #644 __vbaAryUnlock #644 call 26035bae __vbaRedim #644 call 26035bae #644 call 26035bae __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 9->10 11 2605f094-2605f0f3 __vbaAryLock #644 __vbaAryUnlock call 26035bae 9->11 22 2605f292-2605f2d5 __vbaAryUnlock __vbaFreeStr #644 call 26035bae call 26035bbd 10->22 23 2605f27b-2605f28c __vbaHresultCheckObj 10->23 11->9 28 2605f2db-2605f2dd 22->28 23->22 29 2605f336-2605f43d #644 call 26035bae #644 call 26035bae #644 call 26035bae #644 call 26035bae #644 call 26035bae VirtualProtect 28->29 30 2605f2df-2605f334 __vbaAryLock #644 __vbaAryUnlock call 26035bae 28->30 43 2605f456-2605f468 call 26035bbd 29->43 44 2605f43f-2605f450 __vbaHresultCheckObj 29->44 30->28 47 2605f46e-2605f470 43->47 44->43 48 2605f4c3-2605f59b #644 call 26035bae #644 call 26035bae #644 call 26035bae call 2605f7c0 __vbaFreeVar __vbaAryDestruct 47->48 49 2605f472-2605f4c1 __vbaAryLock #644 __vbaAryUnlock call 26035bae 47->49 49->47
                                APIs
                                • __vbaStrCat.MSVBVM60(25E4D9F8,25E4D9F0,?,6D6C60EF), ref: 2605ED8F
                                • __vbaStrMove.MSVBVM60(?,6D6C60EF), ref: 2605ED9C
                                • __vbaStrCat.MSVBVM60(bvm,00000000,?,6D6C60EF), ref: 2605EDA4
                                • __vbaStrMove.MSVBVM60(?,6D6C60EF), ref: 2605EDAB
                                • __vbaStrCat.MSVBVM60(25E4DA10,00000000,?,6D6C60EF), ref: 2605EDB3
                                • __vbaStrMove.MSVBVM60(?,6D6C60EF), ref: 2605EDBA
                                • #644.MSVBVM60(00000000,?,6D6C60EF), ref: 2605EDBD
                                • GetModuleHandleW.KERNEL32(00000000,?,6D6C60EF), ref: 2605EDC4
                                • __vbaFreeStrList.MSVBVM60(00000003,?,?,?,?,6D6C60EF), ref: 2605EDDD
                                  • Part of subcall function 26062BD0: __vbaVarDup.MSVBVM60(6D5DD8B1,6D5CA323), ref: 26062C13
                                  • Part of subcall function 26062BD0: #653.MSVBVM60(?,?), ref: 26062C21
                                  • Part of subcall function 26062BD0: __vbaI4Var.MSVBVM60(?), ref: 26062C2B
                                  • Part of subcall function 26062BD0: __vbaFreeVar.MSVBVM60 ref: 26062C44
                                  • Part of subcall function 26062BD0: #632.MSVBVM60(?,?,?,?), ref: 26062C80
                                  • Part of subcall function 26062BD0: __vbaVarCat.MSVBVM60(?,?,00000008), ref: 26062C92
                                  • Part of subcall function 26062BD0: __vbaStrVarMove.MSVBVM60(00000000), ref: 26062C99
                                  • Part of subcall function 26062BD0: __vbaStrMove.MSVBVM60 ref: 26062CA4
                                  • Part of subcall function 26062BD0: __vbaFreeVarList.MSVBVM60(00000003,00000002,?,?), ref: 26062CB4
                                  • Part of subcall function 26062BD0: __vbaFreeVar.MSVBVM60(26062CF9), ref: 26062CF2
                                • __vbaStrMove.MSVBVM60(?,6D6C60EF), ref: 2605EE0A
                                • __vbaStrToAnsi.MSVBVM60(?,00000000,?,6D6C60EF), ref: 2605EE11
                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 2605EE1F
                                • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,6D6C60EF), ref: 2605EE34
                                • __vbaStrCat.MSVBVM60(25E4DA6C,25E4DA60), ref: 2605EE47
                                • __vbaStrMove.MSVBVM60 ref: 2605EE4E
                                • __vbaStrCat.MSVBVM60(25E4DA80,00000000), ref: 2605EE56
                                • __vbaStrMove.MSVBVM60 ref: 2605EE83
                                • #644.MSVBVM60(00000000), ref: 2605EE86
                                • GetModuleHandleW.KERNEL32(00000000), ref: 2605EE8D
                                • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 2605EEA2
                                • __vbaFreeVar.MSVBVM60 ref: 2605EEAE
                                • __vbaStrCat.MSVBVM60(25E4D8CC,25E4DA98), ref: 2605EEBE
                                • __vbaStrMove.MSVBVM60 ref: 2605EEC5
                                • __vbaStrCat.MSVBVM60(25E4D8D4,00000000), ref: 2605EECD
                                • __vbaStrMove.MSVBVM60 ref: 2605EED4
                                • __vbaStrCat.MSVBVM60(25E4DAA0,00000000), ref: 2605EEDC
                                • __vbaStrMove.MSVBVM60 ref: 2605EEE3
                                • __vbaStrCat.MSVBVM60(25E4DAA8,00000000), ref: 2605EEEB
                                • __vbaStrMove.MSVBVM60 ref: 2605EEF2
                                • __vbaStrCat.MSVBVM60(25E4DAB0,00000000), ref: 2605EEFA
                                • __vbaStrMove.MSVBVM60 ref: 2605EF01
                                • __vbaStrCat.MSVBVM60(25E4DAB8,00000000), ref: 2605EF09
                                • __vbaStrMove.MSVBVM60 ref: 2605EF10
                                • __vbaStrCat.MSVBVM60(25E4DAC0,00000000), ref: 2605EF18
                                • __vbaStrMove.MSVBVM60 ref: 2605EF1F
                                • __vbaStrCat.MSVBVM60(25E4D8D4,00000000), ref: 2605EF27
                                • __vbaStrMove.MSVBVM60 ref: 2605EF2E
                                • __vbaStrCat.MSVBVM60(25E4DAC8,00000000), ref: 2605EF36
                                • __vbaStrMove.MSVBVM60 ref: 2605EF3D
                                • __vbaStrCat.MSVBVM60(25E4DAA0,00000000), ref: 2605EF45
                                • __vbaStrMove.MSVBVM60 ref: 2605EF4C
                                • __vbaStrCat.MSVBVM60(25E4DAD0,00000000), ref: 2605EF54
                                • __vbaStrMove.MSVBVM60 ref: 2605EF5B
                                • __vbaStrCat.MSVBVM60(25E4DAD8,00000000), ref: 2605EF63
                                • __vbaStrMove.MSVBVM60 ref: 2605EF6A
                                • __vbaStrCat.MSVBVM60(25E4DAA0,00000000), ref: 2605EF72
                                • __vbaStrMove.MSVBVM60 ref: 2605EF79
                                • __vbaStrToAnsi.MSVBVM60(?,00000000), ref: 2605EF80
                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 2605EF8E
                                • __vbaFreeStrList.MSVBVM60(0000000E,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 2605EFD3
                                • __vbaRedim.MSVBVM60(00000080,00000004,?,00000003,00000001,0000000F,00000000), ref: 2605EFEB
                                • __vbaNew.MSVBVM60(25E4DAFC,25E4DB0C), ref: 2605EFFE
                                • __vbaObjSet.MSVBVM60(?,00000000), ref: 2605F009
                                • __vbaCastObj.MSVBVM60(00000000), ref: 2605F010
                                • __vbaObjSet.MSVBVM60(?,00000000), ref: 2605F01B
                                • __vbaObjSetAddref.MSVBVM60(260672D0,00000000), ref: 2605F029
                                • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 2605F039
                                • __vbaObjSetAddref.MSVBVM60(?), ref: 2605F04F
                                • #644.MSVBVM60(00000000), ref: 2605F056
                                • __vbaFreeObj.MSVBVM60 ref: 2605F062
                                • #644.MSVBVM60(?), ref: 2605F06C
                                • __vbaAryLock.MSVBVM60(?,?,?,?,00000000), ref: 2605F09C
                                • #644.MSVBVM60(?), ref: 2605F0B4
                                • __vbaAryUnlock.MSVBVM60(?), ref: 2605F0C4
                                • __vbaObjSetAddref.MSVBVM60(?,?,?,?,00000000), ref: 2605F101
                                • #644.MSVBVM60(00000000,?,?,?,00000000), ref: 2605F108
                                • __vbaFreeObj.MSVBVM60(?,?,?,00000000), ref: 2605F114
                                • #644.MSVBVM60(260672CC,?,?,?,00000000), ref: 2605F123
                                • __vbaAryLock.MSVBVM60(?,?,00000000,?,00000004,?,?,?,00000000), ref: 2605F143
                                • #644.MSVBVM60(?,?,?,?,00000000), ref: 2605F158
                                • __vbaAryUnlock.MSVBVM60(?,?,?,?,00000000), ref: 2605F168
                                • #644.MSVBVM60(?,?,?,?,00000000), ref: 2605F181
                                • __vbaRedim.MSVBVM60(00000080,00000004,26067214,00000003,00000001,00000010,00000000,00000000,?,?,?,?,00000000), ref: 2605F1BD
                                • #644.MSVBVM60(?), ref: 2605F1CA
                                • #644.MSVBVM60(?,-0000000C,00000000), ref: 2605F1F0
                                • __vbaAryLock.MSVBVM60(?,00000000,00000000,-0000000C), ref: 2605F21C
                                • __vbaStrCat.MSVBVM60(25E4DB34,25E4DB2C,?,00000040), ref: 2605F252
                                • __vbaStrMove.MSVBVM60 ref: 2605F259
                                • __vbaI4Str.MSVBVM60(00000000), ref: 2605F25C
                                • VirtualProtect.KERNELBASE(?,00000000), ref: 2605F272
                                • __vbaHresultCheckObj.MSVBVM60(00000000,?,25E4DB0C,0000002C,?,00000000), ref: 2605F28C
                                • __vbaAryUnlock.MSVBVM60(?,?,00000000), ref: 2605F296
                                • __vbaFreeStr.MSVBVM60(?,00000000), ref: 2605F29F
                                • #644.MSVBVM60(?,?,00000000), ref: 2605F2AF
                                • __vbaAryLock.MSVBVM60(?,00000000,00000000,00000000,-0000000C,?,00000000), ref: 2605F2EA
                                • #644.MSVBVM60(?,?,00000000), ref: 2605F301
                                • __vbaAryUnlock.MSVBVM60(?,?,00000000), ref: 2605F30D
                                • #644.MSVBVM60(00000040,00000000,00000000,-0000000C,?,00000000), ref: 2605F347
                                • #644.MSVBVM60(0424448B,00000000,?,?,00000000), ref: 2605F36D
                                • #644.MSVBVM60(408B008B,00000000,?,?,00000000), ref: 2605F393
                                • #644.MSVBVM60(20C4832C,00000000,?,?,00000000), ref: 2605F3B9
                                • #644.MSVBVM60(E02474FF,00000000,?,?,00000000), ref: 2605F3DF
                                • VirtualProtect.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000008,00000040,?,00000000,?,?,00000000), ref: 2605F436
                                • __vbaHresultCheckObj.MSVBVM60(00000000,?,25E4DB0C,00000020,?,00000000), ref: 2605F450
                                • __vbaAryLock.MSVBVM60(?,00000000,00000000,?,00000000), ref: 2605F47C
                                • #644.MSVBVM60(?,?,00000000), ref: 2605F493
                                • __vbaAryUnlock.MSVBVM60(?,?,00000000), ref: 2605F49F
                                • #644.MSVBVM60(260672CC,00000000,?,00000000), ref: 2605F4CC
                                • #644.MSVBVM60(00000000,00000000,?,?,00000000), ref: 2605F4E5
                                • #644.MSVBVM60(-00000004,00000000,00000000,?,00000000), ref: 2605F4FD
                                • __vbaFreeVar.MSVBVM60(?,-00000004,00000000,?,00000000), ref: 2605F51B
                                • __vbaAryDestruct.MSVBVM60(00000000,?,2605F59C,?,00000000), ref: 2605F595
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1332461446.0000000025E56000.00000020.00000001.01000000.00000003.sdmp, Offset: 25E40000, based on PE: true
                                • Associated: 00000000.00000002.1332353553.0000000025E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332394258.0000000025E41000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332431486.0000000025E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332461446.0000000025E4F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332810858.0000000026066000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.0000000026067000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.000000002606B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332915075.000000002606C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25e40000_rNuevaorden_pdf.jbxd
                                Yara matches
                                Similarity
                                • API ID: __vba$#644Move$Free$List$LockUnlock$Addref$AddressAnsiCheckHandleHresultModuleProcProtectRedimVirtual$#632#653CastDestruct
                                • String ID: @$DqlqlqFquqnqcqtqiqoqnqCqaqlqlq$bvm
                                • API String ID: 3776562771-683613472
                                • Opcode ID: f4e94e31408e10c15b4f84d0f5b4a8f39ead9e07a5642bd8fd9640623f0a42ab
                                • Instruction ID: 22ff0296b6eaa22ac360ed90e4800aa96ad56a384b601d1870f828ba4149536c
                                • Opcode Fuzzy Hash: f4e94e31408e10c15b4f84d0f5b4a8f39ead9e07a5642bd8fd9640623f0a42ab
                                • Instruction Fuzzy Hash: 07422EB1D10209AFDB18DFA4CD88EEEBBBAFF58300F108559E505E7244DA78A945DF60

                                Control-flow Graph

                                APIs
                                • __vbaFreeVar.MSVBVM60(?), ref: 26064E72
                                  • Part of subcall function 2605ED00: __vbaStrCat.MSVBVM60(25E4D9F8,25E4D9F0,?,6D6C60EF), ref: 2605ED8F
                                  • Part of subcall function 2605ED00: __vbaStrMove.MSVBVM60(?,6D6C60EF), ref: 2605ED9C
                                  • Part of subcall function 2605ED00: __vbaStrCat.MSVBVM60(bvm,00000000,?,6D6C60EF), ref: 2605EDA4
                                  • Part of subcall function 2605ED00: __vbaStrMove.MSVBVM60(?,6D6C60EF), ref: 2605EDAB
                                  • Part of subcall function 2605ED00: __vbaStrCat.MSVBVM60(25E4DA10,00000000,?,6D6C60EF), ref: 2605EDB3
                                  • Part of subcall function 2605ED00: __vbaStrMove.MSVBVM60(?,6D6C60EF), ref: 2605EDBA
                                  • Part of subcall function 2605ED00: #644.MSVBVM60(00000000,?,6D6C60EF), ref: 2605EDBD
                                  • Part of subcall function 2605ED00: GetModuleHandleW.KERNEL32(00000000,?,6D6C60EF), ref: 2605EDC4
                                  • Part of subcall function 2605ED00: __vbaFreeStrList.MSVBVM60(00000003,?,?,?,?,6D6C60EF), ref: 2605EDDD
                                  • Part of subcall function 2605ED00: __vbaStrMove.MSVBVM60(?,6D6C60EF), ref: 2605EE0A
                                  • Part of subcall function 2605ED00: __vbaStrToAnsi.MSVBVM60(?,00000000,?,6D6C60EF), ref: 2605EE11
                                  • Part of subcall function 2605ED00: GetProcAddress.KERNEL32(00000000,00000000), ref: 2605EE1F
                                  • Part of subcall function 2605ED00: __vbaFreeStrList.MSVBVM60(00000002,?,?,?,6D6C60EF), ref: 2605EE34
                                  • Part of subcall function 260653A0: NtSetInformationProcess.NTDLL(000000FF,00000022,?,00000004), ref: 260653E6
                                • __vbaFreeVar.MSVBVM60(00000000), ref: 26064E85
                                Memory Dump Source
                                • Source File: 00000000.00000002.1332394258.0000000025E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 25E40000, based on PE: true
                                • Associated: 00000000.00000002.1332353553.0000000025E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332431486.0000000025E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332461446.0000000025E4F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332461446.0000000025E56000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332810858.0000000026066000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.0000000026067000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.000000002606B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332915075.000000002606C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25e40000_rNuevaorden_pdf.jbxd
                                Yara matches
                                Similarity
                                • API ID: __vba$FreeMove$List$#644AddressAnsiHandleInformationModuleProcProcess
                                • String ID:
                                • API String ID: 20434910-0
                                • Opcode ID: 62720a7209574c0bba930a8c7698e7ddeb827410aa05042dead41e22bc12789c
                                • Instruction ID: d744ad0eb47d1bb6aa17bad6b90d49e88c0e098120b2dd9cea3a657d915aa18f
                                • Opcode Fuzzy Hash: 62720a7209574c0bba930a8c7698e7ddeb827410aa05042dead41e22bc12789c
                                • Instruction Fuzzy Hash: 7FF030B1810228AACB15EF95CD94BDEBF7CBF14600F804529F40173144E7386504DAF2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1332461446.0000000025E56000.00000020.00000001.01000000.00000003.sdmp, Offset: 25E40000, based on PE: true
                                • Associated: 00000000.00000002.1332353553.0000000025E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332394258.0000000025E41000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332431486.0000000025E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332461446.0000000025E4F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332810858.0000000026066000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.0000000026067000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.000000002606B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332915075.000000002606C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25e40000_rNuevaorden_pdf.jbxd
                                Yara matches
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ef41f23567e4e7422021a95af9bb6b13c8200b2295415d293bf1cf4d9d63b1a6
                                • Instruction ID: f0ee48950bb61063b276a0e1bd968c050c0a42066f3c001c3b007048a31fea66
                                • Opcode Fuzzy Hash: ef41f23567e4e7422021a95af9bb6b13c8200b2295415d293bf1cf4d9d63b1a6
                                • Instruction Fuzzy Hash: FD01A931A545068BD7529F04C4D0D9EBBE7FB70752B850073F5048BA35E26595E0F7A1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1331946251.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_20d0000_rNuevaorden_pdf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0b399b04e11d1ff954b26d47aa0a54e719ae22316263aa56bc50ae1b8ddb9bc6
                                • Instruction ID: 133f1f225038d9c778c657976eb6ec0269f69f11ed75dc2454a4dfeba846131f
                                • Opcode Fuzzy Hash: 0b399b04e11d1ff954b26d47aa0a54e719ae22316263aa56bc50ae1b8ddb9bc6
                                • Instruction Fuzzy Hash: 60F03933A167549BC661DB99D480B7AB3E9EB80A7072548A6E449A7A00D330FC40DF95
                                Memory Dump Source
                                • Source File: 00000000.00000002.1331946251.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_20d0000_rNuevaorden_pdf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: eb4a5ace1977a0deb1490e67cd7a3be34ec88689824f7f2dee9c6eb0fad554da
                                • Instruction ID: d06c382b9760a7b92fcb2d43b1b8d4331e2c019d7fa1f3315bf30b73f1b69da8
                                • Opcode Fuzzy Hash: eb4a5ace1977a0deb1490e67cd7a3be34ec88689824f7f2dee9c6eb0fad554da
                                • Instruction Fuzzy Hash: 0EB00231255540DFC299CB06D154A6473B8F711641F4515E0E0454F961CB25A940DA05
                                Memory Dump Source
                                • Source File: 00000000.00000002.1331946251.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_20d0000_rNuevaorden_pdf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 57926a28c9dec8f72c059f7a1c85c621d4514a41e2f67cef7632fc3e58e89236
                                • Instruction ID: ad5df9df37d3adcab6b825ab64f3e16eebfa9b836013e718d34a0feeeb872266
                                • Opcode Fuzzy Hash: 57926a28c9dec8f72c059f7a1c85c621d4514a41e2f67cef7632fc3e58e89236
                                • Instruction Fuzzy Hash: 68B00135266A84CFC296CB0AC194F5073B8FB05B41F4614F0E4068BE62C338A900CA01
                                Memory Dump Source
                                • Source File: 00000000.00000002.1331946251.00000000020D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 020D0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_20d0000_rNuevaorden_pdf.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c66d579662c1b05e6188227b1babfe3779871d50f433a516804cf929716cd0cf
                                • Instruction ID: f137c364cb3bae823ea3efedd3c6236d0f1cc7882400a73c312dd9e70c7f0342
                                • Opcode Fuzzy Hash: c66d579662c1b05e6188227b1babfe3779871d50f433a516804cf929716cd0cf
                                • Instruction Fuzzy Hash: 4AB00135266A80CFC296CB0AC294F5073B8FB09A41F4A14F0E4058BE62C339AA00CA01

                                Control-flow Graph

                                APIs
                                • __vbaStrCat.MSVBVM60(@o@s@o@f,M@i@c@r), ref: 2606331D
                                • __vbaStrMove.MSVBVM60 ref: 2606332A
                                • __vbaStrCat.MSVBVM60(@t@ @E@n@h@a@n,00000000), ref: 26063332
                                • __vbaStrMove.MSVBVM60 ref: 26063339
                                • __vbaStrCat.MSVBVM60(@c@e@d@ @R@S@,00000000), ref: 26063341
                                • __vbaStrMove.MSVBVM60 ref: 26063348
                                • __vbaStrCat.MSVBVM60(A@ @a@n,00000000), ref: 26063350
                                • __vbaStrMove.MSVBVM60 ref: 26063357
                                • __vbaStrCat.MSVBVM60(@d@ @A@E@S@ ,00000000), ref: 2606335F
                                • __vbaStrMove.MSVBVM60 ref: 26063366
                                • __vbaStrCat.MSVBVM60(@C@r@y@,00000000), ref: 2606336E
                                • __vbaStrMove.MSVBVM60 ref: 26063375
                                • __vbaStrCat.MSVBVM60(p@t@o@g@r@a@,00000000), ref: 2606337D
                                • __vbaStrMove.MSVBVM60 ref: 26063384
                                • __vbaStrCat.MSVBVM60(p@h@i@c@ @P@r,00000000), ref: 2606338C
                                • __vbaStrMove.MSVBVM60 ref: 26063393
                                • __vbaStrCat.MSVBVM60(@o@v@i@d,00000000), ref: 2606339B
                                • __vbaStrMove.MSVBVM60 ref: 260633A2
                                • __vbaStrCat.MSVBVM60(@e@r@,00000000), ref: 260633AA
                                  • Part of subcall function 26062BD0: __vbaVarDup.MSVBVM60(6D5DD8B1,6D5CA323), ref: 26062C13
                                  • Part of subcall function 26062BD0: #653.MSVBVM60(?,?), ref: 26062C21
                                  • Part of subcall function 26062BD0: __vbaI4Var.MSVBVM60(?), ref: 26062C2B
                                  • Part of subcall function 26062BD0: __vbaFreeVar.MSVBVM60 ref: 26062C44
                                  • Part of subcall function 26062BD0: #632.MSVBVM60(?,?,?,?), ref: 26062C80
                                  • Part of subcall function 26062BD0: __vbaVarCat.MSVBVM60(?,?,00000008), ref: 26062C92
                                  • Part of subcall function 26062BD0: __vbaStrVarMove.MSVBVM60(00000000), ref: 26062C99
                                  • Part of subcall function 26062BD0: __vbaStrMove.MSVBVM60 ref: 26062CA4
                                  • Part of subcall function 26062BD0: __vbaFreeVarList.MSVBVM60(00000003,00000002,?,?), ref: 26062CB4
                                  • Part of subcall function 26062BD0: __vbaFreeVar.MSVBVM60(26062CF9), ref: 26062CF2
                                • __vbaStrMove.MSVBVM60 ref: 260633D7
                                • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,?,?,?,?,?,?), ref: 260633FF
                                • __vbaFreeVar.MSVBVM60 ref: 2606340B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1332394258.0000000025E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 25E40000, based on PE: true
                                • Associated: 00000000.00000002.1332353553.0000000025E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332431486.0000000025E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332461446.0000000025E4F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332461446.0000000025E56000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332810858.0000000026066000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.0000000026067000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.000000002606B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332915075.000000002606C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25e40000_rNuevaorden_pdf.jbxd
                                Yara matches
                                Similarity
                                • API ID: __vba$Move$Free$List$#632#653
                                • String ID: @C@r@y@$@c@e@d@ @R@S@$@d@ @A@E@S@ $@e@r@$@o@s@o@f$@o@v@i@d$@t@ @E@n@h@a@n$A@ @a@n$M@i@c@r$p@h@i@c@ @P@r$p@t@o@g@r@a@
                                • API String ID: 193477259-3817434718
                                • Opcode ID: 4c4669226fb14a660fbbdbc54b85efeec6d16304f8282939f0a68e679b7db042
                                • Instruction ID: 52f795d2c0fad7076cc1ca8ef28c380638f786d76d913db24c62ce1d06057537
                                • Opcode Fuzzy Hash: 4c4669226fb14a660fbbdbc54b85efeec6d16304f8282939f0a68e679b7db042
                                • Instruction Fuzzy Hash: 59514E71D14258AFCB05EFA9DD848EFBFB9FF59200B14815BF402A3245DA706945CFA2

                                Control-flow Graph

                                APIs
                                • __vbaStrCat.MSVBVM60(25E4E798,25E4E960), ref: 260634FD
                                • __vbaStrMove.MSVBVM60 ref: 2606350A
                                • __vbaStrCat.MSVBVM60(25E4E608,00000000), ref: 26063512
                                • __vbaStrMove.MSVBVM60 ref: 26063519
                                • __vbaStrCat.MSVBVM60(25E4E528,00000000), ref: 26063521
                                • __vbaStrMove.MSVBVM60 ref: 26063528
                                • __vbaStrCat.MSVBVM60(25E4E708,00000000), ref: 26063530
                                • __vbaStrMove.MSVBVM60 ref: 26063537
                                • __vbaStrCat.MSVBVM60(25E4EB0C,00000000), ref: 2606353F
                                • __vbaStrMove.MSVBVM60 ref: 26063546
                                • __vbaStrCat.MSVBVM60(25E4EB38,00000000), ref: 2606354E
                                • __vbaStrMove.MSVBVM60 ref: 26063555
                                • __vbaStrCat.MSVBVM60(25E4EB54,00000000), ref: 2606355D
                                • __vbaStrMove.MSVBVM60 ref: 26063564
                                • __vbaStrCat.MSVBVM60(25E4EB80,00000000), ref: 2606356C
                                • __vbaStrMove.MSVBVM60 ref: 26063573
                                • __vbaStrCat.MSVBVM60(25E4EBA4,00000000), ref: 2606357B
                                • __vbaStrMove.MSVBVM60 ref: 26063582
                                • __vbaStrCat.MSVBVM60(25E4EBBC,00000000), ref: 2606358A
                                  • Part of subcall function 26062BD0: __vbaVarDup.MSVBVM60(6D5DD8B1,6D5CA323), ref: 26062C13
                                  • Part of subcall function 26062BD0: #653.MSVBVM60(?,?), ref: 26062C21
                                  • Part of subcall function 26062BD0: __vbaI4Var.MSVBVM60(?), ref: 26062C2B
                                  • Part of subcall function 26062BD0: __vbaFreeVar.MSVBVM60 ref: 26062C44
                                  • Part of subcall function 26062BD0: #632.MSVBVM60(?,?,?,?), ref: 26062C80
                                  • Part of subcall function 26062BD0: __vbaVarCat.MSVBVM60(?,?,00000008), ref: 26062C92
                                  • Part of subcall function 26062BD0: __vbaStrVarMove.MSVBVM60(00000000), ref: 26062C99
                                  • Part of subcall function 26062BD0: __vbaStrMove.MSVBVM60 ref: 26062CA4
                                  • Part of subcall function 26062BD0: __vbaFreeVarList.MSVBVM60(00000003,00000002,?,?), ref: 26062CB4
                                  • Part of subcall function 26062BD0: __vbaFreeVar.MSVBVM60(26062CF9), ref: 26062CF2
                                • __vbaStrMove.MSVBVM60 ref: 260635B7
                                • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,?,?,?,?,?,?), ref: 260635DF
                                • __vbaFreeVar.MSVBVM60 ref: 260635EB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1332394258.0000000025E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 25E40000, based on PE: true
                                • Associated: 00000000.00000002.1332353553.0000000025E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332431486.0000000025E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332461446.0000000025E4F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332461446.0000000025E56000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332810858.0000000026066000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.0000000026067000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.000000002606B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332915075.000000002606C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25e40000_rNuevaorden_pdf.jbxd
                                Yara matches
                                Similarity
                                • API ID: __vba$Move$Free$List$#632#653
                                • String ID:
                                • API String ID: 193477259-0
                                • Opcode ID: 8bfac12dcef2bf08a37a79621ca8bd71a18bdf95edbe5ae3030ed123508e12a2
                                • Instruction ID: 594353cfc8ef22c09c67a568611236ec1759cea0e2c34adc769f27523f7d4b0c
                                • Opcode Fuzzy Hash: 8bfac12dcef2bf08a37a79621ca8bd71a18bdf95edbe5ae3030ed123508e12a2
                                • Instruction Fuzzy Hash: EF41D8B1D10118ABDB15EFA9DD94DEFBFB9EF88600F10811BF512A3244DA746905CFA2

                                Control-flow Graph

                                APIs
                                • __vbaVarDup.MSVBVM60(6D5DD8B1,6D5CA323), ref: 26062C13
                                • #653.MSVBVM60(?,?), ref: 26062C21
                                • __vbaI4Var.MSVBVM60(?), ref: 26062C2B
                                • __vbaFreeVar.MSVBVM60 ref: 26062C44
                                • #632.MSVBVM60(?,?,?,?), ref: 26062C80
                                • __vbaVarCat.MSVBVM60(?,?,00000008), ref: 26062C92
                                • __vbaStrVarMove.MSVBVM60(00000000), ref: 26062C99
                                • __vbaStrMove.MSVBVM60 ref: 26062CA4
                                • __vbaFreeVarList.MSVBVM60(00000003,00000002,?,?), ref: 26062CB4
                                • __vbaFreeVar.MSVBVM60(26062CF9), ref: 26062CF2
                                Memory Dump Source
                                • Source File: 00000000.00000002.1332461446.0000000025E56000.00000020.00000001.01000000.00000003.sdmp, Offset: 25E40000, based on PE: true
                                • Associated: 00000000.00000002.1332353553.0000000025E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332394258.0000000025E41000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332431486.0000000025E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332461446.0000000025E4F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332810858.0000000026066000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.0000000026067000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.000000002606B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332915075.000000002606C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25e40000_rNuevaorden_pdf.jbxd
                                Yara matches
                                Similarity
                                • API ID: __vba$Free$Move$#632#653List
                                • String ID:
                                • API String ID: 1043057846-0
                                • Opcode ID: 95851d63e413799c74686af03bb7d3f9bb30ad4542e4c4736d8f5ba44065f4e6
                                • Instruction ID: 71c10ec567e85e34ed94e2adfb196aee7250ba35f00833d1eec5a7feb9a0c194
                                • Opcode Fuzzy Hash: 95851d63e413799c74686af03bb7d3f9bb30ad4542e4c4736d8f5ba44065f4e6
                                • Instruction Fuzzy Hash: 50312CB1C10209AFDF08DFE5C898AEEBBB9FB58304F108529E526A7241EB745609DF51

                                Control-flow Graph

                                APIs
                                • #644.MSVBVM60(?,2605F5B0,00000001,6D6AEC2C,00000000,?,?,?,?,?,?,Function_00001006), ref: 2605F817
                                • #644.MSVBVM60(00000001,?,?,?,?,?,?,Function_00001006), ref: 2605F822
                                • #644.MSVBVM60(00000000,00000000,00000000,?,?,?,?,?,?,Function_00001006), ref: 2605F834
                                • #644.MSVBVM60(-00000004,00000000,00000000,00000004,?,?,?,?,?,?,Function_00001006), ref: 2605F852
                                Memory Dump Source
                                • Source File: 00000000.00000002.1332461446.0000000025E56000.00000020.00000001.01000000.00000003.sdmp, Offset: 25E40000, based on PE: true
                                • Associated: 00000000.00000002.1332353553.0000000025E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332394258.0000000025E41000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332431486.0000000025E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332461446.0000000025E4F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332810858.0000000026066000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.0000000026067000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332848906.000000002606B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1332915075.000000002606C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_25e40000_rNuevaorden_pdf.jbxd
                                Yara matches
                                Similarity
                                • API ID: #644
                                • String ID:
                                • API String ID: 700137900-0
                                • Opcode ID: de06f6d2129a4f546272765fa76cac28983e0773be64c5eceaaa4a31cd5d397c
                                • Instruction ID: 333727f692dcb66d60c4025d806442ce9195c653145c181d86024a69956958a4
                                • Opcode Fuzzy Hash: de06f6d2129a4f546272765fa76cac28983e0773be64c5eceaaa4a31cd5d397c
                                • Instruction Fuzzy Hash: 891173B0D00204AFD705DFB8CD84EAE7FFEEB59210B10465AF601E7244D678AD009BB5

                                Execution Graph

                                Execution Coverage:9.1%
                                Dynamic/Decrypted Code Coverage:52.5%
                                Signature Coverage:12.5%
                                Total number of Nodes:40
                                Total number of Limit Nodes:5
                                execution_graph 27506 4438e5 27507 4438e8 27506->27507 27510 445948 GetPEB 27507->27510 27509 443dc0 27511 445954 27510->27511 27512 445f47 27513 44641a 27512->27513 27515 44614a 27512->27515 27516 445abf GetPEB 27513->27516 27551 4460f2 27552 446140 27551->27552 27555 445abf GetPEB 27552->27555 27522 6a0aac8 DuplicateHandle 27523 6a0ab5e 27522->27523 27524 44386f 27527 445c2a GetPEB 27524->27527 27528 30e0a45 27529 30e0a52 27528->27529 27531 30e084e 27528->27531 27530 30e091b 27531->27528 27531->27530 27533 30e1340 27531->27533 27534 30e1343 27533->27534 27535 30e12eb 27534->27535 27538 30e6f60 27534->27538 27542 30e6ec0 27534->27542 27535->27531 27539 30e6f65 27538->27539 27540 30e6f7b 27539->27540 27546 30e7138 27539->27546 27540->27534 27543 30e6ee8 27542->27543 27544 30e6f2c 27543->27544 27545 30e7138 CheckRemoteDebuggerPresent 27543->27545 27544->27534 27545->27544 27547 30e70b9 27546->27547 27548 30e713e 27546->27548 27549 30e70da CheckRemoteDebuggerPresent 27547->27549 27550 30e70e8 27547->27550 27548->27540 27549->27550 27550->27540 27556 4458f8 27557 4458fc NtAllocateVirtualMemory 27556->27557 27559 4458de 27557->27559 27558 4459a7 27559->27558 27560 445993 GetPEB 27559->27560 27560->27558

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 526 6a012c0-6a012e1 527 6a012e3-6a012e6 526->527 528 6a01a87-6a01a8a 527->528 529 6a012ec-6a0130b 527->529 530 6a01ab0-6a01ab2 528->530 531 6a01a8c-6a01aab 528->531 538 6a01324-6a0132e 529->538 539 6a0130d-6a01310 529->539 532 6a01ab4 530->532 533 6a01ab9-6a01abc 530->533 531->530 532->533 533->527 536 6a01ac2-6a01acb 533->536 544 6a01334-6a01343 538->544 539->538 541 6a01312-6a01322 539->541 541->544 652 6a01345 call 6a01ae0 544->652 653 6a01345 call 6a01ad9 544->653 545 6a0134a-6a0134f 546 6a01351-6a01357 545->546 547 6a0135c-6a01639 545->547 546->536 568 6a01a79-6a01a86 547->568 569 6a0163f-6a016ee 547->569 578 6a016f0-6a01715 569->578 579 6a01717 569->579 581 6a01720-6a01733 578->581 579->581 583 6a01a60-6a01a6c 581->583 584 6a01739-6a0175b 581->584 583->569 585 6a01a72 583->585 584->583 587 6a01761-6a0176b 584->587 585->568 587->583 588 6a01771-6a0177c 587->588 588->583 589 6a01782-6a01858 588->589 601 6a01866-6a01896 589->601 602 6a0185a-6a0185c 589->602 606 6a018a4-6a018b0 601->606 607 6a01898-6a0189a 601->607 602->601 608 6a01910-6a01914 606->608 609 6a018b2-6a018b6 606->609 607->606 610 6a01a51-6a01a5a 608->610 611 6a0191a-6a01956 608->611 609->608 612 6a018b8-6a018e2 609->612 610->583 610->589 623 6a01964-6a01972 611->623 624 6a01958-6a0195a 611->624 619 6a018f0-6a0190d 612->619 620 6a018e4-6a018e6 612->620 619->608 620->619 626 6a01974-6a0197f 623->626 627 6a01989-6a01994 623->627 624->623 626->627 630 6a01981 626->630 631 6a01996-6a0199c 627->631 632 6a019ac-6a019bd 627->632 630->627 633 6a019a0-6a019a2 631->633 634 6a0199e 631->634 636 6a019d5-6a019e1 632->636 637 6a019bf-6a019c5 632->637 633->632 634->632 641 6a019e3-6a019e9 636->641 642 6a019f9-6a01a4a 636->642 638 6a019c7 637->638 639 6a019c9-6a019cb 637->639 638->636 639->636 643 6a019eb 641->643 644 6a019ed-6a019ef 641->644 642->610 643->642 644->642 652->545 653->545
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.3713803744.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_6a00000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID: $q$$q$$q$$q$$q$$q
                                • API String ID: 0-2069967915
                                • Opcode ID: c2f4ec20251601095a35109a74dc3556271ba68b1483a79b6cb0d613e179d5f1
                                • Instruction ID: e2c9dac7058b927d39b30bc59128393feb3ae3c7495db49b6f36d2afea81a6dc
                                • Opcode Fuzzy Hash: c2f4ec20251601095a35109a74dc3556271ba68b1483a79b6cb0d613e179d5f1
                                • Instruction Fuzzy Hash: 61321F34E107198FDB14EBA5D8906DDF7B2FFC9300F64869AD409AB254EB70AD85CB90
                                Memory Dump Source
                                • Source File: 00000008.00000002.3710745303.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_30e0000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d7d322ab3c0ce19787a0d97795b9f51556eed1f0cb27c443d74fdc67fa7a4e02
                                • Instruction ID: 833adeb6044286566e9a5bc4c4298c7c117204a1daf6fe6c33c999886089ae5b
                                • Opcode Fuzzy Hash: d7d322ab3c0ce19787a0d97795b9f51556eed1f0cb27c443d74fdc67fa7a4e02
                                • Instruction Fuzzy Hash: A3630931D10B198EDB51EF68C8806A9F7B1FF99300F55C79AE4587B121EB70AAC5CB81

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1241 6a03c18-6a03c36 1242 6a03c38-6a03c3b 1241->1242 1243 6a03c3d-6a03c59 1242->1243 1244 6a03c5e-6a03c61 1242->1244 1243->1244 1245 6a03c63-6a03c6d 1244->1245 1246 6a03c6e-6a03c71 1244->1246 1247 6a03c73-6a03c81 1246->1247 1248 6a03c88-6a03c8b 1246->1248 1257 6a03cbe-6a03cd4 1247->1257 1258 6a03c83 1247->1258 1250 6a03cac-6a03cae 1248->1250 1251 6a03c8d-6a03ca7 1248->1251 1252 6a03cb0 1250->1252 1253 6a03cb5-6a03cb8 1250->1253 1251->1250 1252->1253 1253->1242 1253->1257 1261 6a03ef0-6a03efa 1257->1261 1262 6a03cda-6a03ce3 1257->1262 1258->1248 1263 6a03ce9-6a03d06 1262->1263 1264 6a03efb-6a03f37 1262->1264 1273 6a03d0c-6a03d34 1263->1273 1274 6a03edd-6a03eea 1263->1274 1267 6a03f39-6a03f3c 1264->1267 1268 6a03f3e-6a03f5a 1267->1268 1269 6a03f5f-6a03f62 1267->1269 1268->1269 1271 6a04198-6a0419b 1269->1271 1272 6a03f68-6a03f77 1269->1272 1276 6a041a1-6a041ad 1271->1276 1277 6a04246-6a04248 1271->1277 1284 6a03f96-6a03fda 1272->1284 1285 6a03f79-6a03f94 1272->1285 1273->1274 1295 6a03d3a-6a03d43 1273->1295 1274->1261 1274->1262 1286 6a041b8-6a041ba 1276->1286 1279 6a0424a 1277->1279 1280 6a0424f-6a04252 1277->1280 1279->1280 1280->1267 1283 6a04258-6a04261 1280->1283 1299 6a03fe0-6a03ff1 1284->1299 1300 6a0416c-6a04181 1284->1300 1285->1284 1287 6a041d2-6a041d6 1286->1287 1288 6a041bc-6a041c2 1286->1288 1293 6a041e4 1287->1293 1294 6a041d8-6a041e2 1287->1294 1291 6a041c4 1288->1291 1292 6a041c6-6a041c8 1288->1292 1291->1287 1292->1287 1297 6a041e9-6a041eb 1293->1297 1294->1297 1295->1264 1298 6a03d49-6a03d65 1295->1298 1302 6a041fc-6a04235 1297->1302 1303 6a041ed-6a041f0 1297->1303 1307 6a03ecb-6a03ed7 1298->1307 1308 6a03d6b-6a03d95 call 6a00f68 1298->1308 1309 6a04157-6a04166 1299->1309 1310 6a03ff7-6a04014 1299->1310 1311 6a04182 1300->1311 1302->1272 1325 6a0423b-6a04245 1302->1325 1303->1283 1307->1274 1307->1295 1326 6a03ec1-6a03ec6 1308->1326 1327 6a03d9b-6a03dc3 1308->1327 1309->1299 1309->1300 1310->1309 1321 6a0401a-6a04111 1310->1321 1311->1311 1373 6a04113-6a0411d 1321->1373 1374 6a0411f 1321->1374 1326->1307 1327->1326 1333 6a03dc9-6a03df7 1327->1333 1333->1326 1338 6a03dfd-6a03e06 1333->1338 1338->1326 1340 6a03e0c-6a03e3e 1338->1340 1347 6a03e40-6a03e44 1340->1347 1348 6a03e49-6a03e65 1340->1348 1347->1326 1350 6a03e46 1347->1350 1348->1307 1351 6a03e67-6a03ebf 1348->1351 1350->1348 1351->1307 1375 6a04124-6a04126 1373->1375 1374->1375 1375->1309 1376 6a04128-6a0412d 1375->1376 1377 6a0413b 1376->1377 1378 6a0412f-6a04139 1376->1378 1379 6a04140-6a04142 1377->1379 1378->1379 1379->1309 1380 6a04144-6a04150 1379->1380 1380->1309
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.3713803744.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_6a00000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID: $q$$q
                                • API String ID: 0-3126353813
                                • Opcode ID: b0c1a249c1dd6362218b59a4716e05b41de7b0c971f050b0bb83f5ea942d0df5
                                • Instruction ID: 5dae2d3552302cf05bf930a43552c30d4d2ff526817e9cb2c67c10d7362e911d
                                • Opcode Fuzzy Hash: b0c1a249c1dd6362218b59a4716e05b41de7b0c971f050b0bb83f5ea942d0df5
                                • Instruction Fuzzy Hash: 4B02AD34B102058FEB54EB69E8947AEBBF2FF88310F148569D5159B385DB34EC86CB90
                                Memory Dump Source
                                • Source File: 00000008.00000002.3710745303.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_30e0000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e47423a29ecc1657a6e7e3fefb9ad415000eb8cb4b69f87d00ba34aebab227c6
                                • Instruction ID: c13c2fe728acad0b6c827faeb9b4d454720a26d2bfd3e16f52918565a8376a0b
                                • Opcode Fuzzy Hash: e47423a29ecc1657a6e7e3fefb9ad415000eb8cb4b69f87d00ba34aebab227c6
                                • Instruction Fuzzy Hash: 70331E31D107198EDB11EF68C8806ADF7B5FF89300F15C69AD458AB225EB70EAC5CB81

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1913 30e7138-30e713c 1914 30e70ce-30e70d6 1913->1914 1915 30e713e-30e715d 1913->1915 1917 30e70d8 1914->1917 1918 30e70b9-30e70ca 1914->1918 1916 30e715f-30e7162 1915->1916 1919 30e7164-30e717f call 30e691c call 30e692c 1916->1919 1920 30e71b1-30e71b3 1916->1920 1921 30e70da-30e70e5 CheckRemoteDebuggerPresent 1917->1921 1922 30e70e8-30e70ec 1917->1922 1918->1914 1932 30e7184-30e71c1 1919->1932 1920->1916 1925 30e71b5-30e71ba 1920->1925 1921->1922 1923 30e70ee-30e70f4 1922->1923 1924 30e70f5-30e7130 1922->1924 1923->1924 1925->1916
                                APIs
                                • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 030E70DF
                                Memory Dump Source
                                • Source File: 00000008.00000002.3710745303.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_30e0000_RegAsm.jbxd
                                Similarity
                                • API ID: CheckDebuggerPresentRemote
                                • String ID:
                                • API String ID: 3662101638-0
                                • Opcode ID: 3a2b8da1bb668eb3bcd884473213b8d3b488601a8a6f26884893bbcf60ac5f71
                                • Instruction ID: ed62da180bf2e3b8225351c52afb8dd6a8b8ee6e87bb037458e8c106c2f209f1
                                • Opcode Fuzzy Hash: 3a2b8da1bb668eb3bcd884473213b8d3b488601a8a6f26884893bbcf60ac5f71
                                • Instruction Fuzzy Hash: AA313472A05395CFCB11DB78D8443EDBBF4AF4A210F1844DAD484DB292E739C946CBA2

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1958 4458b2-4458b9 1959 4458fc-445901 NtAllocateVirtualMemory 1958->1959 1960 4458de-4458e0 1958->1960 1959->1960 1961 445d25 1960->1961 1962 4458e6-445906 1960->1962 1964 44590c-44591f 1962->1964 1964->1964 1965 445921-4459a9 GetPEB call 445670 1964->1965 1965->1961
                                APIs
                                • NtAllocateVirtualMemory.NTDLL(000000FF), ref: 004458FF
                                Memory Dump Source
                                • Source File: 00000008.00000002.3707413394.0000000000442000.00000040.80000000.00040000.00000000.sdmp, Offset: 00442000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_442000_RegAsm.jbxd
                                Similarity
                                • API ID: AllocateMemoryVirtual
                                • String ID:
                                • API String ID: 2167126740-0
                                • Opcode ID: eb69f8d9b78740c04d216e83b94b7996e97d0517f4c1fe46d79275544a19c94d
                                • Instruction ID: f079a6b37922aa863eeefcf4a6099c8a15017739c5ae277024499a1a99c5ed02
                                • Opcode Fuzzy Hash: eb69f8d9b78740c04d216e83b94b7996e97d0517f4c1fe46d79275544a19c94d
                                • Instruction Fuzzy Hash: 0AF027B2908A40DFFF054B20C840BAC7774EB10350F210A77E402CA997D63C96038616

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1970 4458f8-445901 NtAllocateVirtualMemory 1972 4458de-4458e0 1970->1972 1973 445d25 1972->1973 1974 4458e6-445906 1972->1974 1976 44590c-44591f 1974->1976 1976->1976 1977 445921-4459a9 GetPEB call 445670 1976->1977 1977->1973
                                APIs
                                • NtAllocateVirtualMemory.NTDLL(000000FF), ref: 004458FF
                                Memory Dump Source
                                • Source File: 00000008.00000002.3707413394.0000000000442000.00000040.80000000.00040000.00000000.sdmp, Offset: 00442000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_442000_RegAsm.jbxd
                                Similarity
                                • API ID: AllocateMemoryVirtual
                                • String ID:
                                • API String ID: 2167126740-0
                                • Opcode ID: f80b397d47d6d056492579c095cae3825192162b97e32dae43d9c690ab5b99f5
                                • Instruction ID: 8bc12603ab5a862e0204d12fd9cf138d36d7a268b4fcd6de2f15b2a22ef4c2ed
                                • Opcode Fuzzy Hash: f80b397d47d6d056492579c095cae3825192162b97e32dae43d9c690ab5b99f5
                                • Instruction Fuzzy Hash: 86E068B1508946DFFF065B20CC40B5C73A4EB003A4F200637E003CAADAD73CD0028615
                                Memory Dump Source
                                • Source File: 00000008.00000002.3713803744.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_6a00000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 44f54785aa3aa08760a90fde4af48e3515492300a504f5f4bd99b4c409a86fef
                                • Instruction ID: 3e17a0e9245061d37c5a8e60b40077f63ad1180c269afdd32ce741a2e84d0408
                                • Opcode Fuzzy Hash: 44f54785aa3aa08760a90fde4af48e3515492300a504f5f4bd99b4c409a86fef
                                • Instruction Fuzzy Hash: 42627F34A103049FEB64EB68E598BADBBF2EF88354F148469D405DB394DB35ED42CB90
                                Memory Dump Source
                                • Source File: 00000008.00000002.3710745303.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_30e0000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dac2407e3fc4ff16e8bf3dbdc2054614ee5b607a851629e63d913309b95e8cea
                                • Instruction ID: dcfb65562b321b824bb9fbca3ae857281bafd748bcc6049a8016b78ec4cf9272
                                • Opcode Fuzzy Hash: dac2407e3fc4ff16e8bf3dbdc2054614ee5b607a851629e63d913309b95e8cea
                                • Instruction Fuzzy Hash: F1B16C71F01209CFDB54CFAAD8817ADBBF2AF88314F188529D415EB294EB749885CB81
                                Memory Dump Source
                                • Source File: 00000008.00000002.3710745303.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_30e0000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 43be0331b4271bde6a0efcc0b6898c68d079bdd35b91be004e0567bbbc0aa2e4
                                • Instruction ID: 9fcb3ebdd9faee05739da117ed5daaecaea0698c6adc33fdd099892281c93995
                                • Opcode Fuzzy Hash: 43be0331b4271bde6a0efcc0b6898c68d079bdd35b91be004e0567bbbc0aa2e4
                                • Instruction Fuzzy Hash: 58917C75E01309DFDF54CFAAD8847EDBBF2AF88304F188529E414AB294DB749885CB85

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1935 30e7060-30e70ec CheckRemoteDebuggerPresent 1938 30e70ee-30e70f4 1935->1938 1939 30e70f5-30e7130 1935->1939 1938->1939
                                APIs
                                • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 030E70DF
                                Memory Dump Source
                                • Source File: 00000008.00000002.3710745303.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_30e0000_RegAsm.jbxd
                                Similarity
                                • API ID: CheckDebuggerPresentRemote
                                • String ID:
                                • API String ID: 3662101638-0
                                • Opcode ID: 2a87070836f88d5094eae5fb0f696a38ee212bf1cd91b8b6e29b59a59debc163
                                • Instruction ID: cfe771946fda34abe865a5279c640583fdb72a41dc5ef1f1d1e0554b5bc25a2c
                                • Opcode Fuzzy Hash: 2a87070836f88d5094eae5fb0f696a38ee212bf1cd91b8b6e29b59a59debc163
                                • Instruction Fuzzy Hash: D4215772C01259CFDB10CFAAC884BEEBBF4EF49310F14845AE855A7241D738A944CF65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1942 30e7068-30e70ec CheckRemoteDebuggerPresent 1944 30e70ee-30e70f4 1942->1944 1945 30e70f5-30e7130 1942->1945 1944->1945
                                APIs
                                • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 030E70DF
                                Memory Dump Source
                                • Source File: 00000008.00000002.3710745303.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_30e0000_RegAsm.jbxd
                                Similarity
                                • API ID: CheckDebuggerPresentRemote
                                • String ID:
                                • API String ID: 3662101638-0
                                • Opcode ID: f816805b4a105f03263a8016dc0b48454c7f021d013ca72abd11066ea8185805
                                • Instruction ID: 7f62ca4ef94e6827d922d836cae6b3e7f47bd5300d55af1887197206cce5473a
                                • Opcode Fuzzy Hash: f816805b4a105f03263a8016dc0b48454c7f021d013ca72abd11066ea8185805
                                • Instruction Fuzzy Hash: D52148B2D01259CFDB14CF9AC884BEEFBF4AF48311F14841AE855A3240D738A944CF65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1948 6a0aac0-6a0ab5c DuplicateHandle 1949 6a0ab65-6a0ab82 1948->1949 1950 6a0ab5e-6a0ab64 1948->1950 1950->1949
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06A0AB4F
                                Memory Dump Source
                                • Source File: 00000008.00000002.3713803744.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_6a00000_RegAsm.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 1eacd71b6495373309b782e96f4bb488b9a89aec88fb95190671101f39b411d8
                                • Instruction ID: 28c925940f0899f4f034ed6e697d57a3231aea32c7ae33f1e2fab99d18d41170
                                • Opcode Fuzzy Hash: 1eacd71b6495373309b782e96f4bb488b9a89aec88fb95190671101f39b411d8
                                • Instruction Fuzzy Hash: 3B21D2B5D002489FDB10CFAAD984ADEBBF5EB48314F14841AE918A7250D378A954CF65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1953 6a0aac8-6a0ab5c DuplicateHandle 1954 6a0ab65-6a0ab82 1953->1954 1955 6a0ab5e-6a0ab64 1953->1955 1955->1954
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06A0AB4F
                                Memory Dump Source
                                • Source File: 00000008.00000002.3713803744.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_6a00000_RegAsm.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: b47773950e11b6aeff5a2f3a220461b3551ca8c0d8468a5a6d8f29298215b396
                                • Instruction ID: c07498e9f9bb43eba2ee5a6d480f040b4a294860c05d12e1002c984444f51b8c
                                • Opcode Fuzzy Hash: b47773950e11b6aeff5a2f3a220461b3551ca8c0d8468a5a6d8f29298215b396
                                • Instruction Fuzzy Hash: 5E21E2B5D003489FDB10CFAAD984ADEFBF5EB48320F14841AE918A7350D378A944CFA5
                                Memory Dump Source
                                • Source File: 00000008.00000002.3710396704.0000000002F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F1D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_2f1d000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fe2c42f57b380c500fc036757429bbbcd48e7673db8c60c2519272c3e7b568fa
                                • Instruction ID: de982f16f7d4a8e9b1b019bd0bd05f1b5516454a93e8c17c7bdb22cde591219c
                                • Opcode Fuzzy Hash: fe2c42f57b380c500fc036757429bbbcd48e7673db8c60c2519272c3e7b568fa
                                • Instruction Fuzzy Hash: 5C21F276A04340EFDB14DF24D9C4B16BBB1EB84B54F64C56DEA0A4B24AC33AD447CA62
                                Memory Dump Source
                                • Source File: 00000008.00000002.3710396704.0000000002F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F1D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_2f1d000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 049863b72afee537a45d15dcdd3ec31949803e6176599602a4e9cadb07b598d0
                                • Instruction ID: d8542298799cc8ea0cb35975d99bb04a23354353f2eb0ba5532707c204d74109
                                • Opcode Fuzzy Hash: 049863b72afee537a45d15dcdd3ec31949803e6176599602a4e9cadb07b598d0
                                • Instruction Fuzzy Hash: 5A21D1755093C08FCB12CF24D990711BF71EF46214F28C5EAD9498F6A7C33A980ACB62
                                Strings
                                Memory Dump Source
                                • Source File: 00000008.00000002.3713803744.0000000006A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A00000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_6a00000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID: $q$$q$$q$$q$$q$$q$$q$$q$$q$$q
                                • API String ID: 0-1298971921
                                • Opcode ID: aa13a5365a95f5a2e0adc39caa553d0390832dd5f8a3017d0db09468473933ab
                                • Instruction ID: d7fef9bd407b01a69096b686c7a8af1b72eabbbff50bb75f1768479015d9259d
                                • Opcode Fuzzy Hash: aa13a5365a95f5a2e0adc39caa553d0390832dd5f8a3017d0db09468473933ab
                                • Instruction Fuzzy Hash: 20123E34F0161ACFEF64EB65D854BADB7B2BF85304F2085A9D406AB395DB309D81CB80
                                Memory Dump Source
                                • Source File: 00000008.00000002.3710745303.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_8_2_30e0000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9419c94d1d54f4ae8a8cf53cb00d9359062a36cb97d29ae12d43c63d64ad9b1f
                                • Instruction ID: dc42a577742a98dcbcb796f126d7fffcb7a1d4b9ebf8b62fe27283397a42adf0
                                • Opcode Fuzzy Hash: 9419c94d1d54f4ae8a8cf53cb00d9359062a36cb97d29ae12d43c63d64ad9b1f
                                • Instruction Fuzzy Hash: FAB16E71F01209CFDB54CFAAD8857AEFBF2BF88304F188529D415AB294EB749845CB85