Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Order Details.exe

Overview

General Information

Sample name:Order Details.exe
Analysis ID:1592377
MD5:06c48ef3e45a7dafedbd596368918830
SHA1:6ec2e82db6d702ddc0f4b302a4d8f02fd4c36c36
SHA256:1e2333cb4fb3ecca06d22bb3b6255e5ac62b7ba43c3bceb8c17252657f34ba1e
Tags:exeuser-threatcat_ch
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Order Details.exe (PID: 2032 cmdline: "C:\Users\user\Desktop\Order Details.exe" MD5: 06C48EF3E45A7DAFEDBD596368918830)
    • Order Details.exe (PID: 908 cmdline: "C:\Users\user\Desktop\Order Details.exe" MD5: 06C48EF3E45A7DAFEDBD596368918830)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "frankichong@yulifertilizer.com.my", "Password": "Ayfc931319*", "Host": "yulifertilizer.com.my", "Port": "25", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x1494c:$a1: get_encryptedPassword
      • 0x14c38:$a2: get_encryptedUsername
      • 0x14758:$a3: get_timePasswordChanged
      • 0x14853:$a4: get_passwordField
      • 0x14962:$a5: set_encryptedPassword
      • 0x15fc5:$a7: get_logins
      • 0x15f28:$a10: KeyLoggerEventArgs
      • 0x15b93:$a11: KeyLoggerEventArgsEventHandler
      00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x182e0:$x1: $%SMTPDV$
      • 0x18346:$x2: $#TheHashHere%&
      • 0x199af:$x3: %FTPDV$
      • 0x19aa3:$x4: $%TelegramDv$
      • 0x15b93:$x5: KeyLoggerEventArgs
      • 0x15f28:$x5: KeyLoggerEventArgs
      • 0x199d3:$m2: Clipboard Logs ID
      • 0x19bf3:$m2: Screenshot Logs ID
      • 0x19d03:$m2: keystroke Logs ID
      • 0x19fdd:$m3: SnakePW
      • 0x19bcb:$m4: \SnakeKeylogger\
      00000000.00000002.1679581061.0000000004FF0000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
      • 0x4ae6b:$x1: In$J$ct0r
      Click to see the 15 entries
      SourceRuleDescriptionAuthorStrings
      0.2.Order Details.exe.4ff0000.5.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
      • 0x4906b:$x1: In$J$ct0r
      0.2.Order Details.exe.4ff0000.5.raw.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
      • 0x4ae6b:$x1: In$J$ct0r
      0.2.Order Details.exe.3933f90.2.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
      • 0x4906b:$x1: In$J$ct0r
      0.2.Order Details.exe.3933f90.2.raw.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
      • 0x4ae6b:$x1: In$J$ct0r
      0.2.Order Details.exe.39e8e20.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 34 entries
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-16T02:24:02.848711+010028033053Unknown Traffic192.168.2.449732104.21.32.1443TCP
        2025-01-16T02:24:06.855237+010028033053Unknown Traffic192.168.2.449738104.21.32.1443TCP
        2025-01-16T02:24:08.097022+010028033053Unknown Traffic192.168.2.449740104.21.32.1443TCP
        2025-01-16T02:24:09.347621+010028033053Unknown Traffic192.168.2.449742104.21.32.1443TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2025-01-16T02:24:00.739904+010028032742Potentially Bad Traffic192.168.2.449730193.122.6.16880TCP
        2025-01-16T02:24:02.255513+010028032742Potentially Bad Traffic192.168.2.449730193.122.6.16880TCP
        2025-01-16T02:24:03.536813+010028032742Potentially Bad Traffic192.168.2.449733193.122.6.16880TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: Order Details.exeAvira: detected
        Source: 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "frankichong@yulifertilizer.com.my", "Password": "Ayfc931319*", "Host": "yulifertilizer.com.my", "Port": "25", "Version": "5.1"}
        Source: Order Details.exeVirustotal: Detection: 50%Perma Link
        Source: Order Details.exeReversingLabs: Detection: 39%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: Order Details.exeJoe Sandbox ML: detected

        Location Tracking

        barindex
        Source: unknownDNS query: name: reallyfreegeoip.org
        Source: Order Details.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49731 version: TLS 1.0
        Source: Order Details.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: Order Details.exe, 00000000.00000002.1680271362.00000000050D0000.00000004.08000000.00040000.00000000.sdmp, Order Details.exe, 00000000.00000002.1678634520.00000000028E1000.00000004.00000800.00020000.00000000.sdmp
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 019AF1F6h1_2_019AF007
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 019AFB80h1_2_019AF007
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_019AE528
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_019AEB5B
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_019AED3C
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDCD49h1_2_05EDCAA0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDC499h1_2_05EDC1F0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05ED1471h1_2_05ED11C0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDF461h1_2_05EDF1B8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDC041h1_2_05EDBD98
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05ED1A38h1_2_05ED1966
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05ED1011h1_2_05ED0D60
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDF009h1_2_05EDED60
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDBBE9h1_2_05EDB940
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDEBB1h1_2_05EDE908
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05ED0BB1h1_2_05ED0900
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDB791h1_2_05EDB4E8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05ED0751h1_2_05ED04A0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDE759h1_2_05EDE4B0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05ED02F1h1_2_05ED0040
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDE301h1_2_05EDE058
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDDEA9h1_2_05EDDC00
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDDA51h1_2_05EDD7A8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDD5F9h1_2_05EDD350
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDD1A1h1_2_05EDCEF8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDFD11h1_2_05EDFA68
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDC8F1h1_2_05EDC648
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05ED1A38h1_2_05ED1620
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 05EDF8B9h1_2_05EDF610
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB8945h1_2_06FB8608
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB6171h1_2_06FB5EC8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]1_2_06FB36CE
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB5D19h1_2_06FB5A70
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB58C1h1_2_06FB5618
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB6E79h1_2_06FB6BD0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]1_2_06FB33B8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]1_2_06FB33A8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB6A21h1_2_06FB6778
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB65C9h1_2_06FB6320
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB0B99h1_2_06FB08F0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB7751h1_2_06FB74A8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB0741h1_2_06FB0498
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB72FAh1_2_06FB7050
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB02E9h1_2_06FB0040
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB8459h1_2_06FB81B0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB5441h1_2_06FB5198
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB8001h1_2_06FB7D58
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB0FF1h1_2_06FB0D48
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 4x nop then jmp 06FB7BA9h1_2_06FB7900

        Networking

        barindex
        Source: Yara matchFile source: 1.2.Order Details.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Order Details.exe.39e8e20.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Order Details.exe.39c81f0.3.raw.unpack, type: UNPACKEDPE
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
        Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
        Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
        Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
        Source: unknownDNS query: name: checkip.dyndns.org
        Source: unknownDNS query: name: reallyfreegeoip.org
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49733 -> 193.122.6.168:80
        Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49730 -> 193.122.6.168:80
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49740 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49732 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49742 -> 104.21.32.1:443
        Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49738 -> 104.21.32.1:443
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49731 version: TLS 1.0
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
        Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
        Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
        Source: Order Details.exe, 00000001.00000002.4156338198.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.0000000003416000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000350E000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034FF000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034B6000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034C4000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
        Source: Order Details.exe, 00000001.00000002.4156338198.00000000034E0000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.0000000003416000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000350E000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034FF000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034B6000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.0000000003459000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000340A000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034C4000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
        Source: Order Details.exe, 00000001.00000002.4156338198.0000000003351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
        Source: Order Details.exe, 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
        Source: Order Details.exe, 00000001.00000002.4156338198.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000350E000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034FF000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000342E000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034B6000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034C4000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
        Source: Order Details.exe, 00000001.00000002.4156338198.0000000003351000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: Order Details.exe, 00000001.00000002.4156338198.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.0000000003416000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000350E000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034FF000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034B6000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.0000000003459000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034C4000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
        Source: Order Details.exe, 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.0000000003416000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
        Source: Order Details.exe, 00000001.00000002.4156338198.00000000034D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
        Source: Order Details.exe, 00000001.00000002.4156338198.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000350E000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034FF000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034B6000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.0000000003459000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034C4000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
        Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
        Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
        Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443

        System Summary

        barindex
        Source: 0.2.Order Details.exe.4ff0000.5.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
        Source: 0.2.Order Details.exe.4ff0000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
        Source: 0.2.Order Details.exe.3933f90.2.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
        Source: 0.2.Order Details.exe.3933f90.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
        Source: 0.2.Order Details.exe.39e8e20.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0.2.Order Details.exe.39e8e20.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 0.2.Order Details.exe.39e8e20.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 0.2.Order Details.exe.39e8e20.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: 0.2.Order Details.exe.39c81f0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0.2.Order Details.exe.39c81f0.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 0.2.Order Details.exe.39c81f0.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 0.2.Order Details.exe.39c81f0.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: 1.2.Order Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 1.2.Order Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 1.2.Order Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 1.2.Order Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: 0.2.Order Details.exe.39e8e20.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0.2.Order Details.exe.39e8e20.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 0.2.Order Details.exe.39e8e20.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 0.2.Order Details.exe.39e8e20.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: 0.2.Order Details.exe.39c81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 0.2.Order Details.exe.39c81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
        Source: 0.2.Order Details.exe.39c81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
        Source: 0.2.Order Details.exe.39c81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: 0.2.Order Details.exe.28ef718.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
        Source: 0.2.Order Details.exe.28f1f58.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
        Source: 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: 00000000.00000002.1679581061.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects downloader injector Author: ditekSHen
        Source: 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: Process Memory Space: Order Details.exe PID: 2032, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: Process Memory Space: Order Details.exe PID: 2032, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: Process Memory Space: Order Details.exe PID: 908, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
        Source: Process Memory Space: Order Details.exe PID: 908, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
        Source: initial sampleStatic PE information: Filename: Order Details.exe
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 0_2_027BAE480_2_027BAE48
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 0_2_027B31180_2_027B3118
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019AC1901_2_019AC190
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019A61081_2_019A6108
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019AF0071_2_019AF007
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019AB3281_2_019AB328
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019AC4701_2_019AC470
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019A67301_2_019A6730
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019AC7531_2_019AC753
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019A98581_2_019A9858
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019ABBD31_2_019ABBD3
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019A4AD91_2_019A4AD9
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019ACA331_2_019ACA33
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019ABEB01_2_019ABEB0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019AE5171_2_019AE517
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019AE5281_2_019AE528
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019A35731_2_019A3573
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_019AB4F31_2_019AB4F3
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED7D901_2_05ED7D90
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED84601_2_05ED8460
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED38701_2_05ED3870
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDCAA01_2_05EDCAA0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDC1E01_2_05EDC1E0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDC1F01_2_05EDC1F0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED11C01_2_05ED11C0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDF1A91_2_05EDF1A9
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDF1B81_2_05EDF1B8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED11B01_2_05ED11B0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDBD881_2_05EDBD88
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDBD981_2_05EDBD98
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED0D601_2_05ED0D60
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDED601_2_05EDED60
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDB9401_2_05EDB940
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED0D511_2_05ED0D51
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDED501_2_05EDED50
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDB9301_2_05EDB930
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDE9081_2_05EDE908
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED09001_2_05ED0900
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDB4E81_2_05EDB4E8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDE8F81_2_05EDE8F8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED08F01_2_05ED08F0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDB4D71_2_05EDB4D7
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED04A01_2_05ED04A0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDE4A01_2_05EDE4A0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDE4B01_2_05EDE4B0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED04901_2_05ED0490
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED38601_2_05ED3860
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDE0491_2_05EDE049
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED00401_2_05ED0040
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDE0581_2_05EDE058
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED00061_2_05ED0006
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDDC001_2_05EDDC00
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED73E81_2_05ED73E8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDDBF11_2_05EDDBF1
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED73D81_2_05ED73D8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDD7A81_2_05EDD7A8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDD7981_2_05EDD798
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDD3401_2_05EDD340
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDD3501_2_05EDD350
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDCEE91_2_05EDCEE9
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDCEF81_2_05EDCEF8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDCA901_2_05EDCA90
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDFA681_2_05EDFA68
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDC6481_2_05EDC648
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDFA591_2_05EDFA59
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDC6381_2_05EDC638
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDF6001_2_05EDF600
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05EDF6101_2_05EDF610
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBB6E81_2_06FBB6E8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBD6701_2_06FBD670
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBAA581_2_06FBAA58
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB86081_2_06FB8608
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBC3881_2_06FBC388
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBB0A01_2_06FBB0A0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB8C511_2_06FB8C51
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBD0281_2_06FBD028
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBA4081_2_06FBA408
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBC9D81_2_06FBC9D8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB11A01_2_06FB11A0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBBD381_2_06FBBD38
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBB6D91_2_06FBB6D9
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB5EC81_2_06FB5EC8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB5EB81_2_06FB5EB8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB5A701_2_06FB5A70
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBD6611_2_06FBD661
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB5A601_2_06FB5A60
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBAA521_2_06FBAA52
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB56181_2_06FB5618
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB56091_2_06FB5609
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB86021_2_06FB8602
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBA3F81_2_06FBA3F8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB6BD01_2_06FB6BD0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB6BC11_2_06FB6BC1
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB33B81_2_06FB33B8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB33A81_2_06FB33A8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB67781_2_06FB6778
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBC3781_2_06FBC378
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB676A1_2_06FB676A
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB37301_2_06FB3730
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB63201_2_06FB6320
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB63111_2_06FB6311
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB78F01_2_06FB78F0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB08F01_2_06FB08F0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB08E01_2_06FB08E0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB74A81_2_06FB74A8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB04981_2_06FB0498
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB74971_2_06FB7497
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB04881_2_06FB0488
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBB08F1_2_06FBB08F
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB70501_2_06FB7050
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB70491_2_06FB7049
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB00401_2_06FB0040
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB44301_2_06FB4430
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB28181_2_06FB2818
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBD0181_2_06FBD018
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB28071_2_06FB2807
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB00061_2_06FB0006
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBC9C81_2_06FBC9C8
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB81B01_2_06FB81B0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB81A01_2_06FB81A0
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB51981_2_06FB5198
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB11911_2_06FB1191
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB518A1_2_06FB518A
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB7D581_2_06FB7D58
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB0D481_2_06FB0D48
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB7D481_2_06FB7D48
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB0D391_2_06FB0D39
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FBBD281_2_06FBBD28
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_06FB79001_2_06FB7900
        Source: Order Details.exe, 00000000.00000002.1678770489.00000000038E5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs Order Details.exe
        Source: Order Details.exe, 00000000.00000002.1680271362.00000000050D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs Order Details.exe
        Source: Order Details.exe, 00000000.00000002.1679581061.0000000004FF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs Order Details.exe
        Source: Order Details.exe, 00000000.00000002.1678634520.00000000028E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs Order Details.exe
        Source: Order Details.exe, 00000000.00000002.1678634520.00000000028E1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Order Details.exe
        Source: Order Details.exe, 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Order Details.exe
        Source: Order Details.exe, 00000000.00000000.1673230829.0000000000592000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBladeNoPa.exe4 vs Order Details.exe
        Source: Order Details.exe, 00000000.00000002.1678087390.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Order Details.exe
        Source: Order Details.exe, 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Order Details.exe
        Source: Order Details.exe, 00000001.00000002.4155467566.0000000001377000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Order Details.exe
        Source: Order Details.exeBinary or memory string: OriginalFilenameBladeNoPa.exe4 vs Order Details.exe
        Source: Order Details.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: 0.2.Order Details.exe.4ff0000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
        Source: 0.2.Order Details.exe.4ff0000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
        Source: 0.2.Order Details.exe.3933f90.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
        Source: 0.2.Order Details.exe.3933f90.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
        Source: 0.2.Order Details.exe.39e8e20.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0.2.Order Details.exe.39e8e20.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.Order Details.exe.39e8e20.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 0.2.Order Details.exe.39e8e20.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: 0.2.Order Details.exe.39c81f0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0.2.Order Details.exe.39c81f0.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.Order Details.exe.39c81f0.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 0.2.Order Details.exe.39c81f0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: 1.2.Order Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 1.2.Order Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.Order Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 1.2.Order Details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: 0.2.Order Details.exe.39e8e20.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0.2.Order Details.exe.39e8e20.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.Order Details.exe.39e8e20.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 0.2.Order Details.exe.39e8e20.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: 0.2.Order Details.exe.39c81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 0.2.Order Details.exe.39c81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.Order Details.exe.39c81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
        Source: 0.2.Order Details.exe.39c81f0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: 0.2.Order Details.exe.28ef718.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
        Source: 0.2.Order Details.exe.28f1f58.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
        Source: 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: 00000000.00000002.1679581061.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
        Source: 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: Process Memory Space: Order Details.exe PID: 2032, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: Process Memory Space: Order Details.exe PID: 2032, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: Process Memory Space: Order Details.exe PID: 908, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
        Source: Process Memory Space: Order Details.exe PID: 908, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/2
        Source: C:\Users\user\Desktop\Order Details.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Order Details.exe.logJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeMutant created: NULL
        Source: Order Details.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: Order Details.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        Source: C:\Users\user\Desktop\Order Details.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: Order Details.exe, 00000001.00000002.4156338198.00000000035A8000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000358A000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000359A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
        Source: Order Details.exeVirustotal: Detection: 50%
        Source: Order Details.exeReversingLabs: Detection: 39%
        Source: unknownProcess created: C:\Users\user\Desktop\Order Details.exe "C:\Users\user\Desktop\Order Details.exe"
        Source: C:\Users\user\Desktop\Order Details.exeProcess created: C:\Users\user\Desktop\Order Details.exe "C:\Users\user\Desktop\Order Details.exe"
        Source: C:\Users\user\Desktop\Order Details.exeProcess created: C:\Users\user\Desktop\Order Details.exe "C:\Users\user\Desktop\Order Details.exe"Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: secur32.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
        Source: Order Details.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: Order Details.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: Order Details.exe, 00000000.00000002.1680271362.00000000050D0000.00000004.08000000.00040000.00000000.sdmp, Order Details.exe, 00000000.00000002.1678634520.00000000028E1000.00000004.00000800.00020000.00000000.sdmp
        Source: Order Details.exeStatic PE information: 0xDA00EF84 [Sun Nov 25 02:40:04 2085 UTC]
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED2990 push esp; retf 1_2_05ED2AC9
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED2E60 push esp; iretd 1_2_05ED2E79
        Source: Order Details.exeStatic PE information: section name: .text entropy: 7.213000127966721
        Source: C:\Users\user\Desktop\Order Details.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: Yara matchFile source: Process Memory Space: Order Details.exe PID: 2032, type: MEMORYSTR
        Source: C:\Users\user\Desktop\Order Details.exeMemory allocated: 2740000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeMemory allocated: 28E0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeMemory allocated: 48E0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeMemory allocated: 1960000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeMemory allocated: 3350000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeMemory allocated: 3170000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 600000Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599875Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599766Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599657Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599532Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599407Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599282Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599172Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599063Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598938Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598813Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598688Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598563Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598454Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598329Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598204Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598079Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597943Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597813Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597698Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597563Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597454Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597329Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597213Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597094Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596985Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596860Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596735Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596610Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596485Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596360Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596235Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596110Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 595985Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 595860Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 595735Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 595610Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 595485Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 595360Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 595235Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594966Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594857Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594717Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594610Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594500Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594391Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594266Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594157Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594032Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 593907Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 593797Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeWindow / User API: threadDelayed 8474Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeWindow / User API: threadDelayed 1346Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 3584Thread sleep time: -922337203685477s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep count: 32 > 30Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -29514790517935264s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -600000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -599875s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 1908Thread sleep count: 8474 > 30Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -599766s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 1908Thread sleep count: 1346 > 30Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -599657s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -599532s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -599407s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -599282s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -599172s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -599063s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -598938s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -598813s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -598688s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -598563s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -598454s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -598329s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -598204s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -598079s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -597943s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -597813s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -597698s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -597563s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -597454s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -597329s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -597213s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -597094s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -596985s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -596860s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -596735s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -596610s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -596485s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -596360s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -596235s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -596110s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -595985s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -595860s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -595735s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -595610s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -595485s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -595360s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -595235s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -594966s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -594857s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -594717s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -594610s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -594500s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -594391s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -594266s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -594157s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -594032s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -593907s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exe TID: 2200Thread sleep time: -593797s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 922337203685477Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 600000Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599875Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599766Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599657Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599532Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599407Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599282Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599172Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 599063Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598938Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598813Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598688Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598563Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598454Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598329Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598204Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 598079Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597943Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597813Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597698Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597563Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597454Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597329Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597213Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 597094Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596985Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596860Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596735Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596610Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596485Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596360Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596235Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 596110Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 595985Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 595860Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 595735Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 595610Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 595485Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 595360Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 595235Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594966Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594857Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594717Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594610Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594500Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594391Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594266Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594157Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 594032Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 593907Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeThread delayed: delay time: 593797Jump to behavior
        Source: Order Details.exe, 00000001.00000002.4155927278.0000000001726000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllS
        Source: C:\Users\user\Desktop\Order Details.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeCode function: 1_2_05ED7D90 LdrInitializeThunk,1_2_05ED7D90
        Source: C:\Users\user\Desktop\Order Details.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeMemory allocated: page read and write | page guardJump to behavior

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\Order Details.exeMemory written: C:\Users\user\Desktop\Order Details.exe base: 400000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeProcess created: C:\Users\user\Desktop\Order Details.exe "C:\Users\user\Desktop\Order Details.exe"Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeQueries volume information: C:\Users\user\Desktop\Order Details.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeQueries volume information: C:\Users\user\Desktop\Order Details.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 0.2.Order Details.exe.39e8e20.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Order Details.exe.39c81f0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.Order Details.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Order Details.exe.39e8e20.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Order Details.exe.39c81f0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.4156338198.000000000351C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.4156338198.0000000003351000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Order Details.exe PID: 2032, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Order Details.exe PID: 908, type: MEMORYSTR
        Source: C:\Users\user\Desktop\Order Details.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
        Source: C:\Users\user\Desktop\Order Details.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
        Source: Yara matchFile source: 0.2.Order Details.exe.39e8e20.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Order Details.exe.39c81f0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.Order Details.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Order Details.exe.39e8e20.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Order Details.exe.39c81f0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Order Details.exe PID: 2032, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Order Details.exe PID: 908, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 0.2.Order Details.exe.39e8e20.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Order Details.exe.39c81f0.3.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.Order Details.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Order Details.exe.39e8e20.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Order Details.exe.39c81f0.3.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.4156338198.000000000351C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.4156338198.0000000003351000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Order Details.exe PID: 2032, type: MEMORYSTR
        Source: Yara matchFile source: Process Memory Space: Order Details.exe PID: 908, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
        DLL Side-Loading
        111
        Process Injection
        1
        Masquerading
        1
        OS Credential Dumping
        1
        Query Registry
        Remote Services1
        Email Collection
        11
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        1
        Disable or Modify Tools
        LSASS Memory1
        Security Software Discovery
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
        Virtualization/Sandbox Evasion
        Security Account Manager1
        Process Discovery
        SMB/Windows Admin Shares1
        Data from Local System
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
        Process Injection
        NTDS31
        Virtualization/Sandbox Evasion
        Distributed Component Object ModelInput Capture13
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
        Obfuscated Files or Information
        LSA Secrets1
        Application Window Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Software Packing
        Cached Domain Credentials1
        System Network Configuration Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Timestomp
        DCSync13
        System Information Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        DLL Side-Loading
        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        Order Details.exe51%VirustotalBrowse
        Order Details.exe39%ReversingLabsByteCode-MSIL.Trojan.Zilla
        Order Details.exe100%AviraHEUR/AGEN.1311171
        Order Details.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        NameIPActiveMaliciousAntivirus DetectionReputation
        reallyfreegeoip.org
        104.21.32.1
        truefalse
          high
          checkip.dyndns.com
          193.122.6.168
          truefalse
            high
            checkip.dyndns.org
            unknown
            unknownfalse
              high
              NameMaliciousAntivirus DetectionReputation
              http://checkip.dyndns.org/false
                high
                https://reallyfreegeoip.org/xml/8.46.123.189false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://reallyfreegeoip.orgOrder Details.exe, 00000001.00000002.4156338198.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.0000000003416000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000350E000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034FF000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034B6000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.0000000003459000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034C4000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034D2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://checkip.dyndns.orgOrder Details.exe, 00000001.00000002.4156338198.00000000034E0000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.0000000003416000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000350E000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034FF000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034B6000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.0000000003459000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000340A000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034C4000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034D2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://checkip.dyndns.comOrder Details.exe, 00000001.00000002.4156338198.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.0000000003416000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000350E000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034FF000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034B6000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034C4000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameOrder Details.exe, 00000001.00000002.4156338198.0000000003351000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.org/qOrder Details.exe, 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            https://reallyfreegeoip.org/xml/8.46.123.189$Order Details.exe, 00000001.00000002.4156338198.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000350E000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034FF000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034B6000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.0000000003459000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034C4000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034D2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://reallyfreegeoip.orgOrder Details.exe, 00000001.00000002.4156338198.00000000034A9000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000350E000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034FF000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.000000000342E000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034B6000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034C4000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.00000000034D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://reallyfreegeoip.org/xml/Order Details.exe, 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Order Details.exe, 00000001.00000002.4156338198.0000000003416000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  104.21.32.1
                                  reallyfreegeoip.orgUnited States
                                  13335CLOUDFLARENETUSfalse
                                  193.122.6.168
                                  checkip.dyndns.comUnited States
                                  31898ORACLE-BMC-31898USfalse
                                  Joe Sandbox version:42.0.0 Malachite
                                  Analysis ID:1592377
                                  Start date and time:2025-01-16 02:23:07 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 7m 14s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:6
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:Order Details.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@3/1@2/2
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 99%
                                  • Number of executed functions: 121
                                  • Number of non-executed functions: 49
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                  • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  TimeTypeDescription
                                  20:24:01API Interceptor12531463x Sleep call for process: Order Details.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  104.21.32.1New order BPD-003777.exeGet hashmaliciousFormBookBrowse
                                  • www.cikolatasampuan.xyz/sbv2/
                                  DOCU800147001.exeGet hashmaliciousGuLoaderBrowse
                                  • b2csa.icu/PL341/index.php
                                  24010-KAPSON.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                  • b2csa.icu/PL341/index.php
                                  bIcqeSVPW6.exeGet hashmaliciousFormBookBrowse
                                  • www.rafconstrutora.online/sa6l/
                                  BalphRTkPS.exeGet hashmaliciousFormBookBrowse
                                  • www.aziziyeescortg.xyz/2pcx/
                                  25IvlOVEB1.exeGet hashmaliciousFormBookBrowse
                                  • www.masterqq.pro/3vdc/
                                  QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                  • www.mzkd6gp5.top/3u0p/
                                  SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                  • redroomaudio.com/administrator/index.php
                                  193.122.6.168Contrarre.exeGet hashmaliciousMassLogger RATBrowse
                                  • checkip.dyndns.org/
                                  Company introduction.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • checkip.dyndns.org/
                                  rDEKONT-1_15_2025__75kb__pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • checkip.dyndns.org/
                                  mnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • checkip.dyndns.org/
                                  gGI2gVBI0f.exeGet hashmaliciousMassLogger RATBrowse
                                  • checkip.dyndns.org/
                                  ZpYFG94D4C.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • checkip.dyndns.org/
                                  ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                  • checkip.dyndns.org/
                                  grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                  • checkip.dyndns.org/
                                  ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • checkip.dyndns.org/
                                  prgNb8YFEA.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • checkip.dyndns.org/
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  reallyfreegeoip.orgBNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                  • 104.21.16.1
                                  NEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                                  • 104.21.96.1
                                  Invoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 104.21.112.1
                                  PDF6UU0CVUO2W-YGVUIO.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • 104.21.96.1
                                  PO#_1100015533.scrGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • 104.21.80.1
                                  1nl3hc.ps1Get hashmaliciousMassLogger RATBrowse
                                  • 104.21.112.1
                                  Contrarre.exeGet hashmaliciousMassLogger RATBrowse
                                  • 104.21.96.1
                                  Company introduction.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 104.21.48.1
                                  rDEKONT-1_15_2025__75kb__pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 104.21.96.1
                                  RFQ_AS0101402025.22025_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                  • 104.21.96.1
                                  checkip.dyndns.comBNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                  • 132.226.247.73
                                  NEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                                  • 132.226.247.73
                                  Invoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 158.101.44.242
                                  PDF6UU0CVUO2W-YGVUIO.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • 193.122.130.0
                                  PO#_1100015533.scrGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • 193.122.130.0
                                  1nl3hc.ps1Get hashmaliciousMassLogger RATBrowse
                                  • 193.122.130.0
                                  Contrarre.exeGet hashmaliciousMassLogger RATBrowse
                                  • 193.122.6.168
                                  Company introduction.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 193.122.6.168
                                  rDEKONT-1_15_2025__75kb__pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 193.122.6.168
                                  RFQ_AS0101402025.22025_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                  • 158.101.44.242
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  ORACLE-BMC-31898USExecute.ps1Get hashmaliciousMetasploitBrowse
                                  • 158.101.196.44
                                  Invoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 158.101.44.242
                                  PDF6UU0CVUO2W-YGVUIO.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • 193.122.130.0
                                  PO#_1100015533.scrGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • 193.122.130.0
                                  1nl3hc.ps1Get hashmaliciousMassLogger RATBrowse
                                  • 193.122.130.0
                                  Contrarre.exeGet hashmaliciousMassLogger RATBrowse
                                  • 193.122.6.168
                                  Company introduction.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 193.122.6.168
                                  rDEKONT-1_15_2025__75kb__pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 193.122.6.168
                                  RFQ_AS0101402025.22025_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                  • 158.101.44.242
                                  m68k.elfGet hashmaliciousUnknownBrowse
                                  • 193.122.239.186
                                  CLOUDFLARENETUSSubscription_Renewal_Invoice_2025_FGHDCS.htmlGet hashmaliciousHTMLPhisherBrowse
                                  • 104.17.25.14
                                  https://yogalisbon.gitcz.pw/sign-inGet hashmaliciousUnknownBrowse
                                  • 104.21.112.1
                                  http://com-evaluate-fanpage30127.pages.dev/help/contact/671203900952887Get hashmaliciousHTMLPhisherBrowse
                                  • 188.114.97.3
                                  http://docs-wltconnect.gitbook.io/us-enGet hashmaliciousHTMLPhisherBrowse
                                  • 172.64.147.209
                                  https://inhospitality.shop/Get hashmaliciousUnknownBrowse
                                  • 104.17.25.14
                                  http://shorten.so/fVj82Get hashmaliciousPorn ScamBrowse
                                  • 104.21.54.29
                                  https://m3ins.azurewebsites.net/?user-agent=Mozilla/5.0%20(Windows%20NT%2010.0;%20Win64;%20x64)%20AppleWebKit/537.36%20(KHTMLGet hashmaliciousHTMLPhisherBrowse
                                  • 188.114.96.3
                                  http://hrpibzdeam.xyz/Get hashmaliciousUnknownBrowse
                                  • 172.67.196.118
                                  http://logincrypto-crypto.gitbook.io/usGet hashmaliciousHTMLPhisherBrowse
                                  • 172.64.147.209
                                  https://meta.supportlivefanpage.us/community-standard/28244/confirmGet hashmaliciousUnknownBrowse
                                  • 188.114.97.3
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  54328bd36c14bd82ddaa0c04b25ed9adBNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                  • 104.21.32.1
                                  NEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                                  • 104.21.32.1
                                  Invoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 104.21.32.1
                                  PDF6UU0CVUO2W-YGVUIO.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                  • 104.21.32.1
                                  1nl3hc.ps1Get hashmaliciousMassLogger RATBrowse
                                  • 104.21.32.1
                                  Contrarre.exeGet hashmaliciousMassLogger RATBrowse
                                  • 104.21.32.1
                                  Company introduction.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 104.21.32.1
                                  rDEKONT-1_15_2025__75kb__pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 104.21.32.1
                                  RFQ_AS0101402025.22025_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                  • 104.21.32.1
                                  QUOTATION REQUIRED_Enatel s.r.l..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  • 104.21.32.1
                                  No context
                                  Process:C:\Users\user\Desktop\Order Details.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):706
                                  Entropy (8bit):5.349842958726647
                                  Encrypted:false
                                  SSDEEP:12:Q3La/hhkvoDLI4MWuCqDLI4MWuPTAq1KDLI4M9XKbbDLI4MWuPJKAVKhat92n4M6:MLUE4K5E4KH1qE4qXKDE4KhKiKhg84j
                                  MD5:9BA266AD16952A9A57C3693E0BCFED48
                                  SHA1:5DB70A3A7F1DB4E3879265AB336B2FA1AFBCECD5
                                  SHA-256:A6DFD14E82D7D47195A1EC7F31E64C2820AB8721EF4B5825E21E742093B55C0E
                                  SHA-512:678E1F639379FC24919B7CF562FA19CE53363CBD4B0EAB66486F6F8D5DD5958DE3AAE8D7842EE868EFCC39D907FDC1A3ACF464E29D37B0DAEE9874C39730FE8E
                                  Malicious:true
                                  Reputation:moderate, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.202602340768788
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:Order Details.exe
                                  File size:591'360 bytes
                                  MD5:06c48ef3e45a7dafedbd596368918830
                                  SHA1:6ec2e82db6d702ddc0f4b302a4d8f02fd4c36c36
                                  SHA256:1e2333cb4fb3ecca06d22bb3b6255e5ac62b7ba43c3bceb8c17252657f34ba1e
                                  SHA512:075339ded9d2831723318812cc50ed50978548a1df7df82a57fb2cdab97a788e8ca220131fbdb24c1d5f456c089237a6561f05a01c71075352db060eec792088
                                  SSDEEP:12288:ZbRKjP7ne23gAcdtfD19UK/IBW+hb9LiRPXPgm:DKjP7e23gAcvfD1sW+Vo
                                  TLSH:7DC4BE9C2B9889F5D87645F29CF2545E7B78A90221F0E46420CB0EDDADDAF43099837F
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ... ....@.. .......................`............@................................
                                  Icon Hash:90cececece8e8eb0
                                  Entrypoint:0x491bce
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0xDA00EF84 [Sun Nov 25 02:40:04 2085 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x91b800x4b.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x920000x5a6.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x940000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x8fbd40x8fc0033e25ca7c5528830a043e61fe47164c2False0.5194616168478261data7.213000127966721IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x920000x5a60x600c474081526abd64245cfd3ae4521545eFalse0.4173177083333333data4.084105898819439IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x940000xc0x20048598e14c8fb96c5183ccca32e3b49d0False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_VERSION0x920a00x31cdata0.4296482412060301
                                  RT_MANIFEST0x923bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                  2025-01-16T02:24:00.739904+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730193.122.6.16880TCP
                                  2025-01-16T02:24:02.255513+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730193.122.6.16880TCP
                                  2025-01-16T02:24:02.848711+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449732104.21.32.1443TCP
                                  2025-01-16T02:24:03.536813+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449733193.122.6.16880TCP
                                  2025-01-16T02:24:06.855237+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449738104.21.32.1443TCP
                                  2025-01-16T02:24:08.097022+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449740104.21.32.1443TCP
                                  2025-01-16T02:24:09.347621+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449742104.21.32.1443TCP
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 16, 2025 02:23:59.845639944 CET4973080192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:23:59.850481987 CET8049730193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:23:59.850619078 CET4973080192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:23:59.852308035 CET4973080192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:23:59.857140064 CET8049730193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:00.498305082 CET8049730193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:00.504251003 CET4973080192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:00.509315014 CET8049730193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:00.694583893 CET8049730193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:00.739903927 CET4973080192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:00.749083996 CET49731443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:00.749171972 CET44349731104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:00.749631882 CET49731443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:00.804876089 CET49731443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:00.804955959 CET44349731104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:01.278129101 CET44349731104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:01.278356075 CET49731443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:01.283165932 CET49731443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:01.283221960 CET44349731104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:01.283581972 CET44349731104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:01.333765030 CET49731443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:01.896434069 CET49731443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:01.939408064 CET44349731104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:02.006443977 CET44349731104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:02.006591082 CET44349731104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:02.006769896 CET49731443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:02.012423038 CET49731443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:02.015245914 CET4973080192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:02.020207882 CET8049730193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:02.205658913 CET8049730193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:02.210061073 CET49732443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:02.210103989 CET44349732104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:02.210304976 CET49732443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:02.210602999 CET49732443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:02.210635900 CET44349732104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:02.255512953 CET4973080192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:02.700874090 CET44349732104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:02.702832937 CET49732443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:02.702914953 CET44349732104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:02.848818064 CET44349732104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:02.848972082 CET44349732104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:02.849184990 CET49732443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:02.849587917 CET49732443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:02.852876902 CET4973080192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:02.854196072 CET4973380192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:02.858442068 CET8049730193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:02.858640909 CET4973080192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:02.859606028 CET8049733193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:02.859786034 CET4973380192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:02.859786987 CET4973380192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:02.865122080 CET8049733193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:03.486785889 CET8049733193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:03.487869978 CET49734443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:03.487914085 CET44349734104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:03.487991095 CET49734443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:03.488224983 CET49734443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:03.488238096 CET44349734104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:03.536813021 CET4973380192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:03.967657089 CET44349734104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:03.969508886 CET49734443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:03.969584942 CET44349734104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:04.116931915 CET44349734104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:04.117074013 CET44349734104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:04.117192030 CET49734443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:04.117546082 CET49734443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:04.120826960 CET4973580192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:04.125796080 CET8049735193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:04.126038074 CET4973580192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:04.126038074 CET4973580192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:04.131033897 CET8049735193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:04.770755053 CET8049735193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:04.772172928 CET49736443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:04.772269011 CET44349736104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:04.772355080 CET49736443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:04.772654057 CET49736443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:04.772675037 CET44349736104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:04.818172932 CET4973580192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:05.232516050 CET44349736104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:05.233975887 CET49736443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:05.234070063 CET44349736104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:05.367386103 CET44349736104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:05.367530107 CET44349736104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:05.367702007 CET49736443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:05.367899895 CET49736443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:05.371675968 CET4973580192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:05.372214079 CET4973780192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:05.377260923 CET8049735193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:05.377440929 CET8049737193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:05.377444029 CET4973580192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:05.377522945 CET4973780192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:05.377589941 CET4973780192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:05.382911921 CET8049737193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:06.005024910 CET8049737193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:06.017859936 CET49738443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:06.017967939 CET44349738104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:06.018044949 CET49738443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:06.018255949 CET49738443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:06.018276930 CET44349738104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:06.052531004 CET4973780192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:06.660830975 CET44349738104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:06.662334919 CET49738443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:06.662415981 CET44349738104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:06.855379105 CET44349738104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:06.855539083 CET44349738104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:06.855707884 CET49738443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:06.855834961 CET49738443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:06.858599901 CET4973780192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:06.859096050 CET4973980192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:06.863949060 CET8049737193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:06.864034891 CET8049739193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:06.864058971 CET4973780192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:06.864098072 CET4973980192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:06.864165068 CET4973980192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:06.869098902 CET8049739193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:07.496551037 CET8049739193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:07.501498938 CET49740443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:07.501589060 CET44349740104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:07.501692057 CET49740443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:07.502232075 CET49740443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:07.502314091 CET44349740104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:07.540946007 CET4973980192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:07.961690903 CET44349740104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:07.963654041 CET49740443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:07.963740110 CET44349740104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:08.097086906 CET44349740104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:08.097229958 CET44349740104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:08.097470999 CET49740443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:08.097588062 CET49740443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:08.100622892 CET4973980192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:08.101541042 CET4974180192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:08.105670929 CET8049739193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:08.105734110 CET4973980192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:08.106492043 CET8049741193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:08.106698036 CET4974180192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:08.106698990 CET4974180192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:08.111675024 CET8049741193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:08.742722988 CET8049741193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:08.752826929 CET49742443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:08.752921104 CET44349742104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:08.753012896 CET49742443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:08.753458977 CET49742443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:08.753540039 CET44349742104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:08.786935091 CET4974180192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:09.210362911 CET44349742104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:09.212102890 CET49742443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:09.212188005 CET44349742104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:09.347718000 CET44349742104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:09.347877979 CET44349742104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:09.348022938 CET49742443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:09.348263979 CET49742443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:09.351396084 CET4974180192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:09.352579117 CET4974380192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:09.356555939 CET8049741193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:09.356724977 CET4974180192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:09.357469082 CET8049743193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:09.357692003 CET4974380192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:09.357692003 CET4974380192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:09.362723112 CET8049743193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:10.062796116 CET8049743193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:24:10.097768068 CET49744443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:10.097820997 CET44349744104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:10.098043919 CET49744443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:10.098232031 CET49744443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:10.098249912 CET44349744104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:10.115083933 CET4974380192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:24:10.558015108 CET44349744104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:10.559623003 CET49744443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:10.559675932 CET44349744104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:10.686152935 CET44349744104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:10.686305046 CET44349744104.21.32.1192.168.2.4
                                  Jan 16, 2025 02:24:10.686469078 CET49744443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:24:10.686784983 CET49744443192.168.2.4104.21.32.1
                                  Jan 16, 2025 02:25:08.579365015 CET8049733193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:25:08.582257032 CET4973380192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:25:15.068242073 CET8049743193.122.6.168192.168.2.4
                                  Jan 16, 2025 02:25:15.068310976 CET4974380192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:25:50.069111109 CET4974380192.168.2.4193.122.6.168
                                  Jan 16, 2025 02:25:50.074033976 CET8049743193.122.6.168192.168.2.4
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 16, 2025 02:23:59.828330040 CET5990453192.168.2.41.1.1.1
                                  Jan 16, 2025 02:23:59.835450888 CET53599041.1.1.1192.168.2.4
                                  Jan 16, 2025 02:24:00.738914013 CET5937553192.168.2.41.1.1.1
                                  Jan 16, 2025 02:24:00.746440887 CET53593751.1.1.1192.168.2.4
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jan 16, 2025 02:23:59.828330040 CET192.168.2.41.1.1.10x2628Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:00.738914013 CET192.168.2.41.1.1.10xb52aStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jan 16, 2025 02:23:59.835450888 CET1.1.1.1192.168.2.40x2628No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                  Jan 16, 2025 02:23:59.835450888 CET1.1.1.1192.168.2.40x2628No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:23:59.835450888 CET1.1.1.1192.168.2.40x2628No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:23:59.835450888 CET1.1.1.1192.168.2.40x2628No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:23:59.835450888 CET1.1.1.1192.168.2.40x2628No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:23:59.835450888 CET1.1.1.1192.168.2.40x2628No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:00.746440887 CET1.1.1.1192.168.2.40xb52aNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:00.746440887 CET1.1.1.1192.168.2.40xb52aNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:00.746440887 CET1.1.1.1192.168.2.40xb52aNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:00.746440887 CET1.1.1.1192.168.2.40xb52aNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:00.746440887 CET1.1.1.1192.168.2.40xb52aNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:00.746440887 CET1.1.1.1192.168.2.40xb52aNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                  Jan 16, 2025 02:24:00.746440887 CET1.1.1.1192.168.2.40xb52aNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                  • reallyfreegeoip.org
                                  • checkip.dyndns.org
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.449730193.122.6.16880908C:\Users\user\Desktop\Order Details.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 16, 2025 02:23:59.852308035 CET151OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Connection: Keep-Alive
                                  Jan 16, 2025 02:24:00.498305082 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:00 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                  Jan 16, 2025 02:24:00.504251003 CET127OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Jan 16, 2025 02:24:00.694583893 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:00 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                  Jan 16, 2025 02:24:02.015245914 CET127OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Jan 16, 2025 02:24:02.205658913 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:02 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.449733193.122.6.16880908C:\Users\user\Desktop\Order Details.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 16, 2025 02:24:02.859786987 CET127OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Jan 16, 2025 02:24:03.486785889 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:03 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.449735193.122.6.16880908C:\Users\user\Desktop\Order Details.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 16, 2025 02:24:04.126038074 CET151OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Connection: Keep-Alive
                                  Jan 16, 2025 02:24:04.770755053 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:04 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.449737193.122.6.16880908C:\Users\user\Desktop\Order Details.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 16, 2025 02:24:05.377589941 CET151OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Connection: Keep-Alive
                                  Jan 16, 2025 02:24:06.005024910 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:05 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.449739193.122.6.16880908C:\Users\user\Desktop\Order Details.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 16, 2025 02:24:06.864165068 CET151OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Connection: Keep-Alive
                                  Jan 16, 2025 02:24:07.496551037 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:07 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  5192.168.2.449741193.122.6.16880908C:\Users\user\Desktop\Order Details.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 16, 2025 02:24:08.106698990 CET151OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Connection: Keep-Alive
                                  Jan 16, 2025 02:24:08.742722988 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:08 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  6192.168.2.449743193.122.6.16880908C:\Users\user\Desktop\Order Details.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 16, 2025 02:24:09.357692003 CET151OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Connection: Keep-Alive
                                  Jan 16, 2025 02:24:10.062796116 CET273INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:09 GMT
                                  Content-Type: text/html
                                  Content-Length: 104
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.449731104.21.32.1443908C:\Users\user\Desktop\Order Details.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:24:01 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  Connection: Keep-Alive
                                  2025-01-16 01:24:02 UTC853INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:01 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305431
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6xMMweAAUsN0ys1BjONflGPetqFVYJndlk5Nt%2BOsIi%2BOEM9BLIkA68LIGCQS9GPgrfSnyGUcUU5zWSKQyCEUUbN1TewmcbAAVnpYAa8VwRUV4JJufww4HZSW3hjQMlfvi4bDJCMQ"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4db829b91875-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1512&min_rtt=1510&rtt_var=570&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1913499&cwnd=153&unsent_bytes=0&cid=2bc88d60ff4ec68d&ts=742&x=0"
                                  2025-01-16 01:24:02 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  1192.168.2.449732104.21.32.1443908C:\Users\user\Desktop\Order Details.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:24:02 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  2025-01-16 01:24:02 UTC855INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:02 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305431
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=okYllKn5iBczDyKuVkE9ZNuzuowNqUw6oyHh5LQWH1YMgj6hqspSyUdOU%2FXmVRgHOHbeldrDg0q7Oy%2BP58jSiQK5k1Cfts6iJJJXdnVeHhnjF8%2BMZwrNvvvG0tLXluP8Awpc31N3"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4dbd6d661875-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1481&min_rtt=1479&rtt_var=558&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1953177&cwnd=153&unsent_bytes=0&cid=7cf0f0fe4983487a&ts=158&x=0"
                                  2025-01-16 01:24:02 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  2192.168.2.449734104.21.32.1443908C:\Users\user\Desktop\Order Details.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:24:03 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  Connection: Keep-Alive
                                  2025-01-16 01:24:04 UTC861INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:04 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305433
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Eh5I1mssm5HeN4Oq8FOwueJVFPBkin4CZMRSPzTJgHiM5kvMJPSNNeg%2BGw5BAEoqGHd123nN1xkdNPCTJP%2BhrakAS0KhLcq27DN%2BG%2FCKTWJf5MF437jkT1zAiVBFnZbV4bI%2Bw%2Fez"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4dc558a941a6-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1593&min_rtt=1591&rtt_var=602&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1809169&cwnd=242&unsent_bytes=0&cid=920aaefa024ea850&ts=158&x=0"
                                  2025-01-16 01:24:04 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  3192.168.2.449736104.21.32.1443908C:\Users\user\Desktop\Order Details.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:24:05 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  Connection: Keep-Alive
                                  2025-01-16 01:24:05 UTC851INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:05 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305434
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9eDuOQbVc6rXYXwI1YqYzCh3ZF0LY21SPeR4PBYTT9LK7DYeG7waC74fBuNWemchreN7AOfbqCAfl3hFtdbsdqIebMTMqWoBFkYNkXC%2BBd50ZPFwuL97R91NPZbYti1wsErPblHw"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4dcd2f66c327-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1465&min_rtt=1462&rtt_var=554&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1965006&cwnd=189&unsent_bytes=0&cid=841fe512b54f94c3&ts=143&x=0"
                                  2025-01-16 01:24:05 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  4192.168.2.449738104.21.32.1443908C:\Users\user\Desktop\Order Details.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:24:06 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  2025-01-16 01:24:06 UTC859INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:06 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305435
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CduFQEGRWbAFPDnEQNmp97si9UpxLT6rPmXpyNIAqdKwBltBa5E3gt7qIUf%2F1ec6cMPX1UMsMomWc%2BgrQApm1vTSe9H%2FZ7fm7CXTRqgy9jr7FD%2BCFgv2PlurwGraR0c5v9xATa54"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4dd649524344-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=26234&min_rtt=1714&rtt_var=15279&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1703617&cwnd=47&unsent_bytes=0&cid=d5acf20b11b9bc60&ts=179&x=0"
                                  2025-01-16 01:24:06 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  5192.168.2.449740104.21.32.1443908C:\Users\user\Desktop\Order Details.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:24:07 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  2025-01-16 01:24:08 UTC852INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:08 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305437
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aBsXIhfAiuB0JYZIAX6hMqZAChWKRL2RIwJocAKxq8i73J9YOqfRz13xQLfaMF%2FG9yV62OpV10UcuhzJlvVl7vhG1OvGnVE21HIwEVvXym%2FtvmSiQIlU9mAK3rznF7yqZspNXmUR"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4dde3a634344-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1708&min_rtt=1687&rtt_var=648&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1730883&cwnd=47&unsent_bytes=0&cid=c311c2743693b3de&ts=143&x=0"
                                  2025-01-16 01:24:08 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  6192.168.2.449742104.21.32.1443908C:\Users\user\Desktop\Order Details.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:24:09 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  2025-01-16 01:24:09 UTC859INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:09 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305438
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XFrmxzNHEj%2BLlf5jHnTHYTljPfd%2F%2Bte1J2j2SRPdcceQGL0bnvSbTza1M%2F2ofXGIiLieQHzyQXo5jFWDzTW0JIWoLy6ol0jCslNPP7IeW8Kq0tCBFPPmdYBQunR7LFnzrOW0m%2BK7"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4de60fcf72b9-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1796&min_rtt=1793&rtt_var=675&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1628555&cwnd=217&unsent_bytes=0&cid=501c5cae3f989d7d&ts=141&x=0"
                                  2025-01-16 01:24:09 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  7192.168.2.449744104.21.32.1443908C:\Users\user\Desktop\Order Details.exe
                                  TimestampBytes transferredDirectionData
                                  2025-01-16 01:24:10 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                  Host: reallyfreegeoip.org
                                  Connection: Keep-Alive
                                  2025-01-16 01:24:10 UTC851INHTTP/1.1 200 OK
                                  Date: Thu, 16 Jan 2025 01:24:10 GMT
                                  Content-Type: text/xml
                                  Content-Length: 362
                                  Connection: close
                                  Age: 2305439
                                  Cache-Control: max-age=31536000
                                  cf-cache-status: HIT
                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SYlPnI6v9jvh37RY6iKNMTHdpcZ16OBoplUKbox2zZRBzGSKWC5sEZJYMxRKKnW6Kd4Ofd5DsDYvFBDj6XjY2scQA7fwKRTenD4yEXiqnP1Z%2FiI0CXyPWGNopkQlU7rlMXX3BsC3"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 902a4dee7edb41a6-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1652&min_rtt=1587&rtt_var=642&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1839949&cwnd=242&unsent_bytes=0&cid=d0c51d8c22148a48&ts=136&x=0"
                                  2025-01-16 01:24:10 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:20:23:58
                                  Start date:15/01/2025
                                  Path:C:\Users\user\Desktop\Order Details.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\Order Details.exe"
                                  Imagebase:0x590000
                                  File size:591'360 bytes
                                  MD5 hash:06C48EF3E45A7DAFEDBD596368918830
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: MALWARE_Win_DLInjector02, Description: Detects downloader injector, Source: 00000000.00000002.1679581061.0000000004FF0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.1678770489.0000000003986000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:20:23:58
                                  Start date:15/01/2025
                                  Path:C:\Users\user\Desktop\Order Details.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\Order Details.exe"
                                  Imagebase:0xf50000
                                  File size:591'360 bytes
                                  MD5 hash:06C48EF3E45A7DAFEDBD596368918830
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                  • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000001.00000002.4155374471.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4156338198.000000000351C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000001.00000002.4156338198.0000000003351000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:5.8%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:76%
                                    Total number of Nodes:25
                                    Total number of Limit Nodes:1
                                    execution_graph 11724 27bad88 11725 27bada2 11724->11725 11726 27badf2 11725->11726 11728 27bae48 11725->11728 11730 27bae7b 11728->11730 11748 27b9f3c 11730->11748 11731 27bb052 11732 27b9f48 Wow64GetThreadContext 11731->11732 11733 27bb14c 11731->11733 11732->11733 11734 27b9f60 ReadProcessMemory 11733->11734 11735 27bb22c 11734->11735 11744 27bab78 VirtualAllocEx 11735->11744 11736 27bb349 11743 27baa20 WriteProcessMemory 11736->11743 11737 27bb628 11742 27baa20 WriteProcessMemory 11737->11742 11738 27bb42d 11738->11737 11745 27baa20 WriteProcessMemory 11738->11745 11739 27bb666 11740 27bb74e 11739->11740 11747 27ba8f8 Wow64SetThreadContext 11739->11747 11746 27bac98 ResumeThread 11740->11746 11741 27bb80b 11741->11725 11742->11739 11743->11738 11744->11736 11745->11738 11746->11741 11747->11740 11749 27bb978 CreateProcessW 11748->11749 11751 27bbb5e 11749->11751

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 45 27bae48-27bae79 46 27bae7b 45->46 47 27bae80-27bb006 45->47 46->47 54 27bb008-27bb02c 47->54 55 27bb02d-27bb072 call 27b9f3c 47->55 54->55 59 27bb09b-27bb105 55->59 60 27bb074-27bb090 55->60 66 27bb10c-27bb138 59->66 67 27bb107 59->67 60->59 69 27bb13a-27bb147 call 27b9f48 66->69 70 27bb199-27bb1cb call 27b9f54 66->70 67->66 74 27bb14c-27bb16c 69->74 75 27bb1cd-27bb1e9 70->75 76 27bb1f4 70->76 77 27bb16e-27bb18a 74->77 78 27bb195-27bb197 74->78 75->76 79 27bb1f5-27bb1ff 76->79 77->78 78->79 81 27bb201 79->81 82 27bb206-27bb24c call 27b9f60 79->82 81->82 88 27bb24e-27bb26a 82->88 89 27bb275-27bb28e 82->89 88->89 90 27bb290-27bb2bc call 27b9f6c 89->90 91 27bb2e6-27bb35e call 27bab78 89->91 97 27bb2be-27bb2da 90->97 98 27bb2e5 90->98 102 27bb373-27bb375 91->102 103 27bb360-27bb371 91->103 97->98 98->91 105 27bb37b-27bb38f 102->105 103->105 106 27bb3cc-27bb3e3 105->106 107 27bb391-27bb3cb 105->107 108 27bb40c-27bb44d call 27baa20 106->108 109 27bb3e5-27bb401 106->109 107->106 113 27bb44f-27bb46b 108->113 114 27bb476-27bb4ab 108->114 109->108 113->114 118 27bb603-27bb622 114->118 119 27bb628-27bb686 call 27baa20 118->119 120 27bb4b0-27bb534 118->120 126 27bb688-27bb6a4 119->126 127 27bb6af-27bb6e2 119->127 130 27bb53a-27bb5ac call 27baa20 120->130 131 27bb5f8-27bb5fd 120->131 126->127 133 27bb6ec-27bb6ff 127->133 134 27bb6e4-27bb6eb 127->134 144 27bb5ae-27bb5ce 130->144 131->118 136 27bb701 133->136 137 27bb706-27bb731 133->137 134->133 136->137 141 27bb79b-27bb7cd call 27b9f78 137->141 142 27bb733-27bb74c call 27ba8f8 137->142 149 27bb7cf-27bb7eb 141->149 150 27bb7f6 141->150 146 27bb74e-27bb76e 142->146 147 27bb5d0-27bb5ec 144->147 148 27bb5f7 144->148 151 27bb770-27bb78c 146->151 152 27bb797-27bb799 146->152 147->148 148->131 149->150 153 27bb7f7-27bb809 call 27bac98 150->153 151->152 152->153 157 27bb80b-27bb82b 153->157 159 27bb82d-27bb849 157->159 160 27bb854-27bb95d 157->160 159->160
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1678548090.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_27b0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (
                                    • API String ID: 0-3887548279
                                    • Opcode ID: b97f410858cea4e43f332bb78b2555bc268d7c9390ef4fcb084de19f6d50d593
                                    • Instruction ID: 27d4e4ff880fe4f214a36ad34ab820b85591d207edeb08c33239af3bdb2a998b
                                    • Opcode Fuzzy Hash: b97f410858cea4e43f332bb78b2555bc268d7c9390ef4fcb084de19f6d50d593
                                    • Instruction Fuzzy Hash: 9352E170D01228CFDB65DF65C984BEDBBB2BF89304F1081EA9509AB295DB349E85CF41

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 173 27b9f3c-27bba03 175 27bba1a-27bba28 173->175 176 27bba05-27bba17 173->176 177 27bba2a-27bba3c 175->177 178 27bba3f-27bba7b 175->178 176->175 177->178 179 27bba8f-27bbb5c CreateProcessW 178->179 180 27bba7d-27bba8c 178->180 184 27bbb5e-27bbb64 179->184 185 27bbb65-27bbc24 179->185 180->179 184->185 195 27bbc5a-27bbc65 185->195 196 27bbc26-27bbc4f 185->196 196->195
                                    APIs
                                    • CreateProcessW.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 027BBB49
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1678548090.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_27b0000_Order Details.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 9082a8900d425961c66877e74c9abdde015d15c073b0f9cf7b65e636ecc605e6
                                    • Instruction ID: b87c0a89f6ef4b2344140cd33d286dbe82dcffd91bde970d17d8b93d79366b9d
                                    • Opcode Fuzzy Hash: 9082a8900d425961c66877e74c9abdde015d15c073b0f9cf7b65e636ecc605e6
                                    • Instruction Fuzzy Hash: 7181C174D00259DFDB21CFA9C980BEDBBF5AF09304F1490AAE908B7220DB709A85CF54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 200 27baa20-27baa8b 202 27baa8d-27baa9f 200->202 203 27baaa2-27bab03 WriteProcessMemory 200->203 202->203 205 27bab0c-27bab5e 203->205 206 27bab05-27bab0b 203->206 206->205
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 027BAAF3
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1678548090.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_27b0000_Order Details.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: a98daa86881a7bf780bc4034ba8c19bf4d9b71ddfabde6cecca6cbe00f96f911
                                    • Instruction ID: db6a159b6d3fcbe9c7d1ac52948bfbf04ca58013fb127bcd1cb1ef41a3a449cc
                                    • Opcode Fuzzy Hash: a98daa86881a7bf780bc4034ba8c19bf4d9b71ddfabde6cecca6cbe00f96f911
                                    • Instruction Fuzzy Hash: 574199B5D012589FCB00DFA9D984ADEFBF1BF49314F20902AE818B7210D735AA45CF68

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 211 27b9f60-27bbe65 ReadProcessMemory 213 27bbe6e-27bbeac 211->213 214 27bbe67-27bbe6d 211->214 214->213
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 027BBE55
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1678548090.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_27b0000_Order Details.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: 1c8d8c844644f4f80d32d08adf5c096695ef657522fb5a4945e21848a2fa8812
                                    • Instruction ID: f1fb3fe55ac13abab187ac3fcee33cdf5dc1ac72c509ca01e1fb239c483225f4
                                    • Opcode Fuzzy Hash: 1c8d8c844644f4f80d32d08adf5c096695ef657522fb5a4945e21848a2fa8812
                                    • Instruction Fuzzy Hash: AB4176B9D04258DFCF10CFAAD984ADEFBB5BB19314F10A06AE914B7210D335A945CF64

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 217 27bab78-27bac32 VirtualAllocEx 220 27bac3b-27bac85 217->220 221 27bac34-27bac3a 217->221 221->220
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 027BAC22
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1678548090.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_27b0000_Order Details.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 84eecbcd8f5150981859709db5bd8cea706f1250eae145899c35a5390aa3478e
                                    • Instruction ID: d980b85f3463e81f6f20611e889d00f019eb325069d302349183984d7d544d92
                                    • Opcode Fuzzy Hash: 84eecbcd8f5150981859709db5bd8cea706f1250eae145899c35a5390aa3478e
                                    • Instruction Fuzzy Hash: 7331A6B8D002589FCF10CFA9D980ADEFBB5BF49310F10A42AE814B7210D735A945CF68

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 226 27ba8f8-27ba958 228 27ba95a-27ba96c 226->228 229 27ba96f-27ba9b7 Wow64SetThreadContext 226->229 228->229 231 27ba9b9-27ba9bf 229->231 232 27ba9c0-27baa0c 229->232 231->232
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 027BA9A7
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1678548090.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_27b0000_Order Details.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 4336a508bd9c56795809c6f0d7efb43b2f59621f63151864b241a97925bf9d9e
                                    • Instruction ID: 4444bd958633dc63ab21962c0011f4d1680dc3fb90c340d284888ffa10ad5c25
                                    • Opcode Fuzzy Hash: 4336a508bd9c56795809c6f0d7efb43b2f59621f63151864b241a97925bf9d9e
                                    • Instruction Fuzzy Hash: FF31ACB5D012589FCB10DFA9D984AEEFBF1BF49314F14802AE454B7250D738A989CF54

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 237 27b9f48-27bbcf4 239 27bbd0b-27bbd52 Wow64GetThreadContext 237->239 240 27bbcf6-27bbd08 237->240 241 27bbd5b-27bbd93 239->241 242 27bbd54-27bbd5a 239->242 240->239 242->241
                                    APIs
                                    • Wow64GetThreadContext.KERNEL32(?,?), ref: 027BBD42
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1678548090.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_27b0000_Order Details.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 8ae4dd9672b5984c8d9e1f390264e278b54c38df037896299038269c64ab044c
                                    • Instruction ID: dd20c5a72e996b280f0178c6be3818a5e089cab105c10421cc4bb5edb0b85647
                                    • Opcode Fuzzy Hash: 8ae4dd9672b5984c8d9e1f390264e278b54c38df037896299038269c64ab044c
                                    • Instruction Fuzzy Hash: 32319AB5D012589FCB10CFAAD584ADEFBF1BF49314F24906AE818B7210D378A945CFA4

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 245 27bac98-27bad26 ResumeThread 248 27bad28-27bad2e 245->248 249 27bad2f-27bad71 245->249 248->249
                                    APIs
                                    • ResumeThread.KERNELBASE(?), ref: 027BAD16
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1678548090.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_27b0000_Order Details.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: d6999d0867a846d129afe75eeabca9b80000afe906f1325e49a4006cdefd366c
                                    • Instruction ID: d31236c2b4b28246a694087b141501496c133623e848cea09ae738b4da938cd0
                                    • Opcode Fuzzy Hash: d6999d0867a846d129afe75eeabca9b80000afe906f1325e49a4006cdefd366c
                                    • Instruction Fuzzy Hash: 5D31C9B4D002189FCB10DFAAD984ADEFBB4AF49314F10842AE818B7210CB35A845CF98
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1677773641.0000000000CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CFD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_cfd000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cdf5d2e2483d0dc1df63d932d20866f29fd4d7447e238246ef30808d4cda5061
                                    • Instruction ID: 770e45d824eb67ea0dd6655e463e1c5355ff793053797f7f0842610822b8162d
                                    • Opcode Fuzzy Hash: cdf5d2e2483d0dc1df63d932d20866f29fd4d7447e238246ef30808d4cda5061
                                    • Instruction Fuzzy Hash: BA2125B1500208DFCB45DF14D9C4B26BF66FB98314F208969FA0E8B256C336D856CAA2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 315 cfd4fc-cfd50e 316 cfd514 315->316 317 cfd5a2-cfd5a9 315->317 318 cfd516-cfd522 316->318 317->318 320 cfd5ae-cfd5b3 318->320 321 cfd528-cfd54a 318->321 320->321 322 cfd54c-cfd56a 321->322 323 cfd5b8-cfd5cd 321->323 326 cfd572-cfd582 322->326 327 cfd584-cfd58c 323->327 326->327 328 cfd5da 326->328 329 cfd5cf-cfd5d8 327->329 330 cfd58e-cfd59f 327->330 329->330
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1677773641.0000000000CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CFD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_cfd000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 01faffe8cbdddc2ba3541aa20aef2d44f106c677e888c06ff757c4cfa9bcd6ea
                                    • Instruction ID: 912231ae6afa7664f39f1167d8ef5ecee543e4ead7967ddd4d162548c0ddcb20
                                    • Opcode Fuzzy Hash: 01faffe8cbdddc2ba3541aa20aef2d44f106c677e888c06ff757c4cfa9bcd6ea
                                    • Instruction Fuzzy Hash: 092125B1504208DFCB45DF14D9C0B37BF66FB98318F20C569EA0A4B256C336D956DBA2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1677773641.0000000000CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CFD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_cfd000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction ID: 4c69b0fa2308c39b0f9e9fbd7f15573b73ed50f8778002633db4488138757011
                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction Fuzzy Hash: D411D376504244CFCB16CF14D9C4B26BF72FB94314F24C5A9E90A4B256C336D95ACBA2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1677773641.0000000000CFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CFD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_cfd000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction ID: 5b963895fc3705c9dba3c37afa1ad8ff1e9c4e463a020edc999ee4ae9505ef2d
                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction Fuzzy Hash: 1811E6B6504244CFCB06DF10D5C4B26BF72FB94314F24C6A9DD0A0B256C336D95ACBA2
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1678548090.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_27b0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 704c4f25616f2b3cf4cefde79bb6a877eb5caa506d723a001d8b1a81db67d92a
                                    • Instruction ID: cc7acfab94b7efb6ae17a92b62dc15bfe1be97956f9a842972fbed364a84ca53
                                    • Opcode Fuzzy Hash: 704c4f25616f2b3cf4cefde79bb6a877eb5caa506d723a001d8b1a81db67d92a
                                    • Instruction Fuzzy Hash: CE11AFC6C6BEA44BE7270576C86A3C11B96CF7B188F0493D6D1B88A5E7E5C840CBC252

                                    Execution Graph

                                    Execution Coverage:11.3%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:37.9%
                                    Total number of Nodes:29
                                    Total number of Limit Nodes:2
                                    execution_graph 26719 19aced8 26720 19acee4 26719->26720 26727 5edcaa0 26720->26727 26731 5edca90 26720->26731 26721 19acfc2 26736 6fb8608 26721->26736 26741 6fb8602 26721->26741 26722 19ad0b7 26728 5edcac2 26727->26728 26730 5edcb8c 26728->26730 26746 5ed7d90 26728->26746 26730->26721 26732 5edca71 26731->26732 26733 5edca9e 26731->26733 26732->26721 26734 5ed7d90 LdrInitializeThunk 26733->26734 26735 5edcb8c 26733->26735 26734->26735 26735->26721 26737 6fb862a 26736->26737 26738 6fb873c 26737->26738 26740 5ed7d90 LdrInitializeThunk 26737->26740 26750 5ed8174 26737->26750 26738->26722 26740->26738 26742 6fb862a 26741->26742 26743 6fb873c 26742->26743 26744 5ed8174 LdrInitializeThunk 26742->26744 26745 5ed7d90 LdrInitializeThunk 26742->26745 26743->26722 26744->26743 26745->26743 26749 5ed7dc1 26746->26749 26747 5ed7f21 26747->26730 26748 5ed82b1 LdrInitializeThunk 26748->26747 26749->26747 26749->26748 26752 5ed802b 26750->26752 26751 5ed82b1 LdrInitializeThunk 26753 5ed82c9 26751->26753 26752->26751 26753->26738

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 158 19a6730-19a6766 159 19a676e-19a6774 158->159 298 19a6768 call 19a6108 158->298 299 19a6768 call 19a6730 158->299 300 19a6768 call 19a6880 158->300 160 19a6776-19a677a 159->160 161 19a67c4-19a67c8 159->161 162 19a6789-19a6790 160->162 163 19a677c-19a6781 160->163 164 19a67ca-19a67d9 161->164 165 19a67df-19a67f3 161->165 169 19a6866-19a6872 162->169 170 19a6796-19a679d 162->170 163->162 166 19a67db-19a67dd 164->166 167 19a6805-19a680f 164->167 168 19a67fb-19a6802 165->168 296 19a67f5 call 19a9858 165->296 297 19a67f5 call 19a9853 165->297 166->168 171 19a6819-19a681d 167->171 172 19a6811-19a6817 167->172 179 19a6879-19a687a 169->179 180 19a6874-19a6878 169->180 170->161 173 19a679f-19a67a3 170->173 174 19a6825-19a685f 171->174 176 19a681f 171->176 172->174 177 19a67b2-19a67b9 173->177 178 19a67a5-19a67aa 173->178 174->169 176->174 177->169 181 19a67bf-19a67c2 177->181 178->177 182 19a687c 179->182 183 19a6881-19a68a3 179->183 180->179 181->168 182->183 185 19a68ae-19a68ce 183->185 186 19a68a5-19a68ab 183->186 192 19a68d0 185->192 193 19a68d5-19a68dc 185->193 186->185 194 19a6c64-19a6c6d 192->194 195 19a68de-19a68e9 193->195 197 19a68ef-19a6902 195->197 198 19a6c75-19a6c92 195->198 201 19a6918-19a6933 197->201 202 19a6904-19a6912 197->202 205 19a6c99-19a6c9a 198->205 206 19a6c94-19a6c98 198->206 211 19a6957-19a695a 201->211 212 19a6935-19a693b 201->212 202->201 208 19a6bec-19a6bf3 202->208 209 19a6c9c-19a6c9e 205->209 210 19a6ca1-19a6cb1 205->210 206->205 208->194 217 19a6bf5-19a6bf7 208->217 234 19a6cba-19a6cbe 210->234 235 19a6cb3-19a6cb8 210->235 213 19a6960-19a6963 211->213 214 19a6ab4-19a6aba 211->214 215 19a693d 212->215 216 19a6944-19a6947 212->216 213->214 224 19a6969-19a696f 213->224 222 19a6ac0-19a6ac5 214->222 223 19a6ba6-19a6ba9 214->223 215->214 215->216 218 19a697a-19a6980 215->218 215->223 216->218 219 19a6949-19a694c 216->219 220 19a6bf9-19a6bfe 217->220 221 19a6c06-19a6c0c 217->221 230 19a6982-19a6984 218->230 231 19a6986-19a6988 218->231 226 19a6952 219->226 227 19a69e6-19a69ec 219->227 220->221 221->198 228 19a6c0e-19a6c13 221->228 222->223 232 19a6baf-19a6bb5 223->232 233 19a6c70 223->233 224->214 229 19a6975 224->229 226->223 227->223 239 19a69f2-19a69f8 227->239 237 19a6c58-19a6c5b 228->237 238 19a6c15-19a6c1a 228->238 229->223 240 19a6992-19a699b 230->240 231->240 241 19a6bda-19a6bde 232->241 242 19a6bb7-19a6bbf 232->242 233->198 236 19a6cc4-19a6cc5 234->236 235->236 237->233 243 19a6c5d-19a6c62 237->243 238->233 244 19a6c1c 238->244 245 19a69fa-19a69fc 239->245 246 19a69fe-19a6a00 239->246 248 19a69ae-19a69d6 240->248 249 19a699d-19a69a8 240->249 241->208 250 19a6be0-19a6be6 241->250 242->198 247 19a6bc5-19a6bd4 242->247 243->194 243->217 251 19a6c23-19a6c28 244->251 252 19a6a0a-19a6a21 245->252 246->252 247->201 247->241 270 19a6aca-19a6b00 248->270 271 19a69dc-19a69e1 248->271 249->223 249->248 250->195 250->208 254 19a6c4a-19a6c4c 251->254 255 19a6c2a-19a6c2c 251->255 264 19a6a4c-19a6a73 252->264 265 19a6a23-19a6a3c 252->265 254->233 261 19a6c4e-19a6c51 254->261 258 19a6c3b-19a6c41 255->258 259 19a6c2e-19a6c33 255->259 258->198 263 19a6c43-19a6c48 258->263 259->258 261->237 263->254 266 19a6c1e-19a6c21 263->266 264->233 276 19a6a79-19a6a7c 264->276 265->270 274 19a6a42-19a6a47 265->274 266->233 266->251 277 19a6b0d-19a6b15 270->277 278 19a6b02-19a6b06 270->278 271->270 274->270 276->233 279 19a6a82-19a6aab 276->279 277->233 282 19a6b1b-19a6b20 277->282 280 19a6b08-19a6b0b 278->280 281 19a6b25-19a6b29 278->281 279->270 294 19a6aad-19a6ab2 279->294 280->277 280->281 283 19a6b2b-19a6b31 281->283 284 19a6b48-19a6b4c 281->284 282->223 283->284 288 19a6b33-19a6b3b 283->288 286 19a6b4e-19a6b54 284->286 287 19a6b56-19a6b75 call 19a6e58 284->287 286->287 289 19a6b7b-19a6b7f 286->289 287->289 288->233 290 19a6b41-19a6b46 288->290 289->223 292 19a6b81-19a6b9d 289->292 290->223 292->223 294->270 296->168 297->168 298->159 299->159 300->159
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (o^q$(o^q$,bq$,bq
                                    • API String ID: 0-879173519
                                    • Opcode ID: e9c2b18ce3fde3a18258a4afa7543500df6db4acbbd6193393285102a883893c
                                    • Instruction ID: 235d5a288f907ed10f17f78fbcdf23b2c5a241645c6458bbd39d8a41ca30ba36
                                    • Opcode Fuzzy Hash: e9c2b18ce3fde3a18258a4afa7543500df6db4acbbd6193393285102a883893c
                                    • Instruction Fuzzy Hash: 36028271E00205DFCB15CF6DC988AADBBBAFF88301F598469E519AB261D730DC45CB91
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (o^q$4'^q
                                    • API String ID: 0-273632683
                                    • Opcode ID: 9dcc91d5d48a1c63f4699cce9ca0b3239642e79d238710e1215a72c02367bbe4
                                    • Instruction ID: 781deba95cbf1c62516c7c9d2522e5cad731e9f2657f13d5a852b241509dc52e
                                    • Opcode Fuzzy Hash: 9dcc91d5d48a1c63f4699cce9ca0b3239642e79d238710e1215a72c02367bbe4
                                    • Instruction Fuzzy Hash: F3729371A00209DFCB15CF68C984AAEBBF6FF88305F558559E9099B3A1D731EC49CB90
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (o^q$Hbq
                                    • API String ID: 0-662517225
                                    • Opcode ID: a7fe8403e15c443d4646ad2a71c6fc64058c3599eba30f7b6d8a6054b99c3314
                                    • Instruction ID: 13bff3c4afad3fd9ac0567a61245643f6e6dc6f4757c38e4eb9f17199857a901
                                    • Opcode Fuzzy Hash: a7fe8403e15c443d4646ad2a71c6fc64058c3599eba30f7b6d8a6054b99c3314
                                    • Instruction Fuzzy Hash: 90129D70A002199FDB15DF69C894AAEBBFAFF88300F548569E509DB391DF349C85CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2002 19a3573-19a358d 2003 19a358f-19a3591 2002->2003 2004 19a3596-19a35a6 2002->2004 2005 19a3834-19a383b 2003->2005 2006 19a35a8 2004->2006 2007 19a35ad-19a35bd 2004->2007 2006->2005 2009 19a381b-19a3829 2007->2009 2010 19a35c3-19a35d1 2007->2010 2013 19a383c-19a3922 2009->2013 2015 19a382b-19a382f call 19a02c8 2009->2015 2010->2013 2014 19a35d7 2010->2014 2091 19a3929-19a3a31 call 19a0828 call 19a1e28 call 19a1e38 call 19a1e48 call 19a02e4 2013->2091 2092 19a3924 2013->2092 2014->2013 2016 19a36da-19a3702 2014->2016 2017 19a361b-19a363d 2014->2017 2018 19a35de-19a35f0 2014->2018 2019 19a3776-19a379c 2014->2019 2020 19a36b4-19a36d5 2014->2020 2021 19a3734-19a3771 2014->2021 2022 19a35f5-19a3616 2014->2022 2023 19a3668-19a3689 2014->2023 2024 19a368e-19a36af 2014->2024 2025 19a37cf-19a37ea call 19a02d8 2014->2025 2026 19a380f-19a3819 2014->2026 2027 19a37ec-19a380d call 19a2060 2014->2027 2028 19a3642-19a3663 2014->2028 2029 19a37a1-19a37cd 2014->2029 2030 19a3707-19a372f 2014->2030 2015->2005 2016->2005 2017->2005 2018->2005 2019->2005 2020->2005 2021->2005 2022->2005 2023->2005 2024->2005 2025->2005 2026->2005 2027->2005 2028->2005 2029->2005 2030->2005 2110 19a3a37-19a3ac7 2091->2110 2092->2091
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Xbq$$^q
                                    • API String ID: 0-1593437937
                                    • Opcode ID: 3053691cc0ca45f8af29241cb6bb2650ad6a2cb7567a6d3e42297744d7d4f92a
                                    • Instruction ID: 9908d35ab16fddbc32480cdee27da9656987e60e92f2aa0d2394cdb38b1db399
                                    • Opcode Fuzzy Hash: 3053691cc0ca45f8af29241cb6bb2650ad6a2cb7567a6d3e42297744d7d4f92a
                                    • Instruction Fuzzy Hash: 43F16D74E01258DFCB18DFB8D8549AEBBB6BFC8700F548569E40AA7358CF359806CB81

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2118 19ab328-19ab33b 2120 19ab47a-19ab481 2118->2120 2121 19ab341-19ab34a 2118->2121 2122 19ab350-19ab354 2121->2122 2123 19ab484 2121->2123 2124 19ab36e-19ab375 2122->2124 2125 19ab356 2122->2125 2127 19ab489-19ab491 2123->2127 2124->2120 2128 19ab37b-19ab388 2124->2128 2126 19ab359-19ab364 2125->2126 2126->2123 2129 19ab36a-19ab36c 2126->2129 2132 19ab512-19ab520 2127->2132 2133 19ab493-19ab49a 2127->2133 2128->2120 2134 19ab38e-19ab3a1 2128->2134 2129->2124 2129->2126 2139 19ab522 2132->2139 2140 19ab527-19ab577 2132->2140 2135 19ab49c 2133->2135 2136 19ab4a1-19ab4b0 2133->2136 2137 19ab3a3 2134->2137 2138 19ab3a6-19ab3ae 2134->2138 2135->2136 2141 19ab4dc 2136->2141 2142 19ab4b2-19ab4ca 2136->2142 2137->2138 2143 19ab41b-19ab41d 2138->2143 2144 19ab3b0-19ab3b6 2138->2144 2139->2140 2155 19ab57a-19ab604 call 19a3908 call 19a3428 2140->2155 2145 19ab4de-19ab4e2 2141->2145 2159 19ab4cc-19ab4d1 2142->2159 2160 19ab4d3-19ab4d6 2142->2160 2143->2120 2146 19ab41f-19ab425 2143->2146 2144->2143 2147 19ab3b8-19ab3be 2144->2147 2146->2120 2150 19ab427-19ab431 2146->2150 2147->2127 2151 19ab3c4-19ab3dc 2147->2151 2150->2127 2153 19ab433-19ab44b 2150->2153 2166 19ab409-19ab40c 2151->2166 2167 19ab3de-19ab3e4 2151->2167 2169 19ab44d-19ab453 2153->2169 2170 19ab470-19ab473 2153->2170 2188 19ab60b-19ab62c call 19a4dc8 2155->2188 2189 19ab606 2155->2189 2159->2145 2161 19ab4d8-19ab4da 2160->2161 2162 19ab4e3-19ab4f6 2160->2162 2161->2141 2161->2142 2176 19ab4f8-19ab4f9 2162->2176 2177 19ab4fd-19ab510 2162->2177 2166->2123 2174 19ab40e-19ab411 2166->2174 2167->2127 2171 19ab3ea-19ab3fe 2167->2171 2169->2127 2175 19ab455-19ab469 2169->2175 2170->2123 2178 19ab475-19ab478 2170->2178 2171->2127 2184 19ab404 2171->2184 2174->2123 2179 19ab413-19ab419 2174->2179 2175->2127 2185 19ab46b 2175->2185 2176->2155 2181 19ab4fb 2176->2181 2177->2132 2178->2120 2178->2150 2179->2143 2179->2144 2181->2177 2184->2166 2185->2170 2191 19ab631-19ab63c 2188->2191 2189->2188 2192 19ab63e 2191->2192 2193 19ab643-19ab647 2191->2193 2192->2193 2194 19ab649-19ab64a 2193->2194 2195 19ab64c-19ab653 2193->2195 2196 19ab66b-19ab6af 2194->2196 2197 19ab65a-19ab668 2195->2197 2198 19ab655 2195->2198 2202 19ab715-19ab72c 2196->2202 2197->2196 2198->2197 2204 19ab72e-19ab753 2202->2204 2205 19ab6b1-19ab6c7 2202->2205 2211 19ab76b 2204->2211 2212 19ab755-19ab76a 2204->2212 2209 19ab6c9-19ab6d5 2205->2209 2210 19ab6f1 2205->2210 2213 19ab6df-19ab6e5 2209->2213 2214 19ab6d7-19ab6dd 2209->2214 2215 19ab6f7-19ab714 2210->2215 2218 19ab76c 2211->2218 2212->2211 2216 19ab6ef 2213->2216 2214->2216 2215->2202 2216->2215 2218->2218
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PH^q$PH^q
                                    • API String ID: 0-1598597984
                                    • Opcode ID: cd453171e20e4bf3ced8d945789a8b5ae6395f9bd4e03836fdb068f550c8e853
                                    • Instruction ID: 328848a30dd4ea43882b8792c71365e963798f4183f33676efc1d3e057eda526
                                    • Opcode Fuzzy Hash: cd453171e20e4bf3ced8d945789a8b5ae6395f9bd4e03836fdb068f550c8e853
                                    • Instruction Fuzzy Hash: 97E10771A00218CFDB14CFA9D884A9DBBF6FF48711F558069E809AB361DB30AC85CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2727 19ac470-19ac472 2728 19ac479-19ac47a 2727->2728 2729 19ac474 2727->2729 2730 19ac47c 2728->2730 2731 19ac481-19ac4a0 2728->2731 2732 19ac3f6-19ac40c 2729->2732 2733 19ac476 2729->2733 2734 19ac47d-19ac480 2730->2734 2735 19ac4a2 2731->2735 2736 19ac4a7-19ac4ef 2731->2736 2732->2727 2733->2734 2738 19ac478 2733->2738 2734->2731 2735->2736 2741 19ac4f7-19ac506 call 19a3908 2736->2741 2738->2728 2743 19ac50b-19ac584 call 19a3428 2741->2743 2749 19ac58b-19ac5ac call 19a4dc8 2743->2749 2750 19ac586 2743->2750 2752 19ac5b1-19ac5bc 2749->2752 2750->2749 2753 19ac5be 2752->2753 2754 19ac5c3-19ac5c7 2752->2754 2753->2754 2755 19ac5c9-19ac5ca 2754->2755 2756 19ac5cc-19ac5d3 2754->2756 2757 19ac5eb-19ac62f 2755->2757 2758 19ac5da-19ac5e8 2756->2758 2759 19ac5d5 2756->2759 2763 19ac695-19ac6ac 2757->2763 2758->2757 2759->2758 2765 19ac6ae-19ac6d3 2763->2765 2766 19ac631-19ac647 2763->2766 2773 19ac6eb-19ac758 2765->2773 2774 19ac6d5-19ac6d8 2765->2774 2770 19ac649-19ac655 2766->2770 2771 19ac671 2766->2771 2775 19ac65f-19ac665 2770->2775 2776 19ac657-19ac65d 2770->2776 2772 19ac677-19ac694 2771->2772 2772->2763 2777 19ac6dd-19ac6ea 2773->2777 2784 19ac75a 2773->2784 2774->2777 2778 19ac66f 2775->2778 2776->2778 2777->2773 2778->2772 2785 19ac75c-19ac75f 2784->2785 2786 19ac761-19ac780 2784->2786 2785->2786 2787 19ac782 2786->2787 2788 19ac787-19ac7cf 2786->2788 2787->2788 2790 19ac7d7-19ac7e6 call 19a3908 2788->2790 2792 19ac7eb-19ac864 call 19a3428 2790->2792 2798 19ac86b-19ac88c call 19a4dc8 2792->2798 2799 19ac866 2792->2799 2801 19ac891-19ac89c 2798->2801 2799->2798 2802 19ac89e 2801->2802 2803 19ac8a3-19ac8a7 2801->2803 2802->2803 2804 19ac8a9-19ac8aa 2803->2804 2805 19ac8ac-19ac8b3 2803->2805 2806 19ac8cb-19ac90f 2804->2806 2807 19ac8ba-19ac8c8 2805->2807 2808 19ac8b5 2805->2808 2812 19ac975-19ac98c 2806->2812 2807->2806 2808->2807 2814 19ac98e-19ac9b3 2812->2814 2815 19ac911-19ac927 2812->2815 2824 19ac9cb 2814->2824 2825 19ac9b5-19ac9ca 2814->2825 2819 19ac929-19ac935 2815->2819 2820 19ac951 2815->2820 2821 19ac93f-19ac945 2819->2821 2822 19ac937-19ac93d 2819->2822 2823 19ac957-19ac974 2820->2823 2826 19ac94f 2821->2826 2822->2826 2823->2812 2825->2824 2826->2823
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PH^q$PH^q
                                    • API String ID: 0-1598597984
                                    • Opcode ID: f20d0368e7b85c0d95ae0bfc903955159c5063ac39839973e59d081b18b39a63
                                    • Instruction ID: 7685786a1f7a94a48bd2899a9f59976a57ea908d41c7eea85aff8974defd66eb
                                    • Opcode Fuzzy Hash: f20d0368e7b85c0d95ae0bfc903955159c5063ac39839973e59d081b18b39a63
                                    • Instruction Fuzzy Hash: 3C91D474E00208CFDB14CFA9D884A9DBBF6BF89311F54D469E809AB365DB34A945CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2830 19ac753-19ac758 2831 19ac75a 2830->2831 2832 19ac6dd-19ac6ec 2830->2832 2833 19ac75c-19ac75f 2831->2833 2834 19ac761-19ac780 2831->2834 2832->2830 2833->2834 2835 19ac782 2834->2835 2836 19ac787-19ac7cf 2834->2836 2835->2836 2841 19ac7d7-19ac7e6 call 19a3908 2836->2841 2844 19ac7eb-19ac864 call 19a3428 2841->2844 2850 19ac86b-19ac88c call 19a4dc8 2844->2850 2851 19ac866 2844->2851 2853 19ac891-19ac89c 2850->2853 2851->2850 2854 19ac89e 2853->2854 2855 19ac8a3-19ac8a7 2853->2855 2854->2855 2856 19ac8a9-19ac8aa 2855->2856 2857 19ac8ac-19ac8b3 2855->2857 2858 19ac8cb-19ac90f 2856->2858 2859 19ac8ba-19ac8c8 2857->2859 2860 19ac8b5 2857->2860 2864 19ac975-19ac98c 2858->2864 2859->2858 2860->2859 2866 19ac98e-19ac9b3 2864->2866 2867 19ac911-19ac927 2864->2867 2876 19ac9cb 2866->2876 2877 19ac9b5-19ac9ca 2866->2877 2871 19ac929-19ac935 2867->2871 2872 19ac951 2867->2872 2873 19ac93f-19ac945 2871->2873 2874 19ac937-19ac93d 2871->2874 2875 19ac957-19ac974 2872->2875 2878 19ac94f 2873->2878 2874->2878 2875->2864 2877->2876 2878->2875
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PH^q$PH^q
                                    • API String ID: 0-1598597984
                                    • Opcode ID: 90428c8dd2d33598c80ea8ddea8b3d29b69343e8286ffc5cb057b41e97dd308e
                                    • Instruction ID: 8a66ac23dd53ba39a769adb52b2cc207f2cffad76541f3e4ae1c76c57e561f50
                                    • Opcode Fuzzy Hash: 90428c8dd2d33598c80ea8ddea8b3d29b69343e8286ffc5cb057b41e97dd308e
                                    • Instruction Fuzzy Hash: 9581C374E01218CFDB14CFAAD984A9DBBF2BF89310F14D069E409AB365DB349985CF51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2931 6fb8c51-6fb8c88 2932 6fb8c8a 2931->2932 2933 6fb8c8f-6fb8d33 2931->2933 2932->2933 2937 6fb8d41-6fb8d92 2933->2937 2938 6fb8d35-6fb8d3c 2933->2938 2946 6fb8e64 2937->2946 2939 6fb8f9c-6fb8fba 2938->2939 2947 6fb8e6d-6fb8e7b 2946->2947 2948 6fb8e81-6fb8ea6 2947->2948 2949 6fb8d97-6fb8dc4 2947->2949 2954 6fb8ea8-6fb8ebd 2948->2954 2955 6fb8ebe 2948->2955 2956 6fb8dc6-6fb8dcf 2949->2956 2957 6fb8de5 2949->2957 2954->2955 2955->2939 2958 6fb8dd1-6fb8dd4 2956->2958 2959 6fb8dd6-6fb8dd9 2956->2959 2960 6fb8de8-6fb8e09 2957->2960 2962 6fb8de3 2958->2962 2959->2962 2965 6fb8e0b-6fb8e61 2960->2965 2966 6fb8e62-6fb8e63 2960->2966 2962->2960 2965->2966 2966->2946
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PH^q$PH^q
                                    • API String ID: 0-1598597984
                                    • Opcode ID: 94a6efe8602df158990f469eff2b504f938d1ed8679a6b537facb3cd91619e38
                                    • Instruction ID: a40f137ae04c670aeedb4ff98c739fd509f57a91e241c6af923f8a0662db6b1b
                                    • Opcode Fuzzy Hash: 94a6efe8602df158990f469eff2b504f938d1ed8679a6b537facb3cd91619e38
                                    • Instruction Fuzzy Hash: 6981AE74E01218CFDB58CFAAD994BEDBBB2BF89300F20916AD419AB354DB345985CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2882 19a4ad9-19a4ade 2883 19a4ae0-19a4ae2 2882->2883 2884 19a4ae5-19a4ae7 2882->2884 2885 19a4ae9-19a4b08 2883->2885 2886 19a4ae4 2883->2886 2884->2885 2887 19a4b0a 2885->2887 2888 19a4b0f-19a4bec call 19a3908 call 19a3428 2885->2888 2886->2884 2887->2888 2898 19a4bee 2888->2898 2899 19a4bf3-19a4c11 2888->2899 2898->2899 2929 19a4c14 call 19a4dbb 2899->2929 2930 19a4c14 call 19a4dc8 2899->2930 2900 19a4c1a-19a4c25 2901 19a4c2c-19a4c30 2900->2901 2902 19a4c27 2900->2902 2903 19a4c32-19a4c33 2901->2903 2904 19a4c35-19a4c3c 2901->2904 2902->2901 2905 19a4c54-19a4c98 2903->2905 2906 19a4c3e 2904->2906 2907 19a4c43-19a4c51 2904->2907 2911 19a4cfe-19a4d15 2905->2911 2906->2907 2907->2905 2913 19a4c9a-19a4cb0 2911->2913 2914 19a4d17-19a4d3c 2911->2914 2917 19a4cda 2913->2917 2918 19a4cb2-19a4cbe 2913->2918 2920 19a4d3e-19a4d53 2914->2920 2921 19a4d54 2914->2921 2924 19a4ce0-19a4cfd 2917->2924 2922 19a4cc8-19a4cce 2918->2922 2923 19a4cc0-19a4cc6 2918->2923 2920->2921 2925 19a4cd8 2922->2925 2923->2925 2924->2911 2925->2924 2929->2900 2930->2900
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PH^q$PH^q
                                    • API String ID: 0-1598597984
                                    • Opcode ID: 84326fa3fd451f77b8bef13aec95882c60119764e56bc68a5eedfe67e2c20938
                                    • Instruction ID: 1e8fad016721da17e5f93bdfef9969e93c04934b657a133e0301c59ed25b2fbb
                                    • Opcode Fuzzy Hash: 84326fa3fd451f77b8bef13aec95882c60119764e56bc68a5eedfe67e2c20938
                                    • Instruction Fuzzy Hash: F281B374E00218CFDB14CFAAD884A9DBBF2BF89301F14D069E819AB365DB749985CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2971 19ac190-19ac195 2972 19ac216-19ac2a4 call 19a3908 call 19a3428 2971->2972 2973 19ac197-19ac1c0 2971->2973 2984 19ac2ab-19ac2dc call 19a4dc8 2972->2984 2985 19ac2a6 2972->2985 2974 19ac1c2 2973->2974 2975 19ac1c7-19ac20f 2973->2975 2974->2975 2975->2972 2988 19ac2de 2984->2988 2989 19ac2e3-19ac2e7 2984->2989 2985->2984 2988->2989 2990 19ac2e9-19ac2ea 2989->2990 2991 19ac2ec-19ac2f3 2989->2991 2992 19ac30b-19ac34f 2990->2992 2993 19ac2fa-19ac308 2991->2993 2994 19ac2f5 2991->2994 2998 19ac3b5-19ac3cc 2992->2998 2993->2992 2994->2993 3000 19ac3ce-19ac3f3 2998->3000 3001 19ac351-19ac367 2998->3001 3010 19ac40b-19ac472 3000->3010 3011 19ac3f5-19ac40a 3000->3011 3005 19ac369-19ac375 3001->3005 3006 19ac391 3001->3006 3007 19ac37f-19ac385 3005->3007 3008 19ac377-19ac37d 3005->3008 3009 19ac397-19ac3b4 3006->3009 3012 19ac38f 3007->3012 3008->3012 3009->2998 3018 19ac479-19ac47a 3010->3018 3019 19ac474 3010->3019 3011->3010 3012->3009 3020 19ac47c 3018->3020 3021 19ac481-19ac4a0 3018->3021 3022 19ac3f6-19ac40a 3019->3022 3023 19ac476 3019->3023 3024 19ac47d-19ac480 3020->3024 3025 19ac4a2 3021->3025 3026 19ac4a7-19ac584 call 19a3908 call 19a3428 3021->3026 3022->3010 3023->3024 3027 19ac478 3023->3027 3024->3021 3025->3026 3037 19ac58b-19ac5bc call 19a4dc8 3026->3037 3038 19ac586 3026->3038 3027->3018 3041 19ac5be 3037->3041 3042 19ac5c3-19ac5c7 3037->3042 3038->3037 3041->3042 3043 19ac5c9-19ac5ca 3042->3043 3044 19ac5cc-19ac5d3 3042->3044 3045 19ac5eb-19ac62f 3043->3045 3046 19ac5da-19ac5e8 3044->3046 3047 19ac5d5 3044->3047 3051 19ac695-19ac6ac 3045->3051 3046->3045 3047->3046 3053 19ac6ae-19ac6d3 3051->3053 3054 19ac631-19ac647 3051->3054 3061 19ac6eb-19ac758 3053->3061 3062 19ac6d5-19ac6d8 3053->3062 3058 19ac649-19ac655 3054->3058 3059 19ac671 3054->3059 3063 19ac65f-19ac665 3058->3063 3064 19ac657-19ac65d 3058->3064 3060 19ac677-19ac694 3059->3060 3060->3051 3065 19ac6dd-19ac6ea 3061->3065 3072 19ac75a 3061->3072 3062->3065 3066 19ac66f 3063->3066 3064->3066 3065->3061 3066->3060 3073 19ac75c-19ac75f 3072->3073 3074 19ac761-19ac780 3072->3074 3073->3074 3075 19ac782 3074->3075 3076 19ac787-19ac864 call 19a3908 call 19a3428 3074->3076 3075->3076 3086 19ac86b-19ac88c call 19a4dc8 3076->3086 3087 19ac866 3076->3087 3089 19ac891-19ac89c 3086->3089 3087->3086 3090 19ac89e 3089->3090 3091 19ac8a3-19ac8a7 3089->3091 3090->3091 3092 19ac8a9-19ac8aa 3091->3092 3093 19ac8ac-19ac8b3 3091->3093 3094 19ac8cb-19ac90f 3092->3094 3095 19ac8ba-19ac8c8 3093->3095 3096 19ac8b5 3093->3096 3100 19ac975-19ac98c 3094->3100 3095->3094 3096->3095 3102 19ac98e-19ac9b3 3100->3102 3103 19ac911-19ac927 3100->3103 3112 19ac9cb 3102->3112 3113 19ac9b5-19ac9ca 3102->3113 3107 19ac929-19ac935 3103->3107 3108 19ac951 3103->3108 3109 19ac93f-19ac945 3107->3109 3110 19ac937-19ac93d 3107->3110 3111 19ac957-19ac974 3108->3111 3114 19ac94f 3109->3114 3110->3114 3111->3100 3113->3112 3114->3111
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PH^q$PH^q
                                    • API String ID: 0-1598597984
                                    • Opcode ID: 8803e34ca59e64e60d498b11e5cab08baa1693c2f58473103ac41b9c32a9421f
                                    • Instruction ID: ccca0ae35d0d9fea57e07116ae64aa223c1ae58cc4cc78bec87e00813691eb25
                                    • Opcode Fuzzy Hash: 8803e34ca59e64e60d498b11e5cab08baa1693c2f58473103ac41b9c32a9421f
                                    • Instruction Fuzzy Hash: 4D81B474E01208DFDB14DFAAD884A9DBBF2BF89300F14D069E809AB365DB349945CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PH^q$PH^q
                                    • API String ID: 0-1598597984
                                    • Opcode ID: b298ca4e8147ddbcbd08ab44eaa0b29cb01c1affcf7507e95b30e42a61314a2f
                                    • Instruction ID: c774ce5d14c3b2e7e1aa1c3abb3f967a15a3a882f219d05d510c13617c901bb9
                                    • Opcode Fuzzy Hash: b298ca4e8147ddbcbd08ab44eaa0b29cb01c1affcf7507e95b30e42a61314a2f
                                    • Instruction Fuzzy Hash: 1181C374E01218CFDB14DFAAD884A9DBBF2BF88300F54D469E819AB365DB349985CF50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3118 19abeb0-19abeb1 3119 19abf32-19abf37 3118->3119 3120 19abeb3-19abeb9 3118->3120 3121 19abf3a-19abfc4 call 19a3908 call 19a3428 3119->3121 3120->3121 3122 19abebb-19abee0 3120->3122 3134 19abfcb-19abfec call 19a4dc8 3121->3134 3135 19abfc6 3121->3135 3123 19abee2 3122->3123 3124 19abee7-19abf2f 3122->3124 3123->3124 3124->3119 3137 19abff1-19abffc 3134->3137 3135->3134 3138 19abffe 3137->3138 3139 19ac003-19ac007 3137->3139 3138->3139 3140 19ac009-19ac00a 3139->3140 3141 19ac00c-19ac013 3139->3141 3144 19ac02b-19ac06f 3140->3144 3142 19ac01a-19ac028 3141->3142 3143 19ac015 3141->3143 3142->3144 3143->3142 3148 19ac0d5-19ac0ec 3144->3148 3150 19ac0ee-19ac113 3148->3150 3151 19ac071-19ac087 3148->3151 3158 19ac12b 3150->3158 3159 19ac115-19ac12a 3150->3159 3155 19ac089-19ac095 3151->3155 3156 19ac0b1 3151->3156 3160 19ac09f-19ac0a5 3155->3160 3161 19ac097-19ac09d 3155->3161 3157 19ac0b7-19ac0d4 3156->3157 3157->3148 3159->3158 3162 19ac0af 3160->3162 3161->3162 3162->3157
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PH^q$PH^q
                                    • API String ID: 0-1598597984
                                    • Opcode ID: a84f7eb30d2d1e7500a185c6d4d8bcebcc3130d26156960c52557e07bb7c3849
                                    • Instruction ID: 5631d0d71739fc51a21346dcfafb58e3593ca819045e51d8b6c12788ad7a4cf4
                                    • Opcode Fuzzy Hash: a84f7eb30d2d1e7500a185c6d4d8bcebcc3130d26156960c52557e07bb7c3849
                                    • Instruction Fuzzy Hash: 2381D274E00218CFDB18DFAAD884A9DBBF2BF89300F54D069E419AB365DB309985CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PH^q$PH^q
                                    • API String ID: 0-1598597984
                                    • Opcode ID: 138e9f5a9ef75f0593a3367f1122cf0f1fa3ba25fd2f3346565c40dffa5d9c57
                                    • Instruction ID: 67995fe8eec898e4608955783f5eacefd2e45368b6022364b286c05b4819566c
                                    • Opcode Fuzzy Hash: 138e9f5a9ef75f0593a3367f1122cf0f1fa3ba25fd2f3346565c40dffa5d9c57
                                    • Instruction Fuzzy Hash: 0681B274E00218CFDB18CFAAD984A9DBBF2FF89301F549069E409AB365DB349985CF51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: PH^q$PH^q
                                    • API String ID: 0-1598597984
                                    • Opcode ID: ebd0eb38610ec0825f3083bd40ef5f29fcfca92bbf29d605ed7dbe3bcb0dc581
                                    • Instruction ID: fe66f1c81050059b5e84118a59694c36a90246ebba7ebdeed6998101b49ae188
                                    • Opcode Fuzzy Hash: ebd0eb38610ec0825f3083bd40ef5f29fcfca92bbf29d605ed7dbe3bcb0dc581
                                    • Instruction Fuzzy Hash: BA61C374E002089FDB18DFAAD984A9EBBF6FF88310F14D069E419AB365DB345945CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48160cceee803383a3770e816bd86f5507edd29f0682502f8cead49a5ff48df6
                                    • Instruction ID: 8fc005fdf370eafc5540fb9c49704a4e37927be5af22a5421b938161cb189266
                                    • Opcode Fuzzy Hash: 48160cceee803383a3770e816bd86f5507edd29f0682502f8cead49a5ff48df6
                                    • Instruction Fuzzy Hash: 97F1D274E01218CFDB14DFA9D884B9DFBB2BF88304F5491A9E848AB355DB349986CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ebed48c567539cd958a9c9b9adaf42a08e73a0db518f5121d385d1927bb19a91
                                    • Instruction ID: 6c1f47376055f3822b8fd38a2d2719553cafdc33817aa7f7e161b10e9e45620b
                                    • Opcode Fuzzy Hash: ebed48c567539cd958a9c9b9adaf42a08e73a0db518f5121d385d1927bb19a91
                                    • Instruction Fuzzy Hash: 80826C74E012288FDB64DF69D998BDDBBB6BF89300F1091EA940DA7264DB315E85CF40
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9fec239a550c357b2eabc2c58872af7bcbce7c3b3decdd703bde817929f7f808
                                    • Instruction ID: e53ccec3639673f76fa45a5dca5a7034cdda02c7b2ce75f9787914209616daac
                                    • Opcode Fuzzy Hash: 9fec239a550c357b2eabc2c58872af7bcbce7c3b3decdd703bde817929f7f808
                                    • Instruction Fuzzy Hash: FF72CD74E012298FDB65DF29C884BEDBBB6BB89300F5491E9D40DA7251DB349E85CF80
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5be1e6ff78ef496ecbeff2a52c0ba2d879279b1eaa0d5be97f0a61603ef8cd20
                                    • Instruction ID: a63884968aed36a8d39c80d32c33a17f97a7f3488c4b04fe008a7d94c1481fbf
                                    • Opcode Fuzzy Hash: 5be1e6ff78ef496ecbeff2a52c0ba2d879279b1eaa0d5be97f0a61603ef8cd20
                                    • Instruction Fuzzy Hash: F3E1CE74E00218CFEB64DFA5D984B9DBBB6BF88304F2091A9D418A7394DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ca4f049d2b26da4089bb653412f9d63615a00f9b44f3dad46743aeb355d7342a
                                    • Instruction ID: df7f5ebcc46f9f7f8e14eb93095aac0d0940e04e51be06e1923ad73790524ac8
                                    • Opcode Fuzzy Hash: ca4f049d2b26da4089bb653412f9d63615a00f9b44f3dad46743aeb355d7342a
                                    • Instruction Fuzzy Hash: EFC19D74E00218CFDB14DFA5D984BADBBB6BF88304F2091A9D809AB354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a7b5f0b2c2c13504c9bf53e3e07763c4668f7562ef5c487b55b2de0d538522a8
                                    • Instruction ID: a8316c02bb7d59ac476da4072b2651a26d1b75628e31e57d5f4242452c8ec87a
                                    • Opcode Fuzzy Hash: a7b5f0b2c2c13504c9bf53e3e07763c4668f7562ef5c487b55b2de0d538522a8
                                    • Instruction Fuzzy Hash: FBA19275E012288FEB68CF6AD944BDDBBF2AF89300F14D0AAD40DA7254DB345A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2fa0258910770d7738345622c8559e01ba42171f89c190f2cd8fed9b14904439
                                    • Instruction ID: b405ab17a98f3086c67caa8b136fe1fa67fed3923a45f669db934d7192b1ad66
                                    • Opcode Fuzzy Hash: 2fa0258910770d7738345622c8559e01ba42171f89c190f2cd8fed9b14904439
                                    • Instruction Fuzzy Hash: 73A1A375E012188FEB68CF6AD944BDDBBF2AF89300F14D0AAD40DA7254DB349A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d699408006f442d73d2aea0676a7adbb72d090171c1b166558867daf6b971348
                                    • Instruction ID: 3f8771e87ff16a732c2e32b0d1f6ea31b92748aacd01f6c90e38b628561f5990
                                    • Opcode Fuzzy Hash: d699408006f442d73d2aea0676a7adbb72d090171c1b166558867daf6b971348
                                    • Instruction Fuzzy Hash: 3EA1A375E012288FEB64CF6AD944BDEBBF2AF89300F14D0AAD40DA7254DB345A85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f6af300fca56bba69fb24add876b3bf581565abc920c2d63416c7edaf9a4cbfa
                                    • Instruction ID: 20693b5664da628d93be36d0973a79346cc6562c244d841c2ed4a48f7cf2fdc9
                                    • Opcode Fuzzy Hash: f6af300fca56bba69fb24add876b3bf581565abc920c2d63416c7edaf9a4cbfa
                                    • Instruction Fuzzy Hash: FFA1A2B5E016188FEB68CF6AC944BDDBBF2AF89300F14D0AAD40DA7254DB345A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c27f49691507303fe52d546095f82f476e2e09a5fbf8afecdfe703295e221839
                                    • Instruction ID: dc7329ed6a2f3d2f0def61f4fa9eead7b283b0e919a21acdc13f7e1e97a414a1
                                    • Opcode Fuzzy Hash: c27f49691507303fe52d546095f82f476e2e09a5fbf8afecdfe703295e221839
                                    • Instruction Fuzzy Hash: 1DA1A4B5E012188FEB64CF6AD944BDEBBF2AF89300F14D0AAD40DA7254DB345A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3bf1a9f0ab3e5d11896c50f296899e677a218a6beb07501ed61da7f006a53458
                                    • Instruction ID: 1025931e1f2841877fcc9982121b8ada068fc4f5853388ace6adce560688545a
                                    • Opcode Fuzzy Hash: 3bf1a9f0ab3e5d11896c50f296899e677a218a6beb07501ed61da7f006a53458
                                    • Instruction Fuzzy Hash: 35A1B275E012188FEB64CF6AC944BDDBBF2AF89300F14D0AAD509A7254DB305A85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 83d9a518643f61ae903a5d2a178db317c98e2b53d9ef73a533b0db85605da228
                                    • Instruction ID: 4b55222a46d1ba8e431141ea52e0ef26223f697f101d02228458e6030b2978c5
                                    • Opcode Fuzzy Hash: 83d9a518643f61ae903a5d2a178db317c98e2b53d9ef73a533b0db85605da228
                                    • Instruction Fuzzy Hash: 3CA19475E012188FEB64CF6AD944BDDBBF2AF89300F14D0AAD409A7254DB345A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1d0d18b8d3de8cc9b17f6e687699414fd2a9e3db675f7f6eb6da7e092223857e
                                    • Instruction ID: 0b8e91c76478c553e7ebf7a68515f2b82f96538e6776b95d360129e9b5091173
                                    • Opcode Fuzzy Hash: 1d0d18b8d3de8cc9b17f6e687699414fd2a9e3db675f7f6eb6da7e092223857e
                                    • Instruction Fuzzy Hash: AAA19F75E016288FEB68CF6AC944BDDBBF2BF89300F14D0AAD409A7254DB345A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e4b0bba4b3acf909f3561d63b9fa76af6105988ffce9da413fce960ed45f3fa6
                                    • Instruction ID: 58b6ebe314c43f3f60733b5506c876fe099c001593c0400a585b5eaa7708a44f
                                    • Opcode Fuzzy Hash: e4b0bba4b3acf909f3561d63b9fa76af6105988ffce9da413fce960ed45f3fa6
                                    • Instruction Fuzzy Hash: 93A19275E012188FEB68CF6AD944BDDBBF2AF89300F14D0AAD40CA7255DB349A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 49458fe6fa66c367c763c2766cfcb52d06b491f144f5bc0d989545fec2ce6c8f
                                    • Instruction ID: fe578c3b5411eb552595e238e8c699bb3add023ed1511a3c6138a18f33957fcf
                                    • Opcode Fuzzy Hash: 49458fe6fa66c367c763c2766cfcb52d06b491f144f5bc0d989545fec2ce6c8f
                                    • Instruction Fuzzy Hash: 9181A274E412289FDB65DF25D894BEDBBB6BF89300F1091EAD909A7254DB306E81CF40
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 13952134d1e0544950c71c80d93da19de1f42bc7a409bd2dc1e5d9b1e8437018
                                    • Instruction ID: 86b62272f0fc05f1a7cf678d6b73e19deaadd7c333402706a6d7277c7bac84b9
                                    • Opcode Fuzzy Hash: 13952134d1e0544950c71c80d93da19de1f42bc7a409bd2dc1e5d9b1e8437018
                                    • Instruction Fuzzy Hash: B3819671E016188FEB68CF6AC944BDDBBF2AF89300F14D1AAD40DA7254DB345A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 138cd43dad0e6a9b9827b93ba297d5764f3f885c8fa7fc54d99f95c634d4a0fc
                                    • Instruction ID: a73cb4d5d097d1fa1d30e510297abca1e23ade9b3b9b8f375e15b390890b3b8a
                                    • Opcode Fuzzy Hash: 138cd43dad0e6a9b9827b93ba297d5764f3f885c8fa7fc54d99f95c634d4a0fc
                                    • Instruction Fuzzy Hash: 22718671E016188FEB68CF6AC944BDDBBF2AF89300F14D0AAD40DA7254DB345A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 998daad414bf90815e1dab69bd3dd403d89f47e9d5a9199b74bc80e34337ced2
                                    • Instruction ID: f6c16d2172c8453e4a3951fa4648d41a9fe164413f86df4ace229151769be296
                                    • Opcode Fuzzy Hash: 998daad414bf90815e1dab69bd3dd403d89f47e9d5a9199b74bc80e34337ced2
                                    • Instruction Fuzzy Hash: F5717371E016288FEB68CF6AC944B9DFBF2AF89300F14D0AAD50DA7254DB345A85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ea8aee3aa5ef0e79e838fa16d25ceb4eba7feec484af4e8198d429c2864d5d0b
                                    • Instruction ID: 8661589bdc27b3251932a027ff4b581ed1fa60a4a5437109cc8beb02f1bc2026
                                    • Opcode Fuzzy Hash: ea8aee3aa5ef0e79e838fa16d25ceb4eba7feec484af4e8198d429c2864d5d0b
                                    • Instruction Fuzzy Hash: BC5198B1E016189BEB58CF6BCD557CAFAF3AFC9304F04C0AAD50CA6255DB740A868F51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: af471bdf395a6073fd31645976c350c6b5e7d997fe761b3748ada4daba247919
                                    • Instruction ID: 255bceed20885873010e004f9bdf424ef8776713ee6df3b3862d1dee47888cc0
                                    • Opcode Fuzzy Hash: af471bdf395a6073fd31645976c350c6b5e7d997fe761b3748ada4daba247919
                                    • Instruction Fuzzy Hash: 1351A8B1E016189BEB58CF6BDD447DAFAF7AFC8310F04D0AAC50CA6264DB740A858F51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c08f5a1a647b8d9df7d91e143b521537d3e7943e01e4e22ef7d9eb176119798f
                                    • Instruction ID: 92c4d50394887dfcb4f3c78bfee1446cbe373ee72182a694fb7bf229dc1d0c94
                                    • Opcode Fuzzy Hash: c08f5a1a647b8d9df7d91e143b521537d3e7943e01e4e22ef7d9eb176119798f
                                    • Instruction Fuzzy Hash: C441D2B0E002088BEB58DFAAD9447DEFBF6AF88304F14D169C418BB250DB755946CF64
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9907567e2a9776b1ac827d3db1ea153d8d5bd38424be6038dfb45b90b192c8e8
                                    • Instruction ID: 1e1128b91c3888a733c950e063991807d9cf8b4a501801d1ad24c316a1b12d8c
                                    • Opcode Fuzzy Hash: 9907567e2a9776b1ac827d3db1ea153d8d5bd38424be6038dfb45b90b192c8e8
                                    • Instruction Fuzzy Hash: 35417AB1D016189BEB58CF6BCD457DAFAF7AFC8310F04C1AAD50CA6264DB740A868F51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 006fe4671011210abfe2ef71095a6eaa5030ca4a6dd857247b11f4df0239917d
                                    • Instruction ID: 8f3ee41e879fe385aa3511c3e70247f06a19b3628d064311d32b6b74eb9290f5
                                    • Opcode Fuzzy Hash: 006fe4671011210abfe2ef71095a6eaa5030ca4a6dd857247b11f4df0239917d
                                    • Instruction Fuzzy Hash: 68418AB1E016188BEB58CF6BCD457CAFAF7AFC8310F14C1AAD50CA6254DB340A858F51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 40b051f553fbc41cc8b08abe7793d0dbf157d0858ea8df7ae5a097cc320cf455
                                    • Instruction ID: dbfc50c39415a28551fde67b62ba33c2072df536741b2dce4397eea91eec8bb8
                                    • Opcode Fuzzy Hash: 40b051f553fbc41cc8b08abe7793d0dbf157d0858ea8df7ae5a097cc320cf455
                                    • Instruction Fuzzy Hash: A04169B1E016189BEB58CF6BDD457CAFAF3AFC8304F04D1AAD50CA6264DB740A858F51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dcfb80a2b9ce5d006b590dc78daf8219f5f138d3aa8006d24ffd194dc62f0502
                                    • Instruction ID: bbc1ec08a5116c0870bc1dc0f16fb1a78cb9d35234f9200d7bf5d3d4620d75d6
                                    • Opcode Fuzzy Hash: dcfb80a2b9ce5d006b590dc78daf8219f5f138d3aa8006d24ffd194dc62f0502
                                    • Instruction Fuzzy Hash: E94177B1E016188BEB58CF6BCD457CAFAF3AFC8300F04C1AAC50CA6264DB740A858F51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 19a6e58-19a6e62 1 19a6e69-19a6e8d 0->1 2 19a6e64 0->2 5 19a72bc-19a72c0 1->5 6 19a6e93-19a6eb6 1->6 3 19a6e66-19a6e68 2->3 4 19a6e14-19a6e2f 2->4 3->1 19 19a6e4c-19a6e50 4->19 20 19a6e31-19a6e4b 4->20 7 19a72d9-19a72e7 5->7 8 19a72c2-19a72d6 5->8 17 19a6ebc-19a6ec9 6->17 18 19a6f64-19a6f68 6->18 15 19a7358-19a736d 7->15 16 19a72e9-19a72fe 7->16 29 19a736f-19a7372 15->29 30 19a7374-19a7381 15->30 31 19a7300-19a7303 16->31 32 19a7305-19a7312 16->32 37 19a6ecb-19a6ed6 17->37 38 19a6ed8 17->38 21 19a6f6a-19a6f78 18->21 22 19a6fb0-19a6fb9 18->22 21->22 45 19a6f7a-19a6f95 21->45 25 19a73cf 22->25 26 19a6fbf-19a6fc9 22->26 39 19a73d4-19a73ea 25->39 26->5 35 19a6fcf-19a6fd8 26->35 33 19a7383-19a73be 29->33 30->33 34 19a7314-19a7355 31->34 32->34 89 19a73c5-19a73cc 33->89 43 19a6fda-19a6fdf 35->43 44 19a6fe7-19a6ff3 35->44 40 19a6eda-19a6edc 37->40 38->40 56 19a73ec 39->56 57 19a73f1-19a7404 39->57 40->18 47 19a6ee2-19a6f44 40->47 43->44 44->39 50 19a6ff9-19a6fff 44->50 70 19a6fa3 45->70 71 19a6f97-19a6fa1 45->71 100 19a6f4a-19a6f61 47->100 101 19a6f46 47->101 53 19a72a6-19a72aa 50->53 54 19a7005-19a7015 50->54 53->25 59 19a72b0-19a72b6 53->59 68 19a7029-19a702b 54->68 69 19a7017-19a7027 54->69 56->57 74 19a741d-19a7424 57->74 75 19a7406-19a741c 57->75 59->5 59->35 72 19a702e-19a7034 68->72 69->72 73 19a6fa5-19a6fa7 70->73 71->73 72->53 76 19a703a-19a7049 72->76 73->22 77 19a6fa9 73->77 83 19a704f 76->83 84 19a70f7-19a7122 call 19a6ca0 * 2 76->84 77->22 87 19a7052-19a7063 83->87 102 19a7128-19a712c 84->102 103 19a720c-19a7226 84->103 87->39 91 19a7069-19a707b 87->91 91->39 93 19a7081-19a7099 91->93 156 19a709b call 19a7438 93->156 157 19a709b call 19a7428 93->157 96 19a70a1-19a70b1 96->53 99 19a70b7-19a70ba 96->99 104 19a70bc-19a70c2 99->104 105 19a70c4-19a70c7 99->105 100->18 101->100 102->53 107 19a7132-19a7136 102->107 103->5 125 19a722c-19a7230 103->125 104->105 108 19a70cd-19a70d0 104->108 105->25 105->108 110 19a7138-19a7145 107->110 111 19a715e-19a7164 107->111 112 19a70d8-19a70db 108->112 113 19a70d2-19a70d6 108->113 128 19a7147-19a7152 110->128 129 19a7154 110->129 114 19a719f-19a71a5 111->114 115 19a7166-19a716a 111->115 112->25 116 19a70e1-19a70e5 112->116 113->112 113->116 118 19a71b1-19a71b7 114->118 119 19a71a7-19a71ab 114->119 115->114 117 19a716c-19a7175 115->117 116->25 122 19a70eb-19a70f1 116->122 123 19a7177-19a717c 117->123 124 19a7184-19a719a 117->124 126 19a71b9-19a71bd 118->126 127 19a71c3-19a71c5 118->127 119->89 119->118 122->84 122->87 123->124 124->53 131 19a726c-19a7270 125->131 132 19a7232-19a723c call 19a5b50 125->132 126->53 126->127 133 19a71fa-19a71fc 127->133 134 19a71c7-19a71d0 127->134 130 19a7156-19a7158 128->130 129->130 130->53 130->111 131->89 137 19a7276-19a727a 131->137 132->131 145 19a723e-19a7253 132->145 133->53 135 19a7202-19a7209 133->135 140 19a71df-19a71f5 134->140 141 19a71d2-19a71d7 134->141 137->89 142 19a7280-19a728d 137->142 140->53 141->140 148 19a728f-19a729a 142->148 149 19a729c 142->149 145->131 153 19a7255-19a726a 145->153 150 19a729e-19a72a0 148->150 149->150 150->53 150->89 153->5 153->131 156->96 157->96
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (o^q$(o^q$(o^q$(o^q$(o^q$(o^q$,bq$,bq
                                    • API String ID: 0-1932283790
                                    • Opcode ID: 4eee26ba2fb1e26611013d1cfc7498e2893e52e24918963b0db0ba9d22aa780f
                                    • Instruction ID: e1c5c948b791051b1ed6abe4e7438e29d23ec8c0bb78886d523b9afdabb02439
                                    • Opcode Fuzzy Hash: 4eee26ba2fb1e26611013d1cfc7498e2893e52e24918963b0db0ba9d22aa780f
                                    • Instruction Fuzzy Hash: 3A228F30A002058FCB19CFA8D985A9DBBF6FF88315F558569E909DB361DB31EC49CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1540 19a77f0-19a7cde 1616 19a8230-19a824a 1540->1616 1617 19a7ce4-19a7cf4 1540->1617 1622 19a824c-19a8250 1616->1622 1623 19a8251-19a8252 1616->1623 1617->1616 1618 19a7cfa-19a7d0a 1617->1618 1618->1616 1619 19a7d10-19a7d20 1618->1619 1619->1616 1621 19a7d26-19a7d36 1619->1621 1621->1616 1624 19a7d3c-19a7d4c 1621->1624 1622->1623 1625 19a8259-19a8265 1623->1625 1626 19a8254 1623->1626 1624->1616 1629 19a7d52-19a7d62 1624->1629 1627 19a8271-19a828f 1625->1627 1628 19a8267-19a826c 1625->1628 1626->1625 1639 19a8291-19a829b 1627->1639 1640 19a8306-19a8312 1627->1640 1630 19a8356-19a835b 1628->1630 1629->1616 1631 19a7d68-19a7d78 1629->1631 1631->1616 1633 19a7d7e-19a7d8e 1631->1633 1633->1616 1634 19a7d94-19a7da4 1633->1634 1634->1616 1636 19a7daa-19a7dba 1634->1636 1636->1616 1637 19a7dc0-19a822f 1636->1637 1639->1640 1647 19a829d-19a82a9 1639->1647 1645 19a8329-19a8335 1640->1645 1646 19a8314-19a8320 1640->1646 1654 19a834c-19a834e 1645->1654 1655 19a8337-19a8343 1645->1655 1646->1645 1653 19a8322-19a8327 1646->1653 1656 19a82ab-19a82b6 1647->1656 1657 19a82ce-19a82d1 1647->1657 1653->1630 1654->1630 1739 19a8350 call 19a87e9 1654->1739 1655->1654 1667 19a8345-19a834a 1655->1667 1656->1657 1665 19a82b8-19a82c2 1656->1665 1658 19a82e8-19a82f4 1657->1658 1659 19a82d3-19a82df 1657->1659 1663 19a835c-19a836a 1658->1663 1664 19a82f6-19a82fd 1658->1664 1659->1658 1671 19a82e1-19a82e6 1659->1671 1672 19a836c-19a8370 1663->1672 1673 19a8371-19a8372 1663->1673 1664->1663 1668 19a82ff-19a8304 1664->1668 1665->1657 1677 19a82c4-19a82c9 1665->1677 1667->1630 1668->1630 1671->1630 1672->1673 1675 19a8379-19a837e 1673->1675 1676 19a8373-19a8374 1673->1676 1679 19a838e-19a8391 1675->1679 1680 19a8380 1675->1680 1676->1640 1681 19a8376 1676->1681 1677->1630 1680->1679 1739->1630
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: $^q$$^q
                                    • API String ID: 0-355816377
                                    • Opcode ID: 0c4c220076f37bca5728452d155e6171ab062b270f5812eedfcda9379800efb9
                                    • Instruction ID: bb7110435408badd15fbe6620833e66b6c8d9dd02f5b1af12fe24a200540747d
                                    • Opcode Fuzzy Hash: 0c4c220076f37bca5728452d155e6171ab062b270f5812eedfcda9379800efb9
                                    • Instruction Fuzzy Hash: 30520E74A00219CFEB14DBA4C8A4BAEBB77FB54301F1081A9C10A6B365DF359E89DF51
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 4'^q$4'^q
                                    • API String ID: 0-2697143702
                                    • Opcode ID: 3f207b6e8c970c38e677b16d3393ababd61d2ed21ca9c8bc788653ae7126b752
                                    • Instruction ID: 88c1e5d0084d7cf0beb1e8b0beeb090915ea7e07099f6f2ef0c28d98b28b5240
                                    • Opcode Fuzzy Hash: 3f207b6e8c970c38e677b16d3393ababd61d2ed21ca9c8bc788653ae7126b752
                                    • Instruction Fuzzy Hash: 32B185707145018FE7159B2CC968B397A9AEFC5603F984466E10ACF3B1EE25CC4AC7C2

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2423 19a56a8-19a56ca 2424 19a56cc-19a56d0 2423->2424 2425 19a56e0-19a56eb 2423->2425 2428 19a56f8-19a56ff 2424->2428 2429 19a56d2-19a56de 2424->2429 2426 19a5793-19a57bf 2425->2426 2427 19a56f1-19a56f3 2425->2427 2436 19a57c6-19a581e 2426->2436 2430 19a578b-19a5790 2427->2430 2431 19a571f-19a5728 2428->2431 2432 19a5701-19a5708 2428->2432 2429->2425 2429->2428 2504 19a572a call 19a5698 2431->2504 2505 19a572a call 19a56a8 2431->2505 2432->2431 2433 19a570a-19a5715 2432->2433 2435 19a571b-19a571d 2433->2435 2433->2436 2435->2430 2455 19a582d-19a583f 2436->2455 2456 19a5820-19a5826 2436->2456 2437 19a5730-19a5732 2438 19a573a-19a5742 2437->2438 2439 19a5734-19a5738 2437->2439 2443 19a5751-19a5753 2438->2443 2444 19a5744-19a5749 2438->2444 2439->2438 2442 19a5755-19a5774 call 19a6108 2439->2442 2449 19a5789 2442->2449 2450 19a5776-19a577f 2442->2450 2443->2430 2444->2443 2449->2430 2502 19a5781 call 19aa70d 2450->2502 2503 19a5781 call 19aa650 2450->2503 2452 19a5787 2452->2430 2458 19a58d3-19a58d5 2455->2458 2459 19a5845-19a5849 2455->2459 2456->2455 2510 19a58d7 call 19a5a63 2458->2510 2511 19a58d7 call 19a5a70 2458->2511 2460 19a584b-19a5857 2459->2460 2461 19a5859-19a5866 2459->2461 2467 19a5868-19a5872 2460->2467 2461->2467 2462 19a58dd-19a58e3 2465 19a58ef-19a58f6 2462->2465 2466 19a58e5-19a58eb 2462->2466 2468 19a58ed 2466->2468 2469 19a5951-19a599f 2466->2469 2472 19a589f-19a58a3 2467->2472 2473 19a5874-19a5883 2467->2473 2468->2465 2507 19a59a1 call 6fb25e8 2469->2507 2508 19a59a1 call 6fb23d1 2469->2508 2509 19a59a1 call 6fb23e0 2469->2509 2474 19a58af-19a58b3 2472->2474 2475 19a58a5-19a58ab 2472->2475 2484 19a5893-19a589d 2473->2484 2485 19a5885-19a588c 2473->2485 2474->2465 2479 19a58b5-19a58b9 2474->2479 2477 19a58f9-19a594a 2475->2477 2478 19a58ad 2475->2478 2477->2469 2478->2465 2481 19a58bf-19a58d1 2479->2481 2482 19a59b7-19a59ce 2479->2482 2481->2465 2484->2472 2485->2484 2497 19a59a7-19a59b0 2497->2482 2502->2452 2503->2452 2504->2437 2505->2437 2507->2497 2508->2497 2509->2497 2510->2462 2511->2462
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Hbq$Hbq
                                    • API String ID: 0-4258043069
                                    • Opcode ID: b355505efc0460774f1d410230b9aa0ea00096d8e69e6e9d24cd58cf25e01d7d
                                    • Instruction ID: d28b71dd21fddd1cc7512a3ecd1728d94ae47dab073111c3f95db097aa43b992
                                    • Opcode Fuzzy Hash: b355505efc0460774f1d410230b9aa0ea00096d8e69e6e9d24cd58cf25e01d7d
                                    • Instruction Fuzzy Hash: 3491C1307042049FEB15AF2CD898B2E7BEAFF88301F558869E94A8B395DF34D845C791

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2512 6fb23e0-6fb23f3 2514 6fb23fc-6fb2410 2512->2514 2515 6fb23f5-6fb23f7 2512->2515 2518 6fb2412-6fb2414 2514->2518 2519 6fb2416 2514->2519 2516 6fb2480-6fb2483 2515->2516 2520 6fb2419-6fb241e 2518->2520 2519->2520 2521 6fb2425-6fb243f 2520->2521 2524 6fb2441-6fb2477 2521->2524 2525 6fb2484-6fb24b7 2521->2525 2524->2521 2539 6fb2479 2524->2539 2530 6fb24b9-6fb24bb 2525->2530 2531 6fb24c0-6fb24e7 2525->2531 2532 6fb25c4-6fb25cb 2530->2532 2540 6fb24e9-6fb24ff 2531->2540 2541 6fb251e-6fb2520 2531->2541 2539->2516 2540->2541 2550 6fb2501-6fb2518 2540->2550 2542 6fb2529-6fb253d 2541->2542 2543 6fb2522-6fb2524 2541->2543 2547 6fb253f-6fb2541 2542->2547 2548 6fb2543 2542->2548 2543->2532 2549 6fb2546-6fb2563 2547->2549 2548->2549 2555 6fb25cc 2549->2555 2556 6fb2565-6fb2568 2549->2556 2550->2541 2550->2555 2560 6fb25d1-6fb25e0 2555->2560 2556->2555 2557 6fb256a-6fb256e 2556->2557 2558 6fb25b0-6fb25bd 2557->2558 2559 6fb2570-6fb2576 2557->2559 2558->2532 2561 6fb2579-6fb2581 2559->2561 2566 6fb25e2-6fb2604 2560->2566 2567 6fb2640 2560->2567 2561->2560 2563 6fb2583-6fb2599 call 6fb2190 2561->2563 2576 6fb259b-6fb259d 2563->2576 2577 6fb25a7-6fb25aa 2563->2577 2573 6fb260d-6fb262c 2566->2573 2583 6fb2607 call 6fb2670 2566->2583 2568 6fb2648-6fb265a 2567->2568 2574 6fb265c-6fb265f 2568->2574 2575 6fb2661 2568->2575 2573->2568 2579 6fb2664-6fb2669 2574->2579 2575->2579 2576->2577 2577->2555 2578 6fb25ac-6fb25ae 2577->2578 2578->2558 2578->2561 2583->2573
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: LR^q$LR^q
                                    • API String ID: 0-4089051495
                                    • Opcode ID: 7a5a38e45bf7af5ba7b3deda6dfb9d619eadb2781489d934284b4edfd0b225f2
                                    • Instruction ID: 1348816543eb2e08ef76cc7a9179c518701e12df37b5f30f1a8f08f62c2a0ed0
                                    • Opcode Fuzzy Hash: 7a5a38e45bf7af5ba7b3deda6dfb9d619eadb2781489d934284b4edfd0b225f2
                                    • Instruction Fuzzy Hash: 6381C031B101068FCB48DF7ED854AAE77B6FF88604B1581A9E505DB3A5DB30ED02CB95

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2584 19a5c08-19a5c15 2586 19a5c1d-19a5c1f 2584->2586 2587 19a5c17-19a5c1b 2584->2587 2589 19a5e30-19a5e37 2586->2589 2587->2586 2588 19a5c24-19a5c2f 2587->2588 2590 19a5e38 2588->2590 2591 19a5c35-19a5c3c 2588->2591 2594 19a5e3d-19a5e52 2590->2594 2592 19a5c42-19a5c51 2591->2592 2593 19a5dd1-19a5dd7 2591->2593 2592->2594 2595 19a5c57-19a5c66 2592->2595 2596 19a5dd9-19a5ddb 2593->2596 2597 19a5ddd-19a5de1 2593->2597 2606 19a5e59-19a5e75 2594->2606 2607 19a5e54-19a5e58 2594->2607 2603 19a5c7b-19a5c7e 2595->2603 2604 19a5c68-19a5c6b 2595->2604 2596->2589 2598 19a5e2e 2597->2598 2599 19a5de3-19a5de9 2597->2599 2598->2589 2599->2590 2601 19a5deb-19a5dee 2599->2601 2601->2590 2605 19a5df0-19a5e05 2601->2605 2608 19a5c8a-19a5c90 2603->2608 2610 19a5c80-19a5c83 2603->2610 2604->2608 2609 19a5c6d-19a5c70 2604->2609 2624 19a5e29-19a5e2c 2605->2624 2625 19a5e07-19a5e0d 2605->2625 2628 19a5e7e-19a5e82 2606->2628 2629 19a5e77-19a5e7c 2606->2629 2607->2606 2616 19a5ca8-19a5cc5 2608->2616 2617 19a5c92-19a5c98 2608->2617 2611 19a5d71-19a5d77 2609->2611 2612 19a5c76 2609->2612 2613 19a5cd6-19a5cdc 2610->2613 2614 19a5c85 2610->2614 2619 19a5d79-19a5d7f 2611->2619 2620 19a5d8f-19a5d99 2611->2620 2621 19a5d9c-19a5d9e 2612->2621 2622 19a5cde-19a5ce4 2613->2622 2623 19a5cf4-19a5d06 2613->2623 2614->2621 2660 19a5cce-19a5cd1 2616->2660 2626 19a5c9a 2617->2626 2627 19a5c9c-19a5ca6 2617->2627 2631 19a5d83-19a5d8d 2619->2631 2632 19a5d81 2619->2632 2620->2621 2641 19a5da7-19a5da9 2621->2641 2634 19a5ce8-19a5cf2 2622->2634 2635 19a5ce6 2622->2635 2646 19a5d08-19a5d14 2623->2646 2647 19a5d16-19a5d39 2623->2647 2624->2589 2636 19a5e1f-19a5e22 2625->2636 2637 19a5e0f-19a5e1d 2625->2637 2626->2616 2627->2616 2630 19a5e88-19a5e8a 2628->2630 2629->2630 2643 19a5e9f-19a5ea6 2630->2643 2644 19a5e8c-19a5e9e 2630->2644 2631->2620 2632->2620 2634->2623 2635->2623 2636->2590 2639 19a5e24-19a5e27 2636->2639 2637->2590 2637->2636 2639->2624 2639->2625 2651 19a5dab-19a5daf 2641->2651 2652 19a5dbd-19a5dbf 2641->2652 2661 19a5d61-19a5d6f 2646->2661 2647->2590 2664 19a5d3f-19a5d42 2647->2664 2651->2652 2653 19a5db1-19a5db5 2651->2653 2654 19a5dc3-19a5dc6 2652->2654 2653->2590 2656 19a5dbb 2653->2656 2654->2590 2657 19a5dc8-19a5dcb 2654->2657 2656->2654 2657->2592 2657->2593 2660->2621 2661->2621 2664->2590 2665 19a5d48-19a5d5a 2664->2665 2665->2661
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ,bq$,bq
                                    • API String ID: 0-2699258169
                                    • Opcode ID: cc910f9efc855c634a8037d8fcb3a5ddf6d5b9d3eb78f8b70c84c067d133e7de
                                    • Instruction ID: 339e42777d59f4cad5757b62e1fceffe55b344215e0131b4548fa636462b8628
                                    • Opcode Fuzzy Hash: cc910f9efc855c634a8037d8fcb3a5ddf6d5b9d3eb78f8b70c84c067d133e7de
                                    • Instruction Fuzzy Hash: 6F81F434B00105DFEB14CF6CC88896ABBBAFF88211BA68569D609DB365D731EC45CBD0

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2667 6fb9510-6fb952f 2668 6fb96ea-6fb970f 2667->2668 2669 6fb9535-6fb953e 2667->2669 2673 6fb9716-6fb97b0 call 6fb9350 2668->2673 2669->2673 2674 6fb9544-6fb9599 2669->2674 2713 6fb97b5-6fb97ba 2673->2713 2682 6fb959b-6fb95c0 2674->2682 2683 6fb95c3-6fb95cc 2674->2683 2682->2683 2684 6fb95ce 2683->2684 2685 6fb95d1-6fb95e1 2683->2685 2684->2685 2723 6fb95e3 call 6fb96f0 2685->2723 2724 6fb95e3 call 6fb9760 2685->2724 2725 6fb95e3 call 6fb9510 2685->2725 2726 6fb95e3 call 6fb9500 2685->2726 2688 6fb95e9-6fb95eb 2691 6fb95ed-6fb95f2 2688->2691 2692 6fb9645-6fb9692 2688->2692 2693 6fb962b-6fb963e 2691->2693 2694 6fb95f4-6fb9629 2691->2694 2704 6fb9699-6fb969e 2692->2704 2693->2692 2694->2704 2707 6fb96a8-6fb96ad 2704->2707 2708 6fb96a0 2704->2708 2710 6fb96af 2707->2710 2711 6fb96b7-6fb96bc 2707->2711 2708->2707 2710->2711 2714 6fb96be-6fb96cc call 6fb91c4 call 6fb91dc 2711->2714 2715 6fb96d1 2711->2715 2714->2715 2715->2668 2723->2688 2724->2688 2725->2688 2726->2688
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (&^q$(bq
                                    • API String ID: 0-1294341849
                                    • Opcode ID: be8a374c7e99dbc55b745f65dc17c8d180d69aace4c279c5778912ed3e0f49e7
                                    • Instruction ID: 6a48acf54dfb9efc91205d71c4edef1aed8cd98702d2377ac3a47d29b9cd4842
                                    • Opcode Fuzzy Hash: be8a374c7e99dbc55b745f65dc17c8d180d69aace4c279c5778912ed3e0f49e7
                                    • Instruction Fuzzy Hash: 4F719F31F002199BDB55DFB9C850AEEBBB2AFC9700F148529E505AB380DF70AD46CB95
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Xbq$Xbq
                                    • API String ID: 0-1243427068
                                    • Opcode ID: ad0e77eb11e9d14c65574702b0706a273f8c499b4b22813689658e68a732e9a6
                                    • Instruction ID: 07412492bcd7e34467e3c08f455b72f5836a347657248e699081edf965487ea6
                                    • Opcode Fuzzy Hash: ad0e77eb11e9d14c65574702b0706a273f8c499b4b22813689658e68a732e9a6
                                    • Instruction Fuzzy Hash: C2313735B043258BEF198A7E999427EA9DEBBC4612F444439E90EC3384DF74CE4887D1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: LR^q
                                    • API String ID: 0-2625958711
                                    • Opcode ID: cda87377f2e3ef0ac27a8d738eb11d8f6ce927c903575d9efcb9bf27969114b1
                                    • Instruction ID: e1689994ed050aa75fb703b003358783cfa035203433515732505a87e14111a6
                                    • Opcode Fuzzy Hash: cda87377f2e3ef0ac27a8d738eb11d8f6ce927c903575d9efcb9bf27969114b1
                                    • Instruction Fuzzy Hash: 4022B974A00219CFCB54DF64ED94AADBBBAFF48301F1095A9E809A7358DB346D89CF41
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: LR^q
                                    • API String ID: 0-2625958711
                                    • Opcode ID: b46c087d044230aeeba4525563d4bf0533f995c60e09a8681d69d8f343c4ce2f
                                    • Instruction ID: d6fd9cab018f4407dcabf68726217448494e35b5ff59d082b0df61f0caefb25f
                                    • Opcode Fuzzy Hash: b46c087d044230aeeba4525563d4bf0533f995c60e09a8681d69d8f343c4ce2f
                                    • Instruction Fuzzy Hash: 4322BA74A00219CFCB54DF64ED94AADBBB9FF48301F1095A9E809A7358DB346D89CF41
                                    APIs
                                    • LdrInitializeThunk.NTDLL(00000000), ref: 05ED82B6
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 15d689d6efd82bb4e66ec65a9903bcbc6b049ac9fcd68037ce92e1c512fdf2cf
                                    • Instruction ID: cb3581ea35c4c66ad749b7518688ce6d47c3b9ff433f1a7a37db11950e7702a3
                                    • Opcode Fuzzy Hash: 15d689d6efd82bb4e66ec65a9903bcbc6b049ac9fcd68037ce92e1c512fdf2cf
                                    • Instruction Fuzzy Hash: 8C116A74E091099FDB04DFA8E884EFDFBB5FB88304F54A164E944E7245EB31A942CB60
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (o^q
                                    • API String ID: 0-74704288
                                    • Opcode ID: 1970951268e3e6ed5ff25232b944b173b0077732ae220ef44d472c65f0a0b61f
                                    • Instruction ID: e11a7dbf069026434b93d90f7474d848867536bf614e39ca3281ec3bf5fd060b
                                    • Opcode Fuzzy Hash: 1970951268e3e6ed5ff25232b944b173b0077732ae220ef44d472c65f0a0b61f
                                    • Instruction Fuzzy Hash: 564101327006049FCB04AB68E858AAE7BFAFFC9611F548469D50ADB391CE309C05CBE0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3a56de18fc92bd64105b89a537bf6e58c656d9571763e2448c82e82ebbb21620
                                    • Instruction ID: aefab86bcc27e1510fbf0c15ef30ab9e90e4c72d5d56805af8984c79ec43bcf1
                                    • Opcode Fuzzy Hash: 3a56de18fc92bd64105b89a537bf6e58c656d9571763e2448c82e82ebbb21620
                                    • Instruction Fuzzy Hash: 6DF14C75E002158FCB05CF6CD8889ADBBF6FF88311B5A8469E519AB361CB35EC45CB90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6cc65fa8c7f95ff33565c7a8f17b56d021b6a284e3ac85b1c8600a3cde357ac1
                                    • Instruction ID: dd58aa181a936749e9b477684ba4c70b00ee51e47eb0dc15e2f7d10285e310e8
                                    • Opcode Fuzzy Hash: 6cc65fa8c7f95ff33565c7a8f17b56d021b6a284e3ac85b1c8600a3cde357ac1
                                    • Instruction Fuzzy Hash: E7719D343002058FDB19DF6CC499AAD7BEAAF89601F5540A5E90ACB3B1DB31DC45CBE1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ce4af1cfa438e74ae74b4b711acb5fd51272e00b417a86bc78424549f13c14dd
                                    • Instruction ID: dda74665c7f7a0fb3f8a49da4892d2931f8b7c4e3d1e40aceb810bfe110082c6
                                    • Opcode Fuzzy Hash: ce4af1cfa438e74ae74b4b711acb5fd51272e00b417a86bc78424549f13c14dd
                                    • Instruction Fuzzy Hash: 5851BC342663528FD3103B34B9AC17ABBA5FB4F323745BD41B11F86019CB7068698F62
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 169bfca14f878f1479d17f1737deea5322cad19ffb61b949f95faaf6801f9014
                                    • Instruction ID: 95f41827f105082770ee12a16f1dbec18621588c74b05d4502e1467c6e815046
                                    • Opcode Fuzzy Hash: 169bfca14f878f1479d17f1737deea5322cad19ffb61b949f95faaf6801f9014
                                    • Instruction Fuzzy Hash: B05198342663568FD3103B34BAAC17ABAA5FB5F727741BD01B11F81019CB7068A98F62
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d6d19c47edcb2d3fc2a862af966adad54242375e5f6901565506134cbcdcf3e0
                                    • Instruction ID: 1b7e635309c2be5a3e06becc3e488641e97f9a2709694b23379df84ff106455d
                                    • Opcode Fuzzy Hash: d6d19c47edcb2d3fc2a862af966adad54242375e5f6901565506134cbcdcf3e0
                                    • Instruction Fuzzy Hash: 0C611474E01218DFDB14DFA4D894AADBBB6FF88304F608529E809AB354DB359989CF40
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0421b8bf20c8576b8d8b2d6b26f7b36d6dbc27c26850e22c2b4100282c882a4b
                                    • Instruction ID: 3c750be203cb5ea4a861bb359250697c0ed1f95bcb7ca15cb3afedda936abb5a
                                    • Opcode Fuzzy Hash: 0421b8bf20c8576b8d8b2d6b26f7b36d6dbc27c26850e22c2b4100282c882a4b
                                    • Instruction Fuzzy Hash: 8E518274E012189FDB58DFA9D9849DDBBF2FF89300F249169E819AB364DB30A905CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9180819c501777efa2d2201192db0150e8167fcc1f50f5f837c1f9970662b260
                                    • Instruction ID: 26c896a8af0618b69e5c2a7a71452b1777ae8383cdb8c3b67ccac0da057b7ea5
                                    • Opcode Fuzzy Hash: 9180819c501777efa2d2201192db0150e8167fcc1f50f5f837c1f9970662b260
                                    • Instruction Fuzzy Hash: 2C414F31A01319CFDB04AFA1D89C7FE7BB9EF8A316F406859D10667294CB781A44CF95
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cec09963093d465de2b32290f524581e0e1d56253db75dd13a02dca159de2a16
                                    • Instruction ID: 94b91096a575d71237b436b347cd266f38ff34f48ef85ef5115fa1be2162a425
                                    • Opcode Fuzzy Hash: cec09963093d465de2b32290f524581e0e1d56253db75dd13a02dca159de2a16
                                    • Instruction Fuzzy Hash: E1519175E01208CFCB48DFA9D99489DBBB6FF89300B609069E809AB324DB35AD45CF41
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c85eb7427ca713cd8b0f3a46df88d748b65b599abe83b01e95e3da78c6565c04
                                    • Instruction ID: 47b67d00e9788a02c02e84d92e96b54a2381d2f3c507bd227e8f3a1d96006686
                                    • Opcode Fuzzy Hash: c85eb7427ca713cd8b0f3a46df88d748b65b599abe83b01e95e3da78c6565c04
                                    • Instruction Fuzzy Hash: 7651F275E002089FDB04DFA5D488BEDBBF6EF89310F10902AD519A7394D7785A46CF90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ac4b3db26e1a4b7f5c3d3cbdea2a942c8fad104e85e545cf1cbb526356b53905
                                    • Instruction ID: 69bd72f2e9c97c53b88c637a39bac8007a8ff9d9c09abea6f67cb101d26beea2
                                    • Opcode Fuzzy Hash: ac4b3db26e1a4b7f5c3d3cbdea2a942c8fad104e85e545cf1cbb526356b53905
                                    • Instruction Fuzzy Hash: C1519B74E01228CFCB64DF68D984BEDBBB6BB89305F5054EAD409A7250D735AE85CF80
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 79e25432e96d4659dd32f0b128eb28f4791c93c9cb35ee58f1261384cf6d3518
                                    • Instruction ID: e36c50ca155c4688db99e7f97544c302de6e96f73c585fec7b832bb0479a0f80
                                    • Opcode Fuzzy Hash: 79e25432e96d4659dd32f0b128eb28f4791c93c9cb35ee58f1261384cf6d3518
                                    • Instruction Fuzzy Hash: C441C231A04249DFCF12CFA8C844A9DBFB6FF49319F448556E9199B2A2D335D918CBA0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fa44bc3d61253c4b2e7680f04680b8f711e8eac26cbb0f437fe967e17ffd8707
                                    • Instruction ID: ac15e375b23e1614357604a6bf71d6d1c8ad59198c54493607a3d1e2599a2df6
                                    • Opcode Fuzzy Hash: fa44bc3d61253c4b2e7680f04680b8f711e8eac26cbb0f437fe967e17ffd8707
                                    • Instruction Fuzzy Hash: 9C410D71D042198FDB12DBACDC806ADBFB9FB55300F8485AAD418DB256EB346909CBD1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 159f1b7113a08c693f8d98025780f6b354d6c7a51c5bd79866869841afdbdd2e
                                    • Instruction ID: 7c2721582b4b94a4e8c691bd40ed6a3ba40ed6b3fb68984ffee32b3420ca8d26
                                    • Opcode Fuzzy Hash: 159f1b7113a08c693f8d98025780f6b354d6c7a51c5bd79866869841afdbdd2e
                                    • Instruction Fuzzy Hash: C7418231E002099BDF54DFA6C880ADEBBF6AF89700F149129E515B7380EB70AD46CBD1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5bb2953d2572ef0296c46a8d5268709bd26aa273974e6bce4a31e7926514bc37
                                    • Instruction ID: 48a4df4747d6d0f3afcf74d34d8c7e071069832c39438fc7e48246fd192e41cb
                                    • Opcode Fuzzy Hash: 5bb2953d2572ef0296c46a8d5268709bd26aa273974e6bce4a31e7926514bc37
                                    • Instruction Fuzzy Hash: 0E4125B4D04208CBCB14DFE8E484AADBBF5FB49301FA0A519E41EA7645D7749889CF94
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 68b173ab035bc865af24ea91bf1c8c0bbaee4124e84078cf9308047e97e29fea
                                    • Instruction ID: 653b7c7833f796798304949e0c012fcff393f11c3877b4d45a1a2927feae4298
                                    • Opcode Fuzzy Hash: 68b173ab035bc865af24ea91bf1c8c0bbaee4124e84078cf9308047e97e29fea
                                    • Instruction Fuzzy Hash: 0A4143B0D04208CFCB05DFA8E484AEDBBF5FF4A301FA1A519E409A7655D7349889CFA0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fab69cca075b1c1acce1ef993dae50cef350c9219a29193ed2fd6e24f0a6a40f
                                    • Instruction ID: f7b354a890f2407f52b6cc9a0e22ca8520d00123b7d48e2a4a5eed7fccadfea8
                                    • Opcode Fuzzy Hash: fab69cca075b1c1acce1ef993dae50cef350c9219a29193ed2fd6e24f0a6a40f
                                    • Instruction Fuzzy Hash: 7C41C074E002088FDB44DFA5D5887EDBBF6EF89304F10A02AD919A7394DB785A46CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e854bacf1f25587ec5ddfe997397e70b744943c9e51d3fffb6fc3fda2a3a14f6
                                    • Instruction ID: fd26c53f7179478a181db86d805c265aedbda1cb26e8e5341e81fca946648df5
                                    • Opcode Fuzzy Hash: e854bacf1f25587ec5ddfe997397e70b744943c9e51d3fffb6fc3fda2a3a14f6
                                    • Instruction Fuzzy Hash: E14102B0D01209CFCB04DFE8E488AEDBBF6FB49311FA0A519E409A7655D7349989CF94
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f09cb23fa0fe6e2c766df3174e5e888a62751057cf66727c026d9166212d1ecb
                                    • Instruction ID: 9860d95945c1c686b07796c15d37649bd025100fbe5aac2b61776de9e0593266
                                    • Opcode Fuzzy Hash: f09cb23fa0fe6e2c766df3174e5e888a62751057cf66727c026d9166212d1ecb
                                    • Instruction Fuzzy Hash: FD4138B0D01208CBDB08DFA9D444AEEFBF6FB89301F54E529E808A7654DB749945CF94
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3e0b32e554bae35385f92bf7ba470986e21c440d7c428cb9d701a052dbf24cfe
                                    • Instruction ID: bbad89b4b5c5c16e486a12defb8805b6335b7a1458796ff5c4b3e040eea6ba2a
                                    • Opcode Fuzzy Hash: 3e0b32e554bae35385f92bf7ba470986e21c440d7c428cb9d701a052dbf24cfe
                                    • Instruction Fuzzy Hash: A531827130410A9FCF059F68E854AAE3BABFB48301F548428FA5987351CB79DCA5CBE0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fb2bbb884ce725f3672a0ec25436aecf758761f26bcf47344053b1ab80de5f7b
                                    • Instruction ID: 56a57620a1290d67441b0d05ea18c6cc688b70788f4287c7ebcc15527a7f006c
                                    • Opcode Fuzzy Hash: fb2bbb884ce725f3672a0ec25436aecf758761f26bcf47344053b1ab80de5f7b
                                    • Instruction Fuzzy Hash: C6319C31E01309DFDB009FA1D85C7FEBBB9EF8A315F00A869D10266290CB781A48CF91
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 51e0a53c7c9a9e61fd02eea22e39c0bf4ad54d6045c12c92220c8864c5a912be
                                    • Instruction ID: a237eded90bf3329bfd0139d3f8fa2834cab300d13dbf72cb14f3f8ca4de7ea8
                                    • Opcode Fuzzy Hash: 51e0a53c7c9a9e61fd02eea22e39c0bf4ad54d6045c12c92220c8864c5a912be
                                    • Instruction Fuzzy Hash: A62135353042004BEB2A17BDCC89A393F9BEFC5606B584079C50ACB756EE26CC4AD7C1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5f488a806848c813444eae33703b4bbb692da6ea07533dd0013f45fa3e71fc1d
                                    • Instruction ID: 3f83a7525beece90234b1d6b53baee58abc645820fdca58e894006081a83d4a1
                                    • Opcode Fuzzy Hash: 5f488a806848c813444eae33703b4bbb692da6ea07533dd0013f45fa3e71fc1d
                                    • Instruction Fuzzy Hash: 2C21C371D041098FDB04CFEE98045EEBBFAAFD9300F44E425D508B32A5DB7495098AD1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7c924175b3b3e49eb67994ff6c101cd8fceb5c49cefa914478f89d1d1b4d3916
                                    • Instruction ID: 2ac1c9482ba2372879b081d651c0a59d837fb0a4ad39354a62bbdf8c467eac9f
                                    • Opcode Fuzzy Hash: 7c924175b3b3e49eb67994ff6c101cd8fceb5c49cefa914478f89d1d1b4d3916
                                    • Instruction Fuzzy Hash: 7B31C171A005098FCB04CF6DC8889AEBBBAFF84710B158559E5599B3A5CB30DC46CBD0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 34bd53c863b98ee205fc0887f3815afbfc542f06f5fe375aeae7b8530129887e
                                    • Instruction ID: 0b00c2e7b0fc49dcf8b839b4e472c59af3cd6842fb7a20ddb5235f4bbbe7eb2b
                                    • Opcode Fuzzy Hash: 34bd53c863b98ee205fc0887f3815afbfc542f06f5fe375aeae7b8530129887e
                                    • Instruction Fuzzy Hash: 0D21F5353002044BEB191679C899A7E3A9BDFC4B1AF548478D50ACB799EE26CC86D7C1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bdd7fdf7a1606e72e26bd2fdec4bc4e7cb9bbc12b5c896e41be250f7c3e7093b
                                    • Instruction ID: dd8cfe74685bb72fac1ff0b5d3a310c94cc2c9a4802f9add7c3c114b3aa6848d
                                    • Opcode Fuzzy Hash: bdd7fdf7a1606e72e26bd2fdec4bc4e7cb9bbc12b5c896e41be250f7c3e7093b
                                    • Instruction Fuzzy Hash: 8831C37170410DCFDB15EF68E848BAE7BAAFB88311F144468E9098B244CB78EC95CBD0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 934c4bc37b3155ad157f7f9637fa3778e1a021fade80f7aa407b85891b50bcad
                                    • Instruction ID: 51490c3a44a0c467810810831d9ca31ade7918ad2bbc4430d395b7210658b86a
                                    • Opcode Fuzzy Hash: 934c4bc37b3155ad157f7f9637fa3778e1a021fade80f7aa407b85891b50bcad
                                    • Instruction Fuzzy Hash: 80214B31D102099EDF14EFE8E8056EDFBB8FF5A305F40A525E50877214EB30AA5ACB80
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a09b56adbe390a7ff40af981247ba63022348f55fe40fc1dc3d69b6990c0ef81
                                    • Instruction ID: d448816c09da734e8297f0d9d472b5b92c6e11d60302bd1d969f0ded23f93780
                                    • Opcode Fuzzy Hash: a09b56adbe390a7ff40af981247ba63022348f55fe40fc1dc3d69b6990c0ef81
                                    • Instruction Fuzzy Hash: 7921AE75A002159FCB14DF28C4409AE37AAEB99664F51C059D84E8B240DA39EE46CBD2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4155726907.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_16bd000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ce1544d6955a00789108ecda5ce695d6588f2c03d557b8587db384b214c4f862
                                    • Instruction ID: 57b54f521a49848b9163f3e9352dea741746469002da5d4a3efde1477c64860f
                                    • Opcode Fuzzy Hash: ce1544d6955a00789108ecda5ce695d6588f2c03d557b8587db384b214c4f862
                                    • Instruction Fuzzy Hash: C02100B2504204DFDB05DF58D9C0B66BFA5FB8831CF24C569E90A4E25AC336D496CBA2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: df593afcd4ef0f870c84cf9d348090758edec82559646a8677bd3784c6b1c10f
                                    • Instruction ID: 51fbe90187e7a98a5f05a86166223df2d563b618db6c5e24ba6320ebcbeec57e
                                    • Opcode Fuzzy Hash: df593afcd4ef0f870c84cf9d348090758edec82559646a8677bd3784c6b1c10f
                                    • Instruction Fuzzy Hash: 4E21F3313016118FE715AA29D8A892EB79AFBC9712B468579E90ACB344CF34DC06CBC0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4155780030.00000000016CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_16cd000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8ddd419b8e466e87c4732fb3addab6cee0a4bd6ac887f7a21a6961ee0b8b3519
                                    • Instruction ID: f945f282179693f817a355299977167a17a35e0c3e9a5df9840619f7297f4e2b
                                    • Opcode Fuzzy Hash: 8ddd419b8e466e87c4732fb3addab6cee0a4bd6ac887f7a21a6961ee0b8b3519
                                    • Instruction Fuzzy Hash: E121D071604204EFDB15DF68C984B26BBA5EB84B14F20C57DE9494B352C73AD447CAA2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3b4577b127fa5feff93a7ab06c715cc99b3b0460001f3a4aac528df8a7868d0a
                                    • Instruction ID: 287c8eeaa20d076cd94023f9254e18152e4b0396b97e88ab3cf95c215b420c4a
                                    • Opcode Fuzzy Hash: 3b4577b127fa5feff93a7ab06c715cc99b3b0460001f3a4aac528df8a7868d0a
                                    • Instruction Fuzzy Hash: C7117F35E083899FCB029BB89C108DEBF35FF8A2107158796D627B7191E935280AC392
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: daea554e324c4e1c643eca7182091bb94680718ff07953cd9e87d12ea83cecd6
                                    • Instruction ID: 9255f8ec7c34b79103b7ed68f1e79cdf08391ed7e5c5ae4a5adc3c61c47405ac
                                    • Opcode Fuzzy Hash: daea554e324c4e1c643eca7182091bb94680718ff07953cd9e87d12ea83cecd6
                                    • Instruction Fuzzy Hash: 67112B363082A45FCB466FB858251AE3FA7EFC9250754446DE549DB381DE34CE0283A6
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2498b8897add1736d2d599ddaf3fe9235f8f87c73463712a30b1cf7380a15c89
                                    • Instruction ID: 9709740dc73dae5bbbc32ff320f4b6f70ade3227f8683178de99daa522537dc6
                                    • Opcode Fuzzy Hash: 2498b8897add1736d2d599ddaf3fe9235f8f87c73463712a30b1cf7380a15c89
                                    • Instruction Fuzzy Hash: 0531C478E11309CFCB04DFA8E5948ADBBB6FF49305B2094A9E819AB324D735AD45CF41
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5455a013b4b9c2509896fe8dcbf3151f6741d86bbd9127ebff528cd7cb5d49e2
                                    • Instruction ID: dce2b2b0491d5a8dfb6b7b9ba9d048c6b2dd240d8bff0d025749b22ebd6c4e22
                                    • Opcode Fuzzy Hash: 5455a013b4b9c2509896fe8dcbf3151f6741d86bbd9127ebff528cd7cb5d49e2
                                    • Instruction Fuzzy Hash: 5F116D71D006098BDB08CFEED8446EEBBF6AFC9301F58D025D418A7255D770490A8E90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f0d00d7897a487e097cad8d376c6932f3fe610ed19c5ab98d1daf2d13911c809
                                    • Instruction ID: 61b37255fabddcbc814e3025b2bf60220d22c4555b19706538ed5506c7b1ca94
                                    • Opcode Fuzzy Hash: f0d00d7897a487e097cad8d376c6932f3fe610ed19c5ab98d1daf2d13911c809
                                    • Instruction Fuzzy Hash: 0311A5313042549FD7051B7AAC585EBBAABAFDA350B188476E546C739ADD348C0A8371
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4155726907.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_16bd000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction ID: a09855d83567b6b19ead99407c89e36801a33760260c98f30a610f7707fac4b4
                                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                    • Instruction Fuzzy Hash: 7511AF76504244CFDB16CF54D9C4B56BF61FB84318F28C5A9D9090F257C33AD49ACBA1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 42146425b620d1215ddb0608c58d8d6329a53d82e8bae197495d7a66e8368106
                                    • Instruction ID: 7504f80bc846b589df67966c74583bbb4b33a4b2333a3675b55b2580fead269e
                                    • Opcode Fuzzy Hash: 42146425b620d1215ddb0608c58d8d6329a53d82e8bae197495d7a66e8368106
                                    • Instruction Fuzzy Hash: EE21F474D0520A8FCB05EFA8E8454EDBFF5FF49300F00916AD809B7214EB305A49CBA1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 31a607fd570afaba13bca67f13d8b6622329083dc0c1b149cb69a3090f1eddc2
                                    • Instruction ID: 4dffc719fbf2e34c947f754fceb540f537fcbb1b1097a551d5dd64583c70e877
                                    • Opcode Fuzzy Hash: 31a607fd570afaba13bca67f13d8b6622329083dc0c1b149cb69a3090f1eddc2
                                    • Instruction Fuzzy Hash: 5B11ED72E002118FC790EB7CE408AAA3BF8EF89721B1041A9E50ACB311EB71DD018BD0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: df1de654b95ca25695b9c3218ae7215cf0b184dd7f8aa661f7a072da72aaf3b6
                                    • Instruction ID: c720f89d9cabe7cbc0f22b8f38f4f51cefce399057d933977b79b841e232975f
                                    • Opcode Fuzzy Hash: df1de654b95ca25695b9c3218ae7215cf0b184dd7f8aa661f7a072da72aaf3b6
                                    • Instruction Fuzzy Hash: 5C1167B2800249DFDB10CF9AC944BDEBFF4EB48320F108419E614A7210C379A950CFA5
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 857f180e840fca4a17ed1754a4db15a089ee08cec9d22fc71c4cc6f9dbefdce6
                                    • Instruction ID: 7b650748c7465befddec86ae3284f608db6d22ac9ada1aef602e753dc62d9987
                                    • Opcode Fuzzy Hash: 857f180e840fca4a17ed1754a4db15a089ee08cec9d22fc71c4cc6f9dbefdce6
                                    • Instruction Fuzzy Hash: 271153B6800249DFCB10CF99C944BDEBFF4EF48320F14842AE628A7260C379A550CFA0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8f5fd03e98a6a0c944d409ab0a410c80934f414921530f7b393408ed03baec20
                                    • Instruction ID: 43ad972dc985b1ae9ebf52e7b93de81458690639eea237bdb731a2696db93e47
                                    • Opcode Fuzzy Hash: 8f5fd03e98a6a0c944d409ab0a410c80934f414921530f7b393408ed03baec20
                                    • Instruction Fuzzy Hash: 52113035F001498FEB04DFF9D850BDEBBB6AB88355F00A065F918E7349EB3099428B51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2f2935daf220ee1061eeea3073fb35742c1a7254649b55e131ac6f51e604e125
                                    • Instruction ID: 2a0d9b5c7c25cc2592af8c3214db186c35b14ea64c1846b840568ad6fed0950c
                                    • Opcode Fuzzy Hash: 2f2935daf220ee1061eeea3073fb35742c1a7254649b55e131ac6f51e604e125
                                    • Instruction Fuzzy Hash: D3114C70E002099FDB44DFB8D9906AEBBF6FB48300F00E5A9D0089B314EB345A498B81
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7d246978e33c0afc39866d1c0d278a81f4c5e3a026af3d8a234b863355e503a1
                                    • Instruction ID: 707232a49bf02769ffa53324e9d43ff6be38e906ac78be304b227a9469704035
                                    • Opcode Fuzzy Hash: 7d246978e33c0afc39866d1c0d278a81f4c5e3a026af3d8a234b863355e503a1
                                    • Instruction Fuzzy Hash: 7C01F972B041156FEB159E58AC10AEE3FEBEFD9751B59802AF518C7280CA71CC16C7E1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4155780030.00000000016CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_16cd000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction ID: 87d2a363227bf389374bc08155db796abf3de793e46260c53b34506b0a474179
                                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                    • Instruction Fuzzy Hash: 5B11BB75504284CFDB12CF58C9C4B26BFA2FB84714F24C6AED8494B752C33AD44ACBA2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8cf765f5f735533b5984b59d5d33cfa240d84b5fd1426a5d5d9c9efa5c311ba2
                                    • Instruction ID: 2803d9eb893a1adc808412c1fc5a43177c1df9068899ca69a5d847eb17a64700
                                    • Opcode Fuzzy Hash: 8cf765f5f735533b5984b59d5d33cfa240d84b5fd1426a5d5d9c9efa5c311ba2
                                    • Instruction Fuzzy Hash: 9F214A74D0464A8FCB11EFA8D8485EEBFF5FF49310F1451AAD445BB264EB301A49CB91
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 06e2108e785c4cd461f3c31294d9310ed791dc130c632cdcb04776ebd9c9c670
                                    • Instruction ID: 9483900704cfb07caa7e6964a46d3ab4ca3cd5598645eb64a3374b5ad2cc4c22
                                    • Opcode Fuzzy Hash: 06e2108e785c4cd461f3c31294d9310ed791dc130c632cdcb04776ebd9c9c670
                                    • Instruction Fuzzy Hash: 8A01B671E002199FDF54EFBAD8046EEBBF5BF89200F50856AD419E7250E7389A018FD5
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 238711d8628c3f2dad3f767dd1dcd6f90da2b4f6332038f4ac378c65cdd41348
                                    • Instruction ID: a6c6a5d1d40a26b1e5dd77aa0e6d9c120f37b6fc50922c6314d86f966cb9319f
                                    • Opcode Fuzzy Hash: 238711d8628c3f2dad3f767dd1dcd6f90da2b4f6332038f4ac378c65cdd41348
                                    • Instruction Fuzzy Hash: 60F0E236D142448FDB10CAECBC151BBB7B8EB8A301F449425D608E3251D76495198AC1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f0846589b44f6216d991ba94523edb4513ae0ef3ba8784bc7e2feae7e727268d
                                    • Instruction ID: 4ca4b5946772d710e66547bcc25442d2b9cf1ec2be1ac1492e4ac5c892144901
                                    • Opcode Fuzzy Hash: f0846589b44f6216d991ba94523edb4513ae0ef3ba8784bc7e2feae7e727268d
                                    • Instruction Fuzzy Hash: DEF05C31D406058AD710D9ECBC096FAB3FDA786302F40B024C90CE31D1D770691A86C0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f7db38537b5bd996034fcc9ae931ca1b860bad2ee09cc46f2780f5878c503f2f
                                    • Instruction ID: 41edbea6187db6668a3957b74eb00c4dd261de2ddab98f59b5acd8b2877c1f56
                                    • Opcode Fuzzy Hash: f7db38537b5bd996034fcc9ae931ca1b860bad2ee09cc46f2780f5878c503f2f
                                    • Instruction Fuzzy Hash: 1FF0B4323001187F8B055E999C419AF7EABFBCC210B00442DFA09C3350CE31881197A5
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 313e0b2589bb41d6714d1bfb1b5d42126133e7c8ccf01072675d825f7f1e8b9b
                                    • Instruction ID: 9cf56744a3af8c93a2b83faf858073cffb9af196dda958b190679154863bfcbb
                                    • Opcode Fuzzy Hash: 313e0b2589bb41d6714d1bfb1b5d42126133e7c8ccf01072675d825f7f1e8b9b
                                    • Instruction Fuzzy Hash: FDF03A70A11125CFCB94EFBCC44495E7BF4AF0C21076144A9D509DB721EB30D9058BD0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2493ab38ebc811dec74a182db9ff4609c53b852abe455d8de9537ed135d92103
                                    • Instruction ID: 2187bb823c0c3c9e760f0efe8e853bf264404395883738f63f39653e0cf42a48
                                    • Opcode Fuzzy Hash: 2493ab38ebc811dec74a182db9ff4609c53b852abe455d8de9537ed135d92103
                                    • Instruction Fuzzy Hash: 8BE09232D2476A5BCB029BB0DC004EEBB79EEA7224B444197D5686B042EB70654EC7A2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0aa5da075b224f2c0db903429ceec7cbb8b4f9ad480b825cf504f9b48d8c5571
                                    • Instruction ID: 8d7c647baf868e69dd6ef1840bdce67f511610baa2e69dcf024a6b9548b2e367
                                    • Opcode Fuzzy Hash: 0aa5da075b224f2c0db903429ceec7cbb8b4f9ad480b825cf504f9b48d8c5571
                                    • Instruction Fuzzy Hash: 9FE0DFE2D08144CAE3108BEA68260B8BFF0DDE32517C46487D08D8B969E614E21A9B51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 41ae413569db63f9bf205a942dccbd04d475c7297c6cfb667f0b22e1e1f00889
                                    • Instruction ID: 38500f3bade9f6392afe9a83f925e0f025d31839c3fe1b8d4446b912d8b1d3f2
                                    • Opcode Fuzzy Hash: 41ae413569db63f9bf205a942dccbd04d475c7297c6cfb667f0b22e1e1f00889
                                    • Instruction Fuzzy Hash: 72D01231D2022A578B00AAA5DC044EEB738EE95665B504626D55437140EB70665986A2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                    • Instruction ID: 0dd68462765461d0211461af50d04278b0a0580bc981561cffd664c3dc217d70
                                    • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                    • Instruction Fuzzy Hash: 32C08C3320C1282EA639108F7C40EB3BB8CC3C13F6A650137F95CE3200A8429C8401F8
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b001208461b768be4a3d788a617e8543f85e5fc40512b8f8b05e59d0ffb08111
                                    • Instruction ID: f2158263613f5efa1cdff64e88068277c23cb8ed32f4256e051f4bf997615d59
                                    • Opcode Fuzzy Hash: b001208461b768be4a3d788a617e8543f85e5fc40512b8f8b05e59d0ffb08111
                                    • Instruction Fuzzy Hash: 12D0677AB41018DFCB049F99E8448DDB7B6FB9C221B148126E915A3265C631D921DB54
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 91ae623ee1d16f6c57222c535b180c73be38335fc2d6f0c49458dca38f1d233d
                                    • Instruction ID: b40dd82a310f0542e2aae960a709ab7d03b830e0578e2688418cab3545e212ce
                                    • Opcode Fuzzy Hash: 91ae623ee1d16f6c57222c535b180c73be38335fc2d6f0c49458dca38f1d233d
                                    • Instruction Fuzzy Hash: 95D02B3065C3454FC701F334FD955543B3DFA90304F8045B4E8054E21AEB7C9C4A8792
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 951b9e582fa635f146c803258439d375c14a0590d84fc1cc43ed422083443a56
                                    • Instruction ID: 517b91d618adf595643a514c8d4db9f398fab44be2a2e155212657df9b3ba067
                                    • Opcode Fuzzy Hash: 951b9e582fa635f146c803258439d375c14a0590d84fc1cc43ed422083443a56
                                    • Instruction Fuzzy Hash: 73D06C78D4412C8BCB20EFA8EA456ECB7B0EB9A300F0014E6990DB3610D7705AA48F91
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 71319afc69d14b1841e39ed71a7f330c4f0b2c1108e3c48199e0daa3fbef1367
                                    • Instruction ID: a9e48d6b067b6e5564fa95d31d62167c39030674b0f00e9c228590f306677b7a
                                    • Opcode Fuzzy Hash: 71319afc69d14b1841e39ed71a7f330c4f0b2c1108e3c48199e0daa3fbef1367
                                    • Instruction Fuzzy Hash: 3FC0123024430A4FC501F775FA855A5772EF6D0300F409530A4090A329EF785C8A4795
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: "$Hbq$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q
                                    • API String ID: 0-2450740202
                                    • Opcode ID: 337b59529781c93c0ea47667feea1e0f1a0915235b4414d0fc7d73349c7f8675
                                    • Instruction ID: ac1196733246338c6c2bf0e961dd3e6c10d7f3a474612ee78ca18ab4444bcee9
                                    • Opcode Fuzzy Hash: 337b59529781c93c0ea47667feea1e0f1a0915235b4414d0fc7d73349c7f8675
                                    • Instruction Fuzzy Hash: 4012B2B4E012188FDB58CF69C994BEDBBB2BF89300F1094A9D509A7364DB359E85CF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: .5vq
                                    • API String ID: 0-493797296
                                    • Opcode ID: 2aa20d111f407a160242c1b06bfa4110eb96fe97b927c8f6959ae4f58ea4c8bd
                                    • Instruction ID: 4300ffad04e1b13abaf5070092de298173647e58329369ae99df901088751e9b
                                    • Opcode Fuzzy Hash: 2aa20d111f407a160242c1b06bfa4110eb96fe97b927c8f6959ae4f58ea4c8bd
                                    • Instruction Fuzzy Hash: C052AB74E01228CFDB64DF69D884BADBBB6BB88300F5085E9D409A7354DB359E85CF90
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d685d35b73b05def92fd496b661b08930eb1dd155332930aa946beb402d244f9
                                    • Instruction ID: 8d39936df870f0d6d266ddadacf7455289e5b4ecdab11f0696db20c97271441c
                                    • Opcode Fuzzy Hash: d685d35b73b05def92fd496b661b08930eb1dd155332930aa946beb402d244f9
                                    • Instruction Fuzzy Hash: 54C19D74E00218CFDB14DFA5D984BADBBB6BF88304F2091A9D409AB354DB359E86CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: cef9ef98baa86e03aa1a2af9e1bad3e79e8ae6b283d40a2f2ac5a3491f8bf568
                                    • Instruction ID: cbb327cb572fbf8418982124d1f6c48c0154c4db970e786cb19d76559f72a8fc
                                    • Opcode Fuzzy Hash: cef9ef98baa86e03aa1a2af9e1bad3e79e8ae6b283d40a2f2ac5a3491f8bf568
                                    • Instruction Fuzzy Hash: 8DC19F74E00218CFDB18DFA5D984BADBBB6BF89300F1091A9D809A7354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6104a961ef0c954e423ac2f525b66445386b4ddc0eddbfac679e093ee304a5af
                                    • Instruction ID: 04689eac7416eace2353b9ffc44cfdc253573f04e3e3352db5a4d91edb2026e0
                                    • Opcode Fuzzy Hash: 6104a961ef0c954e423ac2f525b66445386b4ddc0eddbfac679e093ee304a5af
                                    • Instruction Fuzzy Hash: 5AC19E74E00218CFDB14DFA5D984BADBBB6BF88304F2091A9D419AB354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1b178908855865dd91626f1c5f30c66fa4e327f1c680f6e25d7e5dbcad7ad77b
                                    • Instruction ID: 1f5625fc0491460cbcb47257276526a01e1f96d418ff9ead1310c7cac516c3b8
                                    • Opcode Fuzzy Hash: 1b178908855865dd91626f1c5f30c66fa4e327f1c680f6e25d7e5dbcad7ad77b
                                    • Instruction Fuzzy Hash: ADC19D74E00218CFDB14DFA5D984BADBBB6BF88304F2091A9D809AB354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2cc046692a36fac9dc78d62b2470c82d37fc18466a8f6ede44f9bd4c4061bd56
                                    • Instruction ID: 3ed3e4a2232fe805f6e34eb7ed252f9b1be8da61ae7041f4c63f7e82d7cda187
                                    • Opcode Fuzzy Hash: 2cc046692a36fac9dc78d62b2470c82d37fc18466a8f6ede44f9bd4c4061bd56
                                    • Instruction Fuzzy Hash: 0DC19F74E00218CFDB14DFA5D944BADBBB6FB89300F2091A9D809A7355DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e5183611abe74175c650bca0804148dfb0c154740ca1a9bac403a50e4995746b
                                    • Instruction ID: 093c5e5764fc48c2c088b27aa0bdcecc1ba3a9969d29c4859b5facd5e37400e4
                                    • Opcode Fuzzy Hash: e5183611abe74175c650bca0804148dfb0c154740ca1a9bac403a50e4995746b
                                    • Instruction Fuzzy Hash: 87C19E74E00218CFDB14DFA5D984BADBBB6BF88304F2091A9D809AB355DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 15efe459ff085ae7963c7c6693dbd8e5bdc850e13d883d83bd6dee4672e1667e
                                    • Instruction ID: 6319c80e41d4d4fcdcfac17aa94cc050fb8b4e7cb30522dae98e2192db109f9a
                                    • Opcode Fuzzy Hash: 15efe459ff085ae7963c7c6693dbd8e5bdc850e13d883d83bd6dee4672e1667e
                                    • Instruction Fuzzy Hash: F9C19F74E00218CFDB14DFA5D994BADBBB6FB88304F2090A9D409AB355DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 11f655d344df9681a6b4e7969db32a0db8eee2b7ee7db409196d50f0f835e1df
                                    • Instruction ID: 585f1b7c9e56006f9c1049dd453216a0c33b6432cb1a251fa82d135bccca16b5
                                    • Opcode Fuzzy Hash: 11f655d344df9681a6b4e7969db32a0db8eee2b7ee7db409196d50f0f835e1df
                                    • Instruction Fuzzy Hash: 60C19D74E00218CFDB14DFA5D984BADBBB6BF88304F2091A9D809AB354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3d4f0df7da81e2d99e8ef65a6f31e7c92987c12c1f164c98b7f8a25dc12bb4c2
                                    • Instruction ID: 2bb0b36381637a190df445b4ee034208ec7f7de02c0d302b8ae148e2a792e4cb
                                    • Opcode Fuzzy Hash: 3d4f0df7da81e2d99e8ef65a6f31e7c92987c12c1f164c98b7f8a25dc12bb4c2
                                    • Instruction Fuzzy Hash: 3BC1AF74E00218CFDB14DFA5D988BADBBB6FB88304F2490A9D809A7354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b272c9b14aa5f8b6ac5b4fb0ecc9c4232e40e08c56af1f21bc788b1ae6c99483
                                    • Instruction ID: c7798791169393d2ab8b90d4c1e8b15c558e4cd92a113b6e8283edc650ed63b3
                                    • Opcode Fuzzy Hash: b272c9b14aa5f8b6ac5b4fb0ecc9c4232e40e08c56af1f21bc788b1ae6c99483
                                    • Instruction Fuzzy Hash: EEC1AD74E00218CFDB14DFA5D984BADBBB6FB88304F2091A9D409AB354EB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e0c547de8642cf467f3ec33c334d1ade95e0db2399de2233a8e855ebe89c1b70
                                    • Instruction ID: d28e03a957515e82c998202ec7347716696eaa794917c698dcee8ae3a9806e0e
                                    • Opcode Fuzzy Hash: e0c547de8642cf467f3ec33c334d1ade95e0db2399de2233a8e855ebe89c1b70
                                    • Instruction Fuzzy Hash: BCC1AF74E00218CFDB54DFA5D948BADBBB6FB88300F2491A9D809A7354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0cf78c9e60bc2d9e3d2d07ca57081ccce8479e5acc26dca7ec8e16968d5fad35
                                    • Instruction ID: 1c96b2c40ae370750f92c7ed20d0674b949aa8a43a35c149f9080f2a795842d1
                                    • Opcode Fuzzy Hash: 0cf78c9e60bc2d9e3d2d07ca57081ccce8479e5acc26dca7ec8e16968d5fad35
                                    • Instruction Fuzzy Hash: 74C19D74E00218CFDB14DFA5D994BADBBB6BF88304F2091A9D409AB364DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9d3f450bc69381e563286336d0dc60c1c7a93ddd709cadb0736ba75e30a18f95
                                    • Instruction ID: 883c1a1b2223e1f752ac5ea58babad2752fda8bcd7bea3dac067e3ce61b05b68
                                    • Opcode Fuzzy Hash: 9d3f450bc69381e563286336d0dc60c1c7a93ddd709cadb0736ba75e30a18f95
                                    • Instruction Fuzzy Hash: 84C1AF74E00218CFDB14DFA5D988BADBBB6FB89300F1490A9D809AB355DB359D85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d5f8a40444b7b5f10d10fb473843085e547df637b17c0306ac99b86d5e21e602
                                    • Instruction ID: 9690baf7a0c5023d9a52b2ddfed2bb94392c74e4e04256e35d47410427ef8cc8
                                    • Opcode Fuzzy Hash: d5f8a40444b7b5f10d10fb473843085e547df637b17c0306ac99b86d5e21e602
                                    • Instruction Fuzzy Hash: B6C19D74E00218CFDB14DFA5D984BADBBB6BF88304F2091A9D409AB365DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: caca6fe07ade0bd4586be654223fc670d74e97434fc15d7f0a3e425be382d3c9
                                    • Instruction ID: e9ac294ac6acdd487205482260832860d74b60444641145baaa2c2af0d0501f1
                                    • Opcode Fuzzy Hash: caca6fe07ade0bd4586be654223fc670d74e97434fc15d7f0a3e425be382d3c9
                                    • Instruction Fuzzy Hash: D5C18D74E00218CFDB14DFA5D994BADBBB6FB88304F2091A9D809AB354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2b752a0c29029db838c8fc0a475a3ee562568c1905e4442a1e17e16214cfcdde
                                    • Instruction ID: 07b8fa78c4cd4487314dd090472d1cb3aecf3a2aab223c43b220985d78263823
                                    • Opcode Fuzzy Hash: 2b752a0c29029db838c8fc0a475a3ee562568c1905e4442a1e17e16214cfcdde
                                    • Instruction Fuzzy Hash: 78C19D74E00218CFDB14DFA5D984BADBBB6BF88304F2091A9D809AB354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 938d2aff7b47e247913593392a2123376594099655cfced33ed7b30dd4a1acfd
                                    • Instruction ID: 7c382f637c3e55160a0727cb51f45e422331067250080a6149afb747ff4a7c4b
                                    • Opcode Fuzzy Hash: 938d2aff7b47e247913593392a2123376594099655cfced33ed7b30dd4a1acfd
                                    • Instruction Fuzzy Hash: D2C19D74E00218CFDB54DFA5D994BADBBB6BB88304F2090A9D409AB364DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d2c2fb3c668011b2e480c52c24fc6b30254ab4b2a24d3bbf38734f54bc3cb06e
                                    • Instruction ID: 4d10cf3796b62918cb41f106f062e20226da087a4ffd88197305b1d4d490bc47
                                    • Opcode Fuzzy Hash: d2c2fb3c668011b2e480c52c24fc6b30254ab4b2a24d3bbf38734f54bc3cb06e
                                    • Instruction Fuzzy Hash: 56C19E74E00218CFDB14DFA5D994BADBBB6FB88304F2091A9D409AB364DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fc44a6046e45a88c5c35923ad92a37b570ed213c945e5d49f95ac20a22a6a8ab
                                    • Instruction ID: 2c8bc4c8973d53fae7f3b9857f55c23150419a810fbc92d899119799c782abe4
                                    • Opcode Fuzzy Hash: fc44a6046e45a88c5c35923ad92a37b570ed213c945e5d49f95ac20a22a6a8ab
                                    • Instruction Fuzzy Hash: 77C1AD74E00218CFDB14DFA5D984BADBBB6BF88304F2090A9D819AB355DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: df52cf9a3377de253952965eb35215fb62aa7cb922c8b26e06c0f53a4491ee13
                                    • Instruction ID: 67f2acd259f17f433303c51d12ee5b85fc3cef9f01eba12ca684bb027cec3115
                                    • Opcode Fuzzy Hash: df52cf9a3377de253952965eb35215fb62aa7cb922c8b26e06c0f53a4491ee13
                                    • Instruction Fuzzy Hash: 09C19E74E00218CFDB54DFA5D994BADBBB6BF88304F2090A9D409AB354DB359E86CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: efd9761e01e4b457468d14d9b8f73af61ae58a3d8509490125c467e615d243f4
                                    • Instruction ID: b91f4d239640baf38cc6e37e5817ad8197c3e84aa0509aba30970114de25934a
                                    • Opcode Fuzzy Hash: efd9761e01e4b457468d14d9b8f73af61ae58a3d8509490125c467e615d243f4
                                    • Instruction Fuzzy Hash: 78C19E74E00218CFDB14DFA5D984BADBBB6BF88304F2091A9D819AB354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0283e58ffd5bfa070940ed0dbddfe3b0cc7b417b27043ac462cc7f93c438c078
                                    • Instruction ID: 17fac3113a68639a0b6a91504c6b76b0f0dc6755751dec79616e59c0b9bee57f
                                    • Opcode Fuzzy Hash: 0283e58ffd5bfa070940ed0dbddfe3b0cc7b417b27043ac462cc7f93c438c078
                                    • Instruction Fuzzy Hash: A5C1AE74E00218CFEB54DFA5D984BADBBB6EF88304F2091A9D409AB354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8b88b7a85795823f863dde1d027299b7951842948d57baa73408fa3918a4cfc2
                                    • Instruction ID: a1622a47f3c81561724b58206872d1f7f1c12fcad90f327c4eaf2a7c761ca1ee
                                    • Opcode Fuzzy Hash: 8b88b7a85795823f863dde1d027299b7951842948d57baa73408fa3918a4cfc2
                                    • Instruction Fuzzy Hash: D2C1AD74E00218CFDB54DFA5D984BADBBB6EF89304F2090A9D409AB364DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 44cb18fbcd2e2e2e20697f0d39b9d66544ee50292248aec22a7d19c10cb12512
                                    • Instruction ID: fa7cdf47662c6f6dbf6e0a0abd32b7a96f614744ba9e3647a3883e590b438571
                                    • Opcode Fuzzy Hash: 44cb18fbcd2e2e2e20697f0d39b9d66544ee50292248aec22a7d19c10cb12512
                                    • Instruction Fuzzy Hash: FFC19C74E00218CFDB54DFA5D984BADBBB6AF89300F2090A9D409AB364DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: aceb37348ea72e3ae52745b847a775a4441060d34f0d5e8310223c714711757a
                                    • Instruction ID: 62d664e478faacab4e838c24fc0e6771eab1104b961afbcf5034899d31c1911c
                                    • Opcode Fuzzy Hash: aceb37348ea72e3ae52745b847a775a4441060d34f0d5e8310223c714711757a
                                    • Instruction Fuzzy Hash: 87C19D74E00218CFDB54DFA5D984BADBBB6EF88304F2090A9D409AB364DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c685330abfbcc3a798e33e97939adff3d6aa10acf56f2e128fb332b27052fbb6
                                    • Instruction ID: db9417c955152dd2223aa904cc781a61eef8b8a33d45f8b0be9a93d7c8651ff1
                                    • Opcode Fuzzy Hash: c685330abfbcc3a798e33e97939adff3d6aa10acf56f2e128fb332b27052fbb6
                                    • Instruction Fuzzy Hash: EBC1AD74E00218CFDB54DFA5D994BADBBB6EF88304F2090A9D409AB364DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9ec226ecd0ff9c432574326975784524fd3de846e3b89f67c8797afd6f5b257b
                                    • Instruction ID: e44239832d44ef09c7c535cc22ca16f1e4b85fe00533bd89736a9e39cd8003f8
                                    • Opcode Fuzzy Hash: 9ec226ecd0ff9c432574326975784524fd3de846e3b89f67c8797afd6f5b257b
                                    • Instruction Fuzzy Hash: 7AC1AD74E00218CFDB54DFA5D994BADBBB6BF88304F2090A9D409AB358DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b99f2354a4ae078fc00890a59433b8782bb6ca4c8c8860a3bdeea3240e1bd2a5
                                    • Instruction ID: f0bc134cedcd7095c9a0110ead8293589b067c6fa04da966101610e022226e65
                                    • Opcode Fuzzy Hash: b99f2354a4ae078fc00890a59433b8782bb6ca4c8c8860a3bdeea3240e1bd2a5
                                    • Instruction Fuzzy Hash: 33C19E74E00218CFDB54DFA5D984BAEBBB6EB88304F2091A9D409AB354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0285e2dc182d943a417eb5d89e86c99a4fd9ca7fb3496c44532000b01d16e486
                                    • Instruction ID: ae6c8d3145258b71e1e9cfe0fc22c7c95d11525eb72521032adf1fed8c3a984b
                                    • Opcode Fuzzy Hash: 0285e2dc182d943a417eb5d89e86c99a4fd9ca7fb3496c44532000b01d16e486
                                    • Instruction Fuzzy Hash: 64C1AD74E00218CFDB54DFA5D984BADBBB6EF88304F2090A9D809AB354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: aa90aea7a40f9477f6ffb02f2a00b1f324f60353411664cbbf90f1227faf617a
                                    • Instruction ID: 6a72048d1a297495be919d2e743fa4f3f3c5a1f305af18aeea3686c363c263a7
                                    • Opcode Fuzzy Hash: aa90aea7a40f9477f6ffb02f2a00b1f324f60353411664cbbf90f1227faf617a
                                    • Instruction Fuzzy Hash: 5FC19F74E00218CFDB54DFA5D984BAEBBB6EF89304F2090A9D409AB354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fb9beb57f08b2fc833494dc18e9cee7e9723fb7d9e0bdad2fd640d1c0084aaeb
                                    • Instruction ID: 69f4c97f99a7b50886c1ebaf25fbe30515a4c1a3986f999af83b21ad0085e6b9
                                    • Opcode Fuzzy Hash: fb9beb57f08b2fc833494dc18e9cee7e9723fb7d9e0bdad2fd640d1c0084aaeb
                                    • Instruction Fuzzy Hash: 37C19E74E00218CFDB54DFA5D984BADBBB6BF89304F2090A9D409AB364DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 10b3168010ef2604cdf7255f9d41b4218d749f1c30e21d470cc1ef5be1334f0c
                                    • Instruction ID: 4a6540f668aa8a046b797f4ee857ce445d662cb50f83ec0e044529a812d77d60
                                    • Opcode Fuzzy Hash: 10b3168010ef2604cdf7255f9d41b4218d749f1c30e21d470cc1ef5be1334f0c
                                    • Instruction Fuzzy Hash: 5CC19E74E00218CFDB54DFA5D984BADBBB6BF88304F2090A9D409AB355DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ac8b94c580677f28effb90eaa1ab00b80907727ad2c4146e646d7219502b0ab4
                                    • Instruction ID: 10e0587ec18839b5fa10afece73e30ba06e6a4a23f948de29689691ba0470234
                                    • Opcode Fuzzy Hash: ac8b94c580677f28effb90eaa1ab00b80907727ad2c4146e646d7219502b0ab4
                                    • Instruction Fuzzy Hash: F9C19D74E00218CFDB54DFA5D994BADBBB6BF88300F2090A9D819AB354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c9fe52ba4f435f6a6b04a6a9170ac09de5e9c3ca82c11701d81a3c88e198bba4
                                    • Instruction ID: 6c33fce020a9c63888818543243a35a0bf76f190c52fc03bc3f9d9362518fc24
                                    • Opcode Fuzzy Hash: c9fe52ba4f435f6a6b04a6a9170ac09de5e9c3ca82c11701d81a3c88e198bba4
                                    • Instruction Fuzzy Hash: CCC1AD74E00218CFDB54DFA5D984BADBBB6EF88304F2091A9D409AB364DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 01b30092f1fa55000a797d3d25eccea7b61211fda706727d8b222c41f96bffa0
                                    • Instruction ID: 2add081e38deab527c7c58da15a5ffd52630f617a89818cda83b4465ba49a896
                                    • Opcode Fuzzy Hash: 01b30092f1fa55000a797d3d25eccea7b61211fda706727d8b222c41f96bffa0
                                    • Instruction Fuzzy Hash: 4EC1AE74E00218CFDB54DFA5D984BADBBB6EF88300F2090A9D419AB364DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5c3e22a253e0ac188ef93c1934bbc02c10aec42bc26550e76eddc32070069ad8
                                    • Instruction ID: 59c4ee0de0f193f625630da93a1a69ceb138cfe225387581a677053e2c542697
                                    • Opcode Fuzzy Hash: 5c3e22a253e0ac188ef93c1934bbc02c10aec42bc26550e76eddc32070069ad8
                                    • Instruction Fuzzy Hash: 06C1AD74E00218CFDB54DFA5D994BADBBB6EF88300F2090A9D409AB364DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2207e4f4c8831a26e743ce72e3fb407049b422431a78aaa6bd4487eae770a6a6
                                    • Instruction ID: 6f8532c987e4a3c5de39e118de28995592d9b4f02d6f0dc3ed26509408fc6998
                                    • Opcode Fuzzy Hash: 2207e4f4c8831a26e743ce72e3fb407049b422431a78aaa6bd4487eae770a6a6
                                    • Instruction Fuzzy Hash: 07C19E74E00218CFDB54DFA5D984BADBBB6EF88300F2090A9D409AB354DB359E85CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c2d94378f77d8088baa5b8fc21a33b8ca5dec15cb2752ae6b25e4d17bc603601
                                    • Instruction ID: 99e8352885c7f0c88ccb7c8ceef4907c5e453f8002cda735848431af7043011f
                                    • Opcode Fuzzy Hash: c2d94378f77d8088baa5b8fc21a33b8ca5dec15cb2752ae6b25e4d17bc603601
                                    • Instruction Fuzzy Hash: E7B1A274E00218CFDB54DFA9D884A9DBBB2FF89300F2091A9D919AB365DB31AD41CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 02b67a62634e2c7e735fdb4a043988a4dc664e800e6f1e0b47bfd5be6462017e
                                    • Instruction ID: 0b41b323576cbbef901df05f791c17e1aa1c8e3a1a8efd11092e5646133d7160
                                    • Opcode Fuzzy Hash: 02b67a62634e2c7e735fdb4a043988a4dc664e800e6f1e0b47bfd5be6462017e
                                    • Instruction Fuzzy Hash: 01A10270E002088FEB14DFA8D998BDDFBB1BF89304F209269E449A73A1DB745985CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158116171.0000000005ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05ED0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_5ed0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7cf8013029464bb72696b13205b05ff3b61d6a61187b9c937097ee5154e35d1c
                                    • Instruction ID: cecd7916266dce0fde5b4c8654494ef3c2da3e7ae3bac4c9cf94dcb864048888
                                    • Opcode Fuzzy Hash: 7cf8013029464bb72696b13205b05ff3b61d6a61187b9c937097ee5154e35d1c
                                    • Instruction Fuzzy Hash: 2091F374D00208CFEB14DFA8D588BECBBB1FF49314F209269E449AB291DB749985CF64
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 841a087c3794386afd2bee734db906375d6f7d68d7d8fae454f39fbe778cc506
                                    • Instruction ID: de19dd1838285cf457935fa0eb42565ac06b2ab73ccc3198c91e135491da6572
                                    • Opcode Fuzzy Hash: 841a087c3794386afd2bee734db906375d6f7d68d7d8fae454f39fbe778cc506
                                    • Instruction Fuzzy Hash: 39A1AD74A01228CFDB64DF24D984BAABBB2BF49301F5085EAD40DA7354DB319E84CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bc3e14252137ae1cc9c0bf825736c031bfbceee9702d9d2cf35c73cc99da2c0c
                                    • Instruction ID: d0b008c735366f83bb4f008d9ac411a86c67c3ad52b36ff9009101e2971918ae
                                    • Opcode Fuzzy Hash: bc3e14252137ae1cc9c0bf825736c031bfbceee9702d9d2cf35c73cc99da2c0c
                                    • Instruction Fuzzy Hash: 9651A475E006088FDB48DFAAD884A9DBBF2FF8D310F149169E519AB364DB349942CF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b9956bf19a9a384d5ea96715356c31fb177d4b0b716284f9162612af70101f25
                                    • Instruction ID: 82664c7cb2741c0ef81d1ab0255a22cced51e5fd08a2e20d787f79af8ab80be6
                                    • Opcode Fuzzy Hash: b9956bf19a9a384d5ea96715356c31fb177d4b0b716284f9162612af70101f25
                                    • Instruction Fuzzy Hash: E0519D74A01228CFCB65DF24D894BAAB7B2BF4A301F5085E9D40EA7254DB319E85CF51
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4158615978.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_6fb0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d682575faadf8790822a3eff82bf5ab50fe5674585fa4d164f165f6e05efeafe
                                    • Instruction ID: 51049bd7bfe7e5d19bfc9db9da8808f4ddda5e60bb586b789f86eae3ef7cc439
                                    • Opcode Fuzzy Hash: d682575faadf8790822a3eff82bf5ab50fe5674585fa4d164f165f6e05efeafe
                                    • Instruction Fuzzy Hash: 6FD09235D4426DCACB60EFA9E8407EEB7B2FFD6300F4024A6C50CB7650D7309E558A96
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Xbq$Xbq$Xbq$Xbq
                                    • API String ID: 0-2732225958
                                    • Opcode ID: f8848ec9722312e8773fc4c99b19cb2e621f92eff225a5898fae45241acab155
                                    • Instruction ID: 69c7d642107218d4d54ee99336739c098b29ca396a0839b7957e8b2f1af23a8e
                                    • Opcode Fuzzy Hash: f8848ec9722312e8773fc4c99b19cb2e621f92eff225a5898fae45241acab155
                                    • Instruction Fuzzy Hash: 6512493D881362CBCB185FF5994821EBE31BFC9310F99898A9454E62C9DD2FB585C3D2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.4156202377.00000000019A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_19a0000_Order Details.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \;^q$\;^q$\;^q$\;^q
                                    • API String ID: 0-3001612457
                                    • Opcode ID: 616950951fb523236adc6b8a48155151b6af59354ab4d63633e6e48963fece42
                                    • Instruction ID: 21922c11787ed4f9a53e2678f8e63e2fff2eceec2d7f3d2b3b8c1ac4a3020377
                                    • Opcode Fuzzy Hash: 616950951fb523236adc6b8a48155151b6af59354ab4d63633e6e48963fece42
                                    • Instruction Fuzzy Hash: EB01B1317800249FCB648E2EC444D2577FFAF88A61359457AE10ACB3B4DA72DC8987C0