Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Leoch-Purchase Order.exe

Overview

General Information

Sample name:Leoch-Purchase Order.exe
Analysis ID:1427770
MD5:3825ed31a02b3d690c3d43a1e3808d1a
SHA1:82b16668205bd4ca4b5c6119be08a9cfcc5248d6
SHA256:d0bbc42f00f4cf1b59db6e2c2b13fe64bdd85c43e8209493b46119fbcc945db8
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Contains functionality to inject code into remote processes
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample has a suspicious name (potential lure to open the executable)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Leoch-Purchase Order.exe (PID: 7408 cmdline: "C:\Users\user\Desktop\Leoch-Purchase Order.exe" MD5: 3825ED31A02B3D690C3D43A1E3808D1A)
    • Leoch-Purchase Order.exe (PID: 7432 cmdline: "C:\Users\user\Desktop\Leoch-Purchase Order.exe" MD5: 3825ED31A02B3D690C3D43A1E3808D1A)
  • uaAWu.exe (PID: 7628 cmdline: "C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe" MD5: 3825ED31A02B3D690C3D43A1E3808D1A)
    • uaAWu.exe (PID: 7660 cmdline: "C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe" MD5: 3825ED31A02B3D690C3D43A1E3808D1A)
      • WerFault.exe (PID: 7744 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7660 -s 80 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • uaAWu.exe (PID: 7776 cmdline: "C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe" MD5: 3825ED31A02B3D690C3D43A1E3808D1A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.2895870683.000000000334C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.2895748774.0000000002D4C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000007.00000002.2894270079.0000000000436000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000007.00000002.2894270079.0000000000436000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000001.00000002.2895748774.0000000002D21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 14 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Leoch-Purchase Order.exe.3c26140.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.Leoch-Purchase Order.exe.3c26140.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.Leoch-Purchase Order.exe.3c26140.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x339e4:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x33a56:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x33ae0:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x33b72:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x33bdc:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x33c4e:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x33ce4:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x33d74:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                7.2.uaAWu.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  7.2.uaAWu.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 15 entries

                    System Summary

                    barindex
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Leoch-Purchase Order.exe, ProcessId: 7432, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\uaAWu
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 46.175.145.107, DestinationIsIpv6: false, DestinationPort: 25, EventID: 3, Image: C:\Users\user\Desktop\Leoch-Purchase Order.exe, Initiated: true, ProcessId: 7432, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: Leoch-Purchase Order.exeAvira: detected
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeReversingLabs: Detection: 42%
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeVirustotal: Detection: 52%Perma Link
                    Source: Leoch-Purchase Order.exeReversingLabs: Detection: 42%
                    Source: Leoch-Purchase Order.exeVirustotal: Detection: 52%Perma Link
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeJoe Sandbox ML: detected
                    Source: Leoch-Purchase Order.exeJoe Sandbox ML: detected
                    Source: Leoch-Purchase Order.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49732 version: TLS 1.2
                    Source: Leoch-Purchase Order.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.4:49731 -> 46.175.145.107:25
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownDNS traffic detected: queries for: api.ipify.org
                    Source: Leoch-Purchase Order.exe, 00000001.00000002.2895748774.0000000002D4C000.00000004.00000800.00020000.00000000.sdmp, uaAWu.exe, 00000007.00000002.2895870683.000000000334C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.voivocars.com
                    Source: uaAWu.exe, 00000007.00000002.2902710011.0000000006A62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://microsoft.coo
                    Source: Leoch-Purchase Order.exe, 00000001.00000002.2895748774.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, uaAWu.exe, 00000007.00000002.2895870683.00000000032D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: uaAWu.exe, 00000007.00000002.2902710011.0000000006A62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c
                    Source: Leoch-Purchase Order.exe, 00000000.00000002.1655876034.0000000003A74000.00000004.00000800.00020000.00000000.sdmp, Leoch-Purchase Order.exe, 00000000.00000002.1656188733.0000000004F60000.00000040.00001000.00020000.00000000.sdmp, uaAWu.exe, 00000007.00000002.2894270079.0000000000436000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: Leoch-Purchase Order.exe, 00000000.00000002.1655876034.0000000003A74000.00000004.00000800.00020000.00000000.sdmp, Leoch-Purchase Order.exe, 00000000.00000002.1656188733.0000000004F60000.00000040.00001000.00020000.00000000.sdmp, Leoch-Purchase Order.exe, 00000001.00000002.2894274210.0000000000435000.00000040.00000400.00020000.00000000.sdmp, Leoch-Purchase Order.exe, 00000001.00000002.2895748774.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, uaAWu.exe, 00000007.00000002.2895870683.00000000032D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: Leoch-Purchase Order.exe, 00000001.00000002.2895748774.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, uaAWu.exe, 00000007.00000002.2895870683.00000000032D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: Leoch-Purchase Order.exe, 00000001.00000002.2895748774.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, uaAWu.exe, 00000007.00000002.2895870683.00000000032D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49732 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.Leoch-Purchase Order.exe.3beb110.0.raw.unpack, cPKWk.cs.Net Code: aHIKnt
                    Source: 0.2.Leoch-Purchase Order.exe.3c26140.1.raw.unpack, cPKWk.cs.Net Code: aHIKnt
                    Source: 0.2.Leoch-Purchase Order.exe.4f60000.2.raw.unpack, cPKWk.cs.Net Code: aHIKnt

                    System Summary

                    barindex
                    Source: 0.2.Leoch-Purchase Order.exe.3c26140.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Leoch-Purchase Order.exe.4f60000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Leoch-Purchase Order.exe.4f60000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Leoch-Purchase Order.exe.3c26140.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Leoch-Purchase Order.exe.3beb110.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Leoch-Purchase Order.exe.3beb110.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.1656188733.0000000004F60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: initial sampleStatic PE information: Filename: Leoch-Purchase Order.exe
                    Source: Leoch-Purchase Order.exeStatic file information: Suspicious name
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 0_2_00FC0054 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_2_00FC0054
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 0_2_00FC0000 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_2_00FC0000
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 2_2_02570054 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,2_2_02570054
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 2_2_02570000 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,2_2_02570000
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_0164EB001_2_0164EB00
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_01644AA81_2_01644AA8
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_0164ACF01_2_0164ACF0
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_01643E901_2_01643E90
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_016441D81_2_016441D8
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066EA8B41_2_066EA8B4
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066EA5941_2_066EA594
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066EBDE01_2_066EBDE0
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066EDBF01_2_066EDBF0
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066F66C01_2_066F66C0
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066F56B01_2_066F56B0
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066F35781_2_066F3578
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066FC2581_2_066FC258
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066FB2FF1_2_066FB2FF
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066F00401_2_066F0040
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066F7E501_2_066F7E50
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066F77701_2_066F7770
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066FE4801_2_066FE480
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066F00061_2_066F0006
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066F5DAB1_2_066F5DAB
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_0196E5E07_2_0196E5E0
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_0196ABDB7_2_0196ABDB
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_01964AA87_2_01964AA8
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_01963E907_2_01963E90
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_019641D87_2_019641D8
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F6AAAC7_2_06F6AAAC
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F6A78C7_2_06F6A78C
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F6DBD07_2_06F6DBD0
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F766B87_2_06F766B8
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F756A87_2_06F756A8
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F7B2F77_2_06F7B2F7
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F7C2507_2_06F7C250
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F731707_2_06F73170
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F77E487_2_06F77E48
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F777687_2_06F77768
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F7E4787_2_06F7E478
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F723497_2_06F72349
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F700407_2_06F70040
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F75DA37_2_06F75DA3
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F700077_2_06F70007
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7660 -s 80
                    Source: Leoch-Purchase Order.exe, 00000000.00000000.1637100476.00000000006D2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameVbsFjpI.exe< vs Leoch-Purchase Order.exe
                    Source: Leoch-Purchase Order.exe, 00000000.00000002.1655876034.0000000003A74000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamed94471b9-7b46-41e6-9ff5-cfa52fe6c858.exe4 vs Leoch-Purchase Order.exe
                    Source: Leoch-Purchase Order.exe, 00000000.00000002.1654995843.0000000000D2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Leoch-Purchase Order.exe
                    Source: Leoch-Purchase Order.exe, 00000000.00000002.1656188733.0000000004F60000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamed94471b9-7b46-41e6-9ff5-cfa52fe6c858.exe4 vs Leoch-Purchase Order.exe
                    Source: Leoch-Purchase Order.exe, 00000001.00000002.2894458452.0000000000AF9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Leoch-Purchase Order.exe
                    Source: Leoch-Purchase Order.exe, 00000001.00000002.2900059447.00000000064B5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVbsFjpI.ex0 vs Leoch-Purchase Order.exe
                    Source: Leoch-Purchase Order.exe, 00000001.00000002.2894274210.000000000043E000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamed94471b9-7b46-41e6-9ff5-cfa52fe6c858.exe4 vs Leoch-Purchase Order.exe
                    Source: Leoch-Purchase Order.exeBinary or memory string: OriginalFilenameVbsFjpI.exe< vs Leoch-Purchase Order.exe
                    Source: Leoch-Purchase Order.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.Leoch-Purchase Order.exe.3c26140.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Leoch-Purchase Order.exe.4f60000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Leoch-Purchase Order.exe.4f60000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Leoch-Purchase Order.exe.3c26140.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Leoch-Purchase Order.exe.3beb110.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Leoch-Purchase Order.exe.3beb110.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.1656188733.0000000004F60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: Leoch-Purchase Order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: uaAWu.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Leoch-Purchase Order.exe, Ikv.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.Leoch-Purchase Order.exe.3beb110.0.raw.unpack, cPs8D.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Leoch-Purchase Order.exe.3beb110.0.raw.unpack, 72CF8egH.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Leoch-Purchase Order.exe.3beb110.0.raw.unpack, G5CXsdn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Leoch-Purchase Order.exe.3beb110.0.raw.unpack, 3uPsILA6U.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Leoch-Purchase Order.exe.3beb110.0.raw.unpack, 6oQOw74dfIt.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Leoch-Purchase Order.exe.3beb110.0.raw.unpack, aMIWm.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.Leoch-Purchase Order.exe.3beb110.0.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Leoch-Purchase Order.exe.3beb110.0.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/2@2/2
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeFile created: C:\Users\user\AppData\Roaming\uaAWuJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeMutant created: NULL
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7660
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\dc13b0bb-dc88-439c-a2a3-a71d72d2d6fcJump to behavior
                    Source: Leoch-Purchase Order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Leoch-Purchase Order.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Leoch-Purchase Order.exeReversingLabs: Detection: 42%
                    Source: Leoch-Purchase Order.exeVirustotal: Detection: 52%
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeFile read: C:\Users\user\Desktop\Leoch-Purchase Order.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Leoch-Purchase Order.exe "C:\Users\user\Desktop\Leoch-Purchase Order.exe"
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess created: C:\Users\user\Desktop\Leoch-Purchase Order.exe "C:\Users\user\Desktop\Leoch-Purchase Order.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe "C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess created: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe "C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7660 -s 80
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess created: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe "C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess created: C:\Users\user\Desktop\Leoch-Purchase Order.exe "C:\Users\user\Desktop\Leoch-Purchase Order.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess created: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe "C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess created: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe "C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: Leoch-Purchase Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Leoch-Purchase Order.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 0_2_00F41684 push ecx; iretd 0_2_00F41686
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 0_2_00F40971 push ds; iretd 0_2_00F40972
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 0_2_00F4053F pushad ; iretd 0_2_00F4054A
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 0_2_00F40510 push edx; iretd 0_2_00F4051A
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 0_2_00F40A00 push ds; iretd 0_2_00F40A02
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 0_2_00F40A09 push ds; iretd 0_2_00F40A0A
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_01640C3D push edi; ret 1_2_01640CC2
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_01640C95 push edi; retf 1_2_01640C3A
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 1_2_066EFEF0 push es; ret 1_2_066EFEF4
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_0196EE78 push esp; retn 06F0h7_2_0196EF21
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_01960C95 push edi; retf 7_2_01960C3A
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_01960C3D push edi; ret 7_2_01960CC2
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F6FF43 push es; ret 7_2_06F6FF44
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeCode function: 7_2_06F6FF3F push es; ret 7_2_06F6FF40
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeFile created: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeJump to dropped file
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run uaAWuJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run uaAWuJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: iconPdf.png
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeFile opened: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeMemory allocated: F40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeMemory allocated: 2A70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeMemory allocated: 29A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeMemory allocated: 1450000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeMemory allocated: 2CD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeMemory allocated: 1450000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeMemory allocated: AD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeMemory allocated: 26C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeMemory allocated: 46C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeMemory allocated: 1920000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeMemory allocated: 32D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeMemory allocated: 52D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeWindow / User API: threadDelayed 1382Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeWindow / User API: threadDelayed 8471Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeWindow / User API: threadDelayed 5684Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeWindow / User API: threadDelayed 4152Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7464Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep count: 31 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -28592453314249787s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7564Thread sleep count: 1382 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -99875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7564Thread sleep count: 8471 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -99766s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -99656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -99547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -99437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -99327s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -99219s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -99094s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -98984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -98875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -98765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -98656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -98547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -98437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -98328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -98219s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -98109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -98000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -97890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -97764s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -97656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -97547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -97438s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -97313s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -97188s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -97063s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -96938s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -96826s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -96719s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -96594s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -96484s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -96375s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -96266s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -96156s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -96047s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -95937s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -95828s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -95719s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -95594s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -95484s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -95375s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -95265s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -95156s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -95046s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -94937s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -94828s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -94716s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -94609s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exe TID: 7560Thread sleep time: -94500s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7688Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7768Thread sleep count: 199 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep count: 39 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -35971150943733603s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7876Thread sleep count: 5684 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -99891s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7876Thread sleep count: 4152 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -99766s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -99641s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -99531s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -99422s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -99312s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -99203s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -99094s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -98984s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -98849s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -98719s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -98608s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -98267s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -98141s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -98024s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -97441s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -97175s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -96696s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -96578s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -96468s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -96360s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -96118s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -95976s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -95860s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -95750s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -95641s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -95516s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -95406s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -95297s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -95188s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -95063s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -94938s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -94828s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -94719s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -94594s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -94485s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -94360s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -94235s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -94110s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -93941s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -93813s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -93688s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -93563s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -93453s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -93344s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -93219s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -93110s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -92985s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -92860s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe TID: 7872Thread sleep time: -92735s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeLast function: Thread delayed
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 99766Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 99656Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 99547Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 99437Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 99327Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 99219Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 99094Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 98984Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 98875Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 98765Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 98656Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 98547Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 98437Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 98328Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 98219Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 98109Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 98000Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 97890Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 97764Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 97656Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 97547Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 97438Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 97313Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 97188Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 97063Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 96938Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 96826Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 96719Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 96594Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 96484Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 96375Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 96266Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 96156Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 96047Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 95937Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 95828Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 95719Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 95594Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 95484Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 95375Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 95265Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 95156Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 95046Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 94937Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 94828Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 94716Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 94609Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeThread delayed: delay time: 94500Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 99891Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 99766Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 99641Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 99531Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 99422Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 99312Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 99203Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 99094Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 98984Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 98849Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 98719Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 98608Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 98267Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 98141Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 98024Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 97441Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 97175Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 96696Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 96578Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 96468Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 96360Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 96118Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 95976Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 95860Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 95750Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 95641Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 95516Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 95406Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 95297Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 95188Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 95063Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 94938Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 94828Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 94719Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 94594Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 94485Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 94360Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 94235Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 94110Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 93941Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 93813Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 93688Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 93563Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 93453Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 93344Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 93219Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 93110Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 92985Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 92860Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeThread delayed: delay time: 92735Jump to behavior
                    Source: Leoch-Purchase Order.exe, 00000001.00000002.2894928300.0000000000D48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: uaAWu.exe, 00000007.00000002.2895029812.000000000155F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlld
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeCode function: 0_2_00FC0054 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_2_00FC0054
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeMemory written: C:\Users\user\Desktop\Leoch-Purchase Order.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeMemory written: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeProcess created: C:\Users\user\Desktop\Leoch-Purchase Order.exe "C:\Users\user\Desktop\Leoch-Purchase Order.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess created: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe "C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeProcess created: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe "C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeQueries volume information: C:\Users\user\Desktop\Leoch-Purchase Order.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeQueries volume information: C:\Users\user\Desktop\Leoch-Purchase Order.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeQueries volume information: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeQueries volume information: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.3c26140.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.uaAWu.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.4f60000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.4f60000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.3c26140.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.3beb110.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.3beb110.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.2895870683.000000000334C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2895748774.0000000002D4C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2894270079.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2895748774.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1656188733.0000000004F60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2895870683.0000000003321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1655876034.0000000003A74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Leoch-Purchase Order.exe PID: 7408, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Leoch-Purchase Order.exe PID: 7432, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: uaAWu.exe PID: 7776, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\Leoch-Purchase Order.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.3c26140.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.uaAWu.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.4f60000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.4f60000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.3c26140.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.3beb110.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.3beb110.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.2894270079.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2895748774.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1656188733.0000000004F60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2895870683.0000000003321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1655876034.0000000003A74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Leoch-Purchase Order.exe PID: 7408, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Leoch-Purchase Order.exe PID: 7432, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: uaAWu.exe PID: 7776, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.3c26140.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.uaAWu.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.4f60000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.4f60000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.3c26140.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.3beb110.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Leoch-Purchase Order.exe.3beb110.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.2895870683.000000000334C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2895748774.0000000002D4C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2894270079.0000000000436000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2895748774.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1656188733.0000000004F60000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2895870683.0000000003321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1655876034.0000000003A74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Leoch-Purchase Order.exe PID: 7408, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Leoch-Purchase Order.exe PID: 7432, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: uaAWu.exe PID: 7776, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    Registry Run Keys / Startup Folder
                    211
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Registry Run Keys / Startup Folder
                    1
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Software Packing
                    NTDS221
                    Security Software Discovery
                    Distributed Component Object Model1
                    Input Capture
                    23
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Process Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                    Masquerading
                    Cached Domain Credentials151
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items151
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job211
                    Process Injection
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Hidden Files and Directories
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1427770 Sample: Leoch-Purchase Order.exe Startdate: 18/04/2024 Architecture: WINDOWS Score: 100 28 mail.voivocars.com 2->28 30 api.ipify.org 2->30 36 Malicious sample detected (through community Yara rule) 2->36 38 Antivirus / Scanner detection for submitted sample 2->38 40 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->40 42 8 other signatures 2->42 8 uaAWu.exe 2 2->8         started        11 Leoch-Purchase Order.exe 2 2->11         started        signatures3 process4 signatures5 44 Antivirus detection for dropped file 8->44 46 Multi AV Scanner detection for dropped file 8->46 48 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->48 50 Machine Learning detection for dropped file 8->50 13 uaAWu.exe 14 2 8->13         started        16 uaAWu.exe 8->16         started        52 Injects a PE file into a foreign processes 11->52 18 Leoch-Purchase Order.exe 16 5 11->18         started        process6 dnsIp7 54 Tries to harvest and steal browser information (history, passwords, etc) 13->54 22 WerFault.exe 4 16->22         started        32 api.ipify.org 172.67.74.152, 443, 49730, 49732 CLOUDFLARENETUS United States 18->32 34 mail.voivocars.com 46.175.145.107, 25 ASLAGIDKOM-NETUA Ukraine 18->34 24 C:\Users\user\AppData\Roaming\...\uaAWu.exe, PE32 18->24 dropped 26 C:\Users\user\...\uaAWu.exe:Zone.Identifier, ASCII 18->26 dropped 56 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->56 58 Tries to steal Mail credentials (via file / registry access) 18->58 60 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->60 file8 signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Leoch-Purchase Order.exe42%ReversingLabsByteCode-MSIL.Keylogger.KeyBase
                    Leoch-Purchase Order.exe52%VirustotalBrowse
                    Leoch-Purchase Order.exe100%AviraTR/Dropper.MSIL.Gen
                    Leoch-Purchase Order.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe100%AviraTR/Dropper.MSIL.Gen
                    C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe42%ReversingLabsByteCode-MSIL.Keylogger.KeyBase
                    C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe52%VirustotalBrowse
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://www.microsoft.c0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.voivocars.com
                    46.175.145.107
                    truefalse
                      unknown
                      api.ipify.org
                      172.67.74.152
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.orgLeoch-Purchase Order.exe, 00000000.00000002.1655876034.0000000003A74000.00000004.00000800.00020000.00000000.sdmp, Leoch-Purchase Order.exe, 00000000.00000002.1656188733.0000000004F60000.00000040.00001000.00020000.00000000.sdmp, Leoch-Purchase Order.exe, 00000001.00000002.2894274210.0000000000435000.00000040.00000400.00020000.00000000.sdmp, Leoch-Purchase Order.exe, 00000001.00000002.2895748774.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, uaAWu.exe, 00000007.00000002.2895870683.00000000032D1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://mail.voivocars.comLeoch-Purchase Order.exe, 00000001.00000002.2895748774.0000000002D4C000.00000004.00000800.00020000.00000000.sdmp, uaAWu.exe, 00000007.00000002.2895870683.000000000334C000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              http://www.microsoft.cuaAWu.exe, 00000007.00000002.2902710011.0000000006A62000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://account.dyn.com/Leoch-Purchase Order.exe, 00000000.00000002.1655876034.0000000003A74000.00000004.00000800.00020000.00000000.sdmp, Leoch-Purchase Order.exe, 00000000.00000002.1656188733.0000000004F60000.00000040.00001000.00020000.00000000.sdmp, uaAWu.exe, 00000007.00000002.2894270079.0000000000436000.00000040.00000400.00020000.00000000.sdmpfalse
                                high
                                http://microsoft.coouaAWu.exe, 00000007.00000002.2902710011.0000000006A62000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://api.ipify.org/tLeoch-Purchase Order.exe, 00000001.00000002.2895748774.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, uaAWu.exe, 00000007.00000002.2895870683.00000000032D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameLeoch-Purchase Order.exe, 00000001.00000002.2895748774.0000000002CD1000.00000004.00000800.00020000.00000000.sdmp, uaAWu.exe, 00000007.00000002.2895870683.00000000032D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      46.175.145.107
                                      mail.voivocars.comUkraine
                                      56394ASLAGIDKOM-NETUAfalse
                                      172.67.74.152
                                      api.ipify.orgUnited States
                                      13335CLOUDFLARENETUSfalse
                                      Joe Sandbox version:40.0.0 Tourmaline
                                      Analysis ID:1427770
                                      Start date and time:2024-04-18 06:28:08 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 7m 7s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:12
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:Leoch-Purchase Order.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@9/2@2/2
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 142
                                      • Number of non-executed functions: 18
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      05:28:57AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run uaAWu C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe
                                      05:29:05AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run uaAWu C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe
                                      06:28:57API Interceptor176x Sleep call for process: Leoch-Purchase Order.exe modified
                                      06:29:08API Interceptor160x Sleep call for process: uaAWu.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      172.67.74.152Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                      • api.ipify.org/?format=json
                                      Sky-Beta.exeGet hashmaliciousUnknownBrowse
                                      • api.ipify.org/?format=json
                                      Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                                      • api.ipify.org/?format=json
                                      Sky-Beta.exeGet hashmaliciousStealitBrowse
                                      • api.ipify.org/?format=json
                                      SongOfVikings.exeGet hashmaliciousUnknownBrowse
                                      • api.ipify.org/?format=json
                                      SongOfVikings.exeGet hashmaliciousUnknownBrowse
                                      • api.ipify.org/?format=json
                                      Sky-Beta Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                      • api.ipify.org/?format=json
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      api.ipify.orgSecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeGet hashmaliciousAgentTeslaBrowse
                                      • 104.26.12.205
                                      SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeGet hashmaliciousAgentTeslaBrowse
                                      • 104.26.13.205
                                      invoice & packing list.exeGet hashmaliciousAgentTeslaBrowse
                                      • 172.67.74.152
                                      ZG17uv37pi.exeGet hashmaliciousUnknownBrowse
                                      • 104.26.13.205
                                      ZG17uv37pi.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.74.152
                                      Fizetes,jpg.scr.exeGet hashmaliciousAgentTeslaBrowse
                                      • 104.26.12.205
                                      SecuriteInfo.com.FileRepMalware.7644.21541.exeGet hashmaliciousAgentTeslaBrowse
                                      • 104.26.13.205
                                      payload.jsGet hashmaliciousUnknownBrowse
                                      • 104.26.13.205
                                      payload.jsGet hashmaliciousUnknownBrowse
                                      • 172.67.74.152
                                      Payment Advice.exeGet hashmaliciousAgentTeslaBrowse
                                      • 104.26.13.205
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      ASLAGIDKOM-NETUASAMPLE PURCHASE ORDER.exeGet hashmaliciousAgentTeslaBrowse
                                      • 46.175.148.58
                                      Eaton PO-45150292964.exeGet hashmaliciousAgentTeslaBrowse
                                      • 46.175.148.58
                                      remittance payment of invoice DMWW24009.exeGet hashmaliciousAgentTeslaBrowse
                                      • 46.175.148.58
                                      Proforma Invoice - Well Ergon.exeGet hashmaliciousAgentTeslaBrowse
                                      • 46.175.148.58
                                      PURCHASE ORDER.exeGet hashmaliciousAgentTeslaBrowse
                                      • 46.175.148.58
                                      SecuriteInfo.com.Win32.PWSX-gen.14523.13498.exeGet hashmaliciousAgentTeslaBrowse
                                      • 46.175.148.58
                                      order Depeng POORD20231109001.exeGet hashmaliciousAgentTeslaBrowse
                                      • 46.175.148.58
                                      Swift_copy.pdf (2).exeGet hashmaliciousAgentTeslaBrowse
                                      • 46.175.148.58
                                      Swift Copy.exeGet hashmaliciousAgentTeslaBrowse
                                      • 46.175.148.58
                                      purchase_order T&B19-20PO128.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                      • 46.175.148.58
                                      CLOUDFLARENETUSSecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeGet hashmaliciousAgentTeslaBrowse
                                      • 104.26.12.205
                                      https://ortelia.com/download-ortelia-curator/Get hashmaliciousHavocBrowse
                                      • 1.1.1.1
                                      SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeGet hashmaliciousAgentTeslaBrowse
                                      • 104.26.13.205
                                      SecuriteInfo.com.Win64.CrypterX-gen.2144.26023.exeGet hashmaliciousGlupteba, PureLog Stealer, zgRATBrowse
                                      • 104.21.91.214
                                      http://ranchpools.comGet hashmaliciousUnknownBrowse
                                      • 104.19.178.52
                                      invoice & packing list.exeGet hashmaliciousAgentTeslaBrowse
                                      • 172.67.74.152
                                      http://t.cm.morganstanley.com/r/?id=h1b92d14%2C134cc33c%2C1356be32&p1=www.saiengroup.com%2Fteaz%2F648c482b60b3906833c9304bab170add%2FJBVNhz%2FYW15LmNoZW5AZG91YmxlbGluZS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                      • 104.17.25.14
                                      SecuriteInfo.com.Heuristic.HEUR.AGEN.1343277.7061.14046.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.184.140
                                      https://windowdefalerts-error0x21906-alert-virus-detected.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                      • 172.67.176.240
                                      https://windowdefalerts-error0x21903-alert-virus-detected.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                      • 172.66.44.169
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      3b5074b1b5d032e5620f69f9f700ff0eSecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeGet hashmaliciousAgentTeslaBrowse
                                      • 172.67.74.152
                                      SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeGet hashmaliciousAgentTeslaBrowse
                                      • 172.67.74.152
                                      invoice & packing list.exeGet hashmaliciousAgentTeslaBrowse
                                      • 172.67.74.152
                                      ZG17uv37pi.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.74.152
                                      ZG17uv37pi.exeGet hashmaliciousUnknownBrowse
                                      • 172.67.74.152
                                      http://mitchellind.ubpages.com/mi-ind/Get hashmaliciousUnknownBrowse
                                      • 172.67.74.152
                                      Fizetes,jpg.scr.exeGet hashmaliciousAgentTeslaBrowse
                                      • 172.67.74.152
                                      SecuriteInfo.com.FileRepMalware.7644.21541.exeGet hashmaliciousAgentTeslaBrowse
                                      • 172.67.74.152
                                      Payment Advice.exeGet hashmaliciousAgentTeslaBrowse
                                      • 172.67.74.152
                                      Draft Sales contract.exeGet hashmaliciousAgentTeslaBrowse
                                      • 172.67.74.152
                                      No context
                                      Process:C:\Users\user\Desktop\Leoch-Purchase Order.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):354304
                                      Entropy (8bit):6.278387447678832
                                      Encrypted:false
                                      SSDEEP:6144:Xk67U5g5NTax7p9S44HtAs7EgaIgai/rBUEjh7g/+qUMwe/vqtapko+QZKAJ7CZz:d7U25NTaNpkRNA0Jpgdj3VHZ+q7ofZ7U
                                      MD5:3825ED31A02B3D690C3D43A1E3808D1A
                                      SHA1:82B16668205BD4CA4B5C6119BE08A9CFCC5248D6
                                      SHA-256:D0BBC42F00F4CF1B59DB6E2C2B13FE64BDD85C43E8209493B46119FBCC945DB8
                                      SHA-512:3D6CECEA0AA67F3E875107F408D278C45948BA497DEF9FC31C5F2BDCA74DBB98F6CF84D42C7472842897793E637C8CF12139AC1FABE6D75D43618D43980526D6
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 42%
                                      • Antivirus: Virustotal, Detection: 52%, Browse
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....f f.................>...(.......\... ...`....@.. ....................................@.................................h\..S....`...%........................................................................... ............... ..H............text....<... ...>.................. ..`.rsrc....%...`...&...@..............@..@.reloc...............f..............@..B.................\......H.......0*..82..........h7...............................................0..%.......(....s.....s.......s......o....o....*..(....*V.(......}......}....*..0..p..........{;......;......{=...{.....{=...{....r...po....o....}>.....{=...{.....{=...{....r#..po....o....}?......{?....i .....@(....}@......{>....i .....@(....}A....{?.....{@....{?....i(.....{>.....{A....{>....i(.....{=....{@....{A...o....o.......(....->..};.....}B....|<......(...+...Y.{B...............}B.....};.....(.....
                                      Process:C:\Users\user\Desktop\Leoch-Purchase Order.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):6.278387447678832
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:Leoch-Purchase Order.exe
                                      File size:354'304 bytes
                                      MD5:3825ed31a02b3d690c3d43a1e3808d1a
                                      SHA1:82b16668205bd4ca4b5c6119be08a9cfcc5248d6
                                      SHA256:d0bbc42f00f4cf1b59db6e2c2b13fe64bdd85c43e8209493b46119fbcc945db8
                                      SHA512:3d6cecea0aa67f3e875107f408d278c45948ba497def9fc31c5f2bdca74dbb98f6cf84d42c7472842897793e637c8cf12139ac1fabe6d75d43618d43980526d6
                                      SSDEEP:6144:Xk67U5g5NTax7p9S44HtAs7EgaIgai/rBUEjh7g/+qUMwe/vqtapko+QZKAJ7CZz:d7U25NTaNpkRNA0Jpgdj3VHZ+q7ofZ7U
                                      TLSH:A2741207B7856A75C90E477EA0B913B917F58F8E183AE7CF5F2A30625EB73414846B80
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....f f.................>...(.......\... ...`....@.. ....................................@................................
                                      Icon Hash:6aae8e96b2cce892
                                      Entrypoint:0x455cbe
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x66206601 [Thu Apr 18 00:14:57 2024 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x55c680x53.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x560000x2590.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x5a0000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000x53cc40x53e0069579747f4d9cebab2b740e02f5148f6False0.7464313990312966data6.186079411169374IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0x560000x25900x26001c19da615ed3207d93f1d4103c61caddFalse0.4056332236842105data5.535057120154688IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x5a0000xc0x200a5bcb23a7eb88ed3ec009cc0ed30591fFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x561900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.3022983114446529
                                      RT_ICON0x572380x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.5471311475409836
                                      RT_ICON0x57bc00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.5762411347517731
                                      RT_GROUP_ICON0x580280x30data0.875
                                      RT_VERSION0x580580x34cdata0.4146919431279621
                                      RT_MANIFEST0x583a40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampSource PortDest PortSource IPDest IP
                                      Apr 18, 2024 06:28:56.581676006 CEST49730443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:28:56.581768990 CEST44349730172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:28:56.581859112 CEST49730443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:28:56.590650082 CEST49730443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:28:56.590693951 CEST44349730172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:28:56.810285091 CEST44349730172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:28:56.810369015 CEST49730443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:28:56.814024925 CEST49730443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:28:56.814048052 CEST44349730172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:28:56.814318895 CEST44349730172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:28:56.858088017 CEST49730443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:28:56.864695072 CEST49730443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:28:56.912125111 CEST44349730172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:28:57.111253023 CEST44349730172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:28:57.111315012 CEST44349730172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:28:57.111376047 CEST49730443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:28:57.117588997 CEST49730443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:28:57.915863037 CEST4973125192.168.2.446.175.145.107
                                      Apr 18, 2024 06:28:58.920594931 CEST4973125192.168.2.446.175.145.107
                                      Apr 18, 2024 06:29:00.920948982 CEST4973125192.168.2.446.175.145.107
                                      Apr 18, 2024 06:29:04.936471939 CEST4973125192.168.2.446.175.145.107
                                      Apr 18, 2024 06:29:08.511471987 CEST49732443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:29:08.511511087 CEST44349732172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:29:08.511583090 CEST49732443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:29:08.515294075 CEST49732443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:29:08.515336037 CEST44349732172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:29:08.736393929 CEST44349732172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:29:08.736510038 CEST49732443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:29:08.738034010 CEST49732443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:29:08.738078117 CEST44349732172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:29:08.738586903 CEST44349732172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:29:08.780086994 CEST49732443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:29:08.818680048 CEST49732443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:29:08.864121914 CEST44349732172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:29:09.039046049 CEST44349732172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:29:09.039180040 CEST44349732172.67.74.152192.168.2.4
                                      Apr 18, 2024 06:29:09.039347887 CEST49732443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:29:09.041774035 CEST49732443192.168.2.4172.67.74.152
                                      Apr 18, 2024 06:29:09.519710064 CEST4973325192.168.2.446.175.145.107
                                      Apr 18, 2024 06:29:10.530005932 CEST4973325192.168.2.446.175.145.107
                                      Apr 18, 2024 06:29:12.545747042 CEST4973325192.168.2.446.175.145.107
                                      Apr 18, 2024 06:29:12.959635973 CEST4973125192.168.2.446.175.145.107
                                      Apr 18, 2024 06:29:16.548470020 CEST4973325192.168.2.446.175.145.107
                                      Apr 18, 2024 06:29:24.561359882 CEST4973325192.168.2.446.175.145.107
                                      TimestampSource PortDest PortSource IPDest IP
                                      Apr 18, 2024 06:28:56.461325884 CEST6381553192.168.2.41.1.1.1
                                      Apr 18, 2024 06:28:56.565665007 CEST53638151.1.1.1192.168.2.4
                                      Apr 18, 2024 06:28:57.777029991 CEST5260253192.168.2.41.1.1.1
                                      Apr 18, 2024 06:28:57.915131092 CEST53526021.1.1.1192.168.2.4
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Apr 18, 2024 06:28:56.461325884 CEST192.168.2.41.1.1.10xe790Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                      Apr 18, 2024 06:28:57.777029991 CEST192.168.2.41.1.1.10xa9b1Standard query (0)mail.voivocars.comA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Apr 18, 2024 06:28:56.565665007 CEST1.1.1.1192.168.2.40xe790No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                      Apr 18, 2024 06:28:56.565665007 CEST1.1.1.1192.168.2.40xe790No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                      Apr 18, 2024 06:28:56.565665007 CEST1.1.1.1192.168.2.40xe790No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                      Apr 18, 2024 06:28:57.915131092 CEST1.1.1.1192.168.2.40xa9b1No error (0)mail.voivocars.com46.175.145.107A (IP address)IN (0x0001)false
                                      • api.ipify.org
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.449730172.67.74.1524437432C:\Users\user\Desktop\Leoch-Purchase Order.exe
                                      TimestampBytes transferredDirectionData
                                      2024-04-18 04:28:56 UTC155OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                      Host: api.ipify.org
                                      Connection: Keep-Alive
                                      2024-04-18 04:28:57 UTC211INHTTP/1.1 200 OK
                                      Date: Thu, 18 Apr 2024 04:28:57 GMT
                                      Content-Type: text/plain
                                      Content-Length: 12
                                      Connection: close
                                      Vary: Origin
                                      CF-Cache-Status: DYNAMIC
                                      Server: cloudflare
                                      CF-RAY: 8761e93828a91386-ATL
                                      2024-04-18 04:28:57 UTC12INData Raw: 38 31 2e 31 38 31 2e 35 37 2e 35 32
                                      Data Ascii: 81.181.57.52


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.449732172.67.74.1524437776C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe
                                      TimestampBytes transferredDirectionData
                                      2024-04-18 04:29:08 UTC155OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                      Host: api.ipify.org
                                      Connection: Keep-Alive
                                      2024-04-18 04:29:09 UTC211INHTTP/1.1 200 OK
                                      Date: Thu, 18 Apr 2024 04:29:08 GMT
                                      Content-Type: text/plain
                                      Content-Length: 12
                                      Connection: close
                                      Vary: Origin
                                      CF-Cache-Status: DYNAMIC
                                      Server: cloudflare
                                      CF-RAY: 8761e982bc3f44db-ATL
                                      2024-04-18 04:29:09 UTC12INData Raw: 38 31 2e 31 38 31 2e 35 37 2e 35 32
                                      Data Ascii: 81.181.57.52


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:06:28:55
                                      Start date:18/04/2024
                                      Path:C:\Users\user\Desktop\Leoch-Purchase Order.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\Leoch-Purchase Order.exe"
                                      Imagebase:0x6d0000
                                      File size:354'304 bytes
                                      MD5 hash:3825ED31A02B3D690C3D43A1E3808D1A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1656188733.0000000004F60000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1656188733.0000000004F60000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1656188733.0000000004F60000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1655876034.0000000003A74000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1655876034.0000000003A74000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:06:28:55
                                      Start date:18/04/2024
                                      Path:C:\Users\user\Desktop\Leoch-Purchase Order.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\Leoch-Purchase Order.exe"
                                      Imagebase:0x6b0000
                                      File size:354'304 bytes
                                      MD5 hash:3825ED31A02B3D690C3D43A1E3808D1A
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2895748774.0000000002D4C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2895748774.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2895748774.0000000002D21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:false

                                      Target ID:2
                                      Start time:06:29:05
                                      Start date:18/04/2024
                                      Path:C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"
                                      Imagebase:0x360000
                                      File size:354'304 bytes
                                      MD5 hash:3825ED31A02B3D690C3D43A1E3808D1A
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 42%, ReversingLabs
                                      • Detection: 52%, Virustotal, Browse
                                      Reputation:low
                                      Has exited:true

                                      Target ID:3
                                      Start time:06:29:06
                                      Start date:18/04/2024
                                      Path:C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"
                                      Imagebase:0x370000
                                      File size:354'304 bytes
                                      MD5 hash:3825ED31A02B3D690C3D43A1E3808D1A
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:6
                                      Start time:06:29:06
                                      Start date:18/04/2024
                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7660 -s 80
                                      Imagebase:0x610000
                                      File size:483'680 bytes
                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:7
                                      Start time:06:29:07
                                      Start date:18/04/2024
                                      Path:C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\uaAWu\uaAWu.exe"
                                      Imagebase:0xf30000
                                      File size:354'304 bytes
                                      MD5 hash:3825ED31A02B3D690C3D43A1E3808D1A
                                      Has elevated privileges:false
                                      Has administrator privileges:false
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2895870683.000000000334C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2894270079.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2894270079.0000000000436000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2895870683.0000000003321000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2895870683.0000000003321000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:36.3%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:55.3%
                                        Total number of Nodes:114
                                        Total number of Limit Nodes:0
                                        execution_graph 1296 f40fe7 1297 f4102b CallWindowProcA 1296->1297 1298 f41062 1297->1298 1302 f40847 1303 f40857 1302->1303 1305 f4097f CallWindowProcA 1303->1305 1304 f4089f 1305->1304 1177 f40ce0 1178 f40d23 VirtualAlloc 1177->1178 1179 f40d57 1178->1179 1299 f40cdf 1300 f40d23 VirtualAlloc 1299->1300 1301 f40d57 1300->1301 1180 f40848 1181 f40857 1180->1181 1184 f4097f 1181->1184 1185 f409c4 1184->1185 1189 f40a10 1185->1189 1193 f40a0f 1185->1193 1186 f4089f 1190 f40a39 1189->1190 1197 f40a97 1190->1197 1191 f40a53 1191->1191 1194 f40a39 1193->1194 1196 f40a97 CallWindowProcA 1194->1196 1195 f40a53 1195->1195 1196->1195 1198 f40b77 1197->1198 1199 f40ac1 1197->1199 1198->1191 1202 f40d87 1199->1202 1206 f40d88 1199->1206 1203 f40dd5 1202->1203 1210 f40e1c 1203->1210 1207 f40dd5 1206->1207 1209 f40e1c CallWindowProcA 1207->1209 1208 f40dfb 1208->1198 1209->1208 1211 f40e49 1210->1211 1215 f40ea7 1211->1215 1219 f40ea8 1211->1219 1212 f40e63 1217 f40ed1 1215->1217 1218 f40f31 1217->1218 1223 f405b4 1217->1223 1218->1212 1221 f40ed1 1219->1221 1220 f40f31 1220->1212 1221->1220 1222 f405b4 CallWindowProcA 1221->1222 1222->1221 1224 f40fe8 CallWindowProcA 1223->1224 1226 f41062 1224->1226 1226->1217 1227 fc0000 1260 fc0054 1227->1260 1229 fc0006 1292 fc0420 1229->1292 1231 fc0083 1232 fc0420 VirtualAlloc 1231->1232 1233 fc008f 1232->1233 1234 fc0420 VirtualAlloc 1233->1234 1235 fc0098 1234->1235 1236 fc0420 VirtualAlloc 1235->1236 1237 fc00a1 1236->1237 1238 fc0420 VirtualAlloc 1237->1238 1239 fc00aa 1238->1239 1240 fc0420 VirtualAlloc 1239->1240 1241 fc00b6 1240->1241 1242 fc0155 CreateProcessW 1241->1242 1243 fc0170 1242->1243 1244 fc018b NtUnmapViewOfSection 1243->1244 1245 fc019b 1244->1245 1246 fc01b8 VirtualAllocEx 1245->1246 1247 fc01d2 1246->1247 1248 fc0214 WriteProcessMemory 1247->1248 1249 fc0220 1248->1249 1250 fc02fa WriteProcessMemory 1249->1250 1251 fc031e 1249->1251 1250->1249 1252 fc034f Wow64GetThreadContext 1251->1252 1253 fc035e 1252->1253 1254 fc039e WriteProcessMemory 1253->1254 1255 fc03aa 1254->1255 1256 fc03e5 Wow64SetThreadContext 1255->1256 1257 fc03f5 1256->1257 1258 fc0407 ResumeThread 1257->1258 1259 fc0415 1258->1259 1261 fc005e 1260->1261 1262 fc0420 VirtualAlloc 1261->1262 1263 fc0083 1262->1263 1264 fc0420 VirtualAlloc 1263->1264 1265 fc008f 1264->1265 1266 fc0420 VirtualAlloc 1265->1266 1267 fc0098 1266->1267 1268 fc0420 VirtualAlloc 1267->1268 1269 fc00a1 1268->1269 1270 fc0420 VirtualAlloc 1269->1270 1271 fc00aa 1270->1271 1272 fc0420 VirtualAlloc 1271->1272 1273 fc00b6 1272->1273 1274 fc0155 CreateProcessW 1273->1274 1275 fc0170 1274->1275 1276 fc018b NtUnmapViewOfSection 1275->1276 1277 fc019b 1276->1277 1278 fc01b8 VirtualAllocEx 1277->1278 1279 fc01d2 1278->1279 1280 fc0214 WriteProcessMemory 1279->1280 1281 fc0220 1280->1281 1282 fc02fa WriteProcessMemory 1281->1282 1283 fc031e 1281->1283 1282->1281 1284 fc034f Wow64GetThreadContext 1283->1284 1285 fc035e 1284->1285 1286 fc039e WriteProcessMemory 1285->1286 1287 fc03aa 1286->1287 1288 fc03e5 Wow64SetThreadContext 1287->1288 1289 fc03f5 1288->1289 1290 fc0407 ResumeThread 1289->1290 1291 fc0415 1290->1291 1291->1229 1293 fc0427 1292->1293 1294 fc0432 VirtualAlloc 1293->1294 1295 fc044a 1294->1295 1295->1231

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00FC0054: CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?,00000042,0000002A,0000002E,?,16B3FE88,00000000), ref: 00FC0167
                                        • NtUnmapViewOfSection.NTDLL(?,?,0000002E,00000022,?,F21037D0,00000012,?,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 00FC0192
                                        • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040,0000002E,00000022,?,6E1A959C,00000000,?,?,0000002E,00000022,?,F21037D0), ref: 00FC01C9
                                        • WriteProcessMemory.KERNELBASE ref: 00FC0217
                                        • WriteProcessMemory.KERNELBASE(00000026,0000003E,00000026,?,CF14E85B,00000012), ref: 00FC02FD
                                        • Wow64GetThreadContext.KERNEL32(?,?,0000002E,00000032,?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 00FC0355
                                        • WriteProcessMemory.KERNELBASE(?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 00FC03A1
                                        • Wow64SetThreadContext.KERNEL32(?,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000,00000032,0000003A,00000036), ref: 00FC03EC
                                        • ResumeThread.KERNELBASE(?,0000002E,?,9E4A3F88,00000000,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000), ref: 00FC040C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1655372550.0000000000FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_fc0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: Process$MemoryThreadWrite$ContextWow64$AllocCreateResumeSectionUnmapViewVirtual
                                        • String ID:
                                        • API String ID: 2814188497-0
                                        • Opcode ID: 27baaa82f41d3ecd19f90e968c06d5af1b057a91fd3cf35e71022df9cdb30d44
                                        • Instruction ID: fd19c07b37a09a24d9ab70653e6bbf5e48aafb5dfb5a207aa0ac8cc2fa67ef28
                                        • Opcode Fuzzy Hash: 27baaa82f41d3ecd19f90e968c06d5af1b057a91fd3cf35e71022df9cdb30d44
                                        • Instruction Fuzzy Hash: BEC10D74690346FFE619B7B09D47F2A37259F46B08F1480ADF3005F1E3CDAA6812A762
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00FC0420: VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040,?,91AFCA54,00000000,00FC0083,0000003C,0000001E,0000004A,0000003E,00000042), ref: 00FC043F
                                        • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?,00000042,0000002A,0000002E,?,16B3FE88,00000000), ref: 00FC0167
                                        • NtUnmapViewOfSection.NTDLL(?,?,0000002E,00000022,?,F21037D0,00000012,?,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 00FC0192
                                        • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040,0000002E,00000022,?,6E1A959C,00000000,?,?,0000002E,00000022,?,F21037D0), ref: 00FC01C9
                                        • WriteProcessMemory.KERNELBASE ref: 00FC0217
                                        • WriteProcessMemory.KERNELBASE(00000026,0000003E,00000026,?,CF14E85B,00000012), ref: 00FC02FD
                                        • Wow64GetThreadContext.KERNEL32(?,?,0000002E,00000032,?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 00FC0355
                                        • WriteProcessMemory.KERNELBASE(?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 00FC03A1
                                        • Wow64SetThreadContext.KERNEL32(?,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000,00000032,0000003A,00000036), ref: 00FC03EC
                                        • ResumeThread.KERNELBASE(?,0000002E,?,9E4A3F88,00000000,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000), ref: 00FC040C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1655372550.0000000000FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_fc0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: Process$MemoryThreadWrite$AllocContextVirtualWow64$CreateResumeSectionUnmapView
                                        • String ID:
                                        • API String ID: 4009322845-0
                                        • Opcode ID: abefd893c78f63ec501357fb14bf61d80a739cae84c00b71e3bd370fcc70d613
                                        • Instruction ID: e6763e2887ae047884a9ca30ad5db9574be0e998f8129c267e960c28b9943c64
                                        • Opcode Fuzzy Hash: abefd893c78f63ec501357fb14bf61d80a739cae84c00b71e3bd370fcc70d613
                                        • Instruction Fuzzy Hash: 20A1CC74690206FFE519F7F1DE47F2A36159F85B08F20816CF3006F1D2CDAA6D22A661
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 343 f405b4-f41060 CallWindowProcA 346 f41062-f41068 343->346 347 f41069-f4107d 343->347 346->347
                                        APIs
                                        • CallWindowProcA.USER32(?,00000000,?,?,FFFFFFFF), ref: 00F41053
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1655272448.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_f40000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: CallProcWindow
                                        • String ID:
                                        • API String ID: 2714655100-0
                                        • Opcode ID: dcac7cb18ff3aa98516fedc662d4f72786e598877744baaf52eebbd2fec1ffff
                                        • Instruction ID: ebe69a99333bc04a9972500705d73f105769065cffe6e8e82dece9637128cf6e
                                        • Opcode Fuzzy Hash: dcac7cb18ff3aa98516fedc662d4f72786e598877744baaf52eebbd2fec1ffff
                                        • Instruction Fuzzy Hash: 4411D7B5900649DFCB10DF99C844BDEBFF4FB48320F108419EA58A7250C775A944DFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 349 f40fe7-f41023 350 f4102b-f41060 CallWindowProcA 349->350 351 f41062-f41068 350->351 352 f41069-f4107d 350->352 351->352
                                        APIs
                                        • CallWindowProcA.USER32(?,00000000,?,?,FFFFFFFF), ref: 00F41053
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1655272448.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_f40000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: CallProcWindow
                                        • String ID:
                                        • API String ID: 2714655100-0
                                        • Opcode ID: 002395d4f706b0276fdaf4fc501a6d5796c8a1f4f93b2f9cc08c925eb6c7a99f
                                        • Instruction ID: ed719cf0fb8959466c22ff0b5a166ae5b484ce048bac0fd235cd8a0527b74da3
                                        • Opcode Fuzzy Hash: 002395d4f706b0276fdaf4fc501a6d5796c8a1f4f93b2f9cc08c925eb6c7a99f
                                        • Instruction Fuzzy Hash: D011E6B5900249DFCB10DF99D844BDEBFF4FB48320F208419E559A7250C375A584CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 359 f40ce0-f40d55 VirtualAlloc 361 f40d57-f40d5d 359->361 362 f40d5e-f40d72 359->362 361->362
                                        APIs
                                        • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 00F40D48
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1655272448.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_f40000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 2ba029bdd8e40d2da2f98273b833564dac506fb4cab259da58d2a52320bbde14
                                        • Instruction ID: f0d2aa6e5d401a9ff3d8cad9f7740872a7245aaf295e128f5ea65fbcc6f9dcac
                                        • Opcode Fuzzy Hash: 2ba029bdd8e40d2da2f98273b833564dac506fb4cab259da58d2a52320bbde14
                                        • Instruction Fuzzy Hash: 2A11F2B59002489FCB10DF9AC884BDEFFF8EB48320F208419E958A7250C775A984CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 354 f40cdf-f40d55 VirtualAlloc 356 f40d57-f40d5d 354->356 357 f40d5e-f40d72 354->357 356->357
                                        APIs
                                        • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 00F40D48
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1655272448.0000000000F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F40000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_f40000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 45ed66279859901f8fbe97bf594148f07e44fcf13abddfebbcaf560e0489157a
                                        • Instruction ID: 950f3440527f9894385a0225e5520880350b6bc4c3fb171778d862facfafd471
                                        • Opcode Fuzzy Hash: 45ed66279859901f8fbe97bf594148f07e44fcf13abddfebbcaf560e0489157a
                                        • Instruction Fuzzy Hash: EC11F2B59002489FCB20DF9AD884BDEFFF4EB48320F208419E959A7250C775A984CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 364 fc0420-fc044f call fc0419 call fc0450 VirtualAlloc call fc0419
                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040,?,91AFCA54,00000000,00FC0083,0000003C,0000001E,0000004A,0000003E,00000042), ref: 00FC043F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1655372550.0000000000FC0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_fc0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 06eb02c548db0a05d1e20e56bead04f6bc1efedc2ff2b69c3f0a506310807bbb
                                        • Instruction ID: 50dbd9306bdfc6d84441e58e0ec1c8e5204bb51d7e621a2ac9f1bbaff3abe735
                                        • Opcode Fuzzy Hash: 06eb02c548db0a05d1e20e56bead04f6bc1efedc2ff2b69c3f0a506310807bbb
                                        • Instruction Fuzzy Hash: EFD02270184302FAF205FBB14D03F0A3680AF40B0AF40081CF304380E2CDBE981A2256
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 476 ced6cd-ced6ed 477 ced6ef-ced6fa 476->477 478 ced73d-ced745 476->478 479 ced6fc-ced70a 477->479 480 ced732-ced739 477->480 478->477 482 ced710 479->482 480->479 485 ced73b 480->485 484 ced713-ced71b 482->484 486 ced71d-ced725 484->486 487 ced72b-ced730 484->487 485->484 487->486
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1654831260.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ced000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dafd4accf59f1b7249e5b2d6d98c6652f51366f037dc8d9b221c925f74ef15a2
                                        • Instruction ID: d9983b30a900008c278fa3091b2741addc1849112252062c2edbd5e451750af3
                                        • Opcode Fuzzy Hash: dafd4accf59f1b7249e5b2d6d98c6652f51366f037dc8d9b221c925f74ef15a2
                                        • Instruction Fuzzy Hash: 8D01DB710083809AE7105F17CDC4767FFDCEF41324F18C92AED1A4A18AC679D940CA71
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1654831260.0000000000CED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CED000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_ced000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c7179af816175c9b27fb830b38316168cc803905e98ff0c17b9f11945ce263f6
                                        • Instruction ID: 9de22ddfc2ca005b3751a69311c1f2881bdcee6fab03435a6390b7477619d224
                                        • Opcode Fuzzy Hash: c7179af816175c9b27fb830b38316168cc803905e98ff0c17b9f11945ce263f6
                                        • Instruction Fuzzy Hash: AAF06271404384AEE7109B16CD84B66FFA8EF51724F18C45AED594A28AC2799845CA71
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Execution Graph

                                        Execution Coverage:11.1%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:2%
                                        Total number of Nodes:147
                                        Total number of Limit Nodes:10
                                        execution_graph 40142 f2d030 40143 f2d048 40142->40143 40144 f2d0a2 40143->40144 40149 66ea87c 40143->40149 40153 66edbd1 40143->40153 40157 66eda97 40143->40157 40161 66edaa8 40143->40161 40150 66ea887 40149->40150 40165 66ea8b4 40150->40165 40152 66edbe7 40152->40144 40154 66edbe0 40153->40154 40155 66ea8b4 GetModuleHandleW 40154->40155 40156 66edbe7 40155->40156 40156->40144 40158 66edaa5 40157->40158 40159 66ea87c GetModuleHandleW 40158->40159 40160 66edada 40159->40160 40160->40144 40162 66edace 40161->40162 40163 66ea87c GetModuleHandleW 40162->40163 40164 66edada 40163->40164 40164->40144 40166 66ea8bf 40165->40166 40168 66edcb8 40166->40168 40169 66ea6a8 40166->40169 40170 66eb8f8 GetModuleHandleW 40169->40170 40172 66eb96d 40170->40172 40172->40168 40312 66e3418 40313 66e341e DuplicateHandle 40312->40313 40314 66e34ae 40313->40314 40173 1640848 40174 164084e 40173->40174 40175 164091b 40174->40175 40179 66e20c8 40174->40179 40183 66e20b8 40174->40183 40187 164137f 40174->40187 40180 66e20c9 40179->40180 40191 66e1794 40180->40191 40184 66e20c8 40183->40184 40185 66e1794 3 API calls 40184->40185 40186 66e20f8 40185->40186 40186->40174 40189 1641383 40187->40189 40188 1641490 40188->40174 40189->40188 40295 1648250 40189->40295 40192 66e179a 40191->40192 40195 66e2f6c 40192->40195 40194 66e3a7e 40194->40194 40196 66e2f77 40195->40196 40197 66e41a4 40196->40197 40200 66e5a28 40196->40200 40204 66e5a27 40196->40204 40197->40194 40201 66e5a49 40200->40201 40202 66e5a6d 40201->40202 40208 66e5fe0 40201->40208 40202->40197 40206 66e5a28 40204->40206 40205 66e5a6d 40205->40197 40206->40205 40207 66e5fe0 3 API calls 40206->40207 40207->40205 40209 66e5fed 40208->40209 40210 66e6026 40209->40210 40212 66e5bcc 40209->40212 40210->40202 40213 66e5bd7 40212->40213 40215 66e6098 40213->40215 40216 66e5c00 40213->40216 40215->40215 40217 66e5c0b 40216->40217 40223 66e5c10 40217->40223 40219 66e6107 40227 66eb440 40219->40227 40236 66eb428 40219->40236 40220 66e6141 40220->40215 40226 66e5c1b 40223->40226 40224 66e7390 40224->40219 40225 66e5a28 3 API calls 40225->40224 40226->40224 40226->40225 40229 66eb471 40227->40229 40230 66eb571 40227->40230 40228 66eb47d 40228->40220 40229->40228 40244 66eb6a8 40229->40244 40249 66eb6b8 40229->40249 40230->40220 40231 66eb4bd 40253 66ec9b8 40231->40253 40260 66ec9a9 40231->40260 40238 66eb440 40236->40238 40237 66eb47d 40237->40220 40238->40237 40242 66eb6a8 3 API calls 40238->40242 40243 66eb6b8 3 API calls 40238->40243 40239 66eb4bd 40240 66ec9b8 GetModuleHandleW 40239->40240 40241 66ec9a9 GetModuleHandleW 40239->40241 40240->40237 40241->40237 40242->40239 40243->40239 40245 66eb6b8 40244->40245 40267 66eb6f8 40245->40267 40276 66eb708 40245->40276 40246 66eb6c2 40246->40231 40251 66eb6f8 2 API calls 40249->40251 40252 66eb708 2 API calls 40249->40252 40250 66eb6c2 40250->40231 40251->40250 40252->40250 40254 66ec9e3 40253->40254 40285 66ecf20 40254->40285 40290 66ecf10 40254->40290 40255 66eca66 40256 66ea6a8 GetModuleHandleW 40255->40256 40257 66eca92 40255->40257 40256->40257 40261 66ec9b8 40260->40261 40265 66ecf20 GetModuleHandleW 40261->40265 40266 66ecf10 GetModuleHandleW 40261->40266 40262 66eca66 40263 66ea6a8 GetModuleHandleW 40262->40263 40264 66eca92 40262->40264 40263->40264 40265->40262 40266->40262 40268 66eb6fd 40267->40268 40269 66ea6a8 GetModuleHandleW 40268->40269 40271 66eb73c 40268->40271 40270 66eb724 40269->40270 40270->40271 40275 66eb991 GetModuleHandleW 40270->40275 40271->40246 40272 66eb734 40272->40271 40273 66eb940 GetModuleHandleW 40272->40273 40274 66eb96d 40273->40274 40274->40246 40275->40272 40277 66eb719 40276->40277 40280 66eb73c 40276->40280 40278 66ea6a8 GetModuleHandleW 40277->40278 40279 66eb724 40278->40279 40279->40280 40284 66eb991 GetModuleHandleW 40279->40284 40280->40246 40281 66eb734 40281->40280 40282 66eb940 GetModuleHandleW 40281->40282 40283 66eb96d 40282->40283 40283->40246 40284->40281 40286 66ecf4d 40285->40286 40287 66ecfce 40286->40287 40288 66ed080 GetModuleHandleW 40286->40288 40289 66ed090 GetModuleHandleW 40286->40289 40288->40287 40289->40287 40292 66ecf20 40290->40292 40291 66ecfce 40292->40291 40293 66ed080 GetModuleHandleW 40292->40293 40294 66ed090 GetModuleHandleW 40292->40294 40293->40291 40294->40291 40296 164825a 40295->40296 40297 1648274 40296->40297 40300 66ffb0f 40296->40300 40304 66ffb20 40296->40304 40297->40189 40301 66ffb35 40300->40301 40302 66ffd4a 40301->40302 40303 66ffd60 GlobalMemoryStatusEx GlobalMemoryStatusEx 40301->40303 40302->40297 40303->40301 40305 66ffb35 40304->40305 40306 66ffd4a 40305->40306 40307 66ffd60 GlobalMemoryStatusEx GlobalMemoryStatusEx 40305->40307 40306->40297 40307->40305 40315 1648078 40316 1648079 DeleteFileW 40315->40316 40318 16480f7 40316->40318 40308 66ebb60 40309 66ebba8 LoadLibraryExW 40308->40309 40310 66ebba2 40308->40310 40311 66ebbd9 40309->40311 40310->40309 40319 66ed8f0 40320 66ed958 CreateWindowExW 40319->40320 40322 66eda14 40320->40322 40322->40322

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 388 66f3578-66f3599 389 66f359b-66f359e 388->389 390 66f35c4-66f35c7 389->390 391 66f35a0-66f35bf 389->391 392 66f35cd-66f35ec 390->392 393 66f3d68-66f3d6a 390->393 391->390 401 66f35ee-66f35f1 392->401 402 66f3605-66f360f 392->402 394 66f3d6c 393->394 395 66f3d71-66f3d74 393->395 394->395 395->389 397 66f3d7a-66f3d83 395->397 401->402 403 66f35f3-66f3603 401->403 405 66f3615-66f3624 402->405 403->405 516 66f3626 call 66f3d98 405->516 517 66f3626 call 66f3d90 405->517 407 66f362b-66f3630 408 66f363d-66f391a 407->408 409 66f3632-66f3638 407->409 430 66f3d5a-66f3d67 408->430 431 66f3920-66f39cf 408->431 409->397 440 66f39f8 431->440 441 66f39d1-66f39f6 431->441 443 66f3a01-66f3a14 440->443 441->443 445 66f3a1a-66f3a3c call 66f3164 443->445 446 66f3d41-66f3d4d 443->446 445->446 450 66f3a42-66f3a4c 445->450 446->431 447 66f3d53 446->447 447->430 450->446 451 66f3a52-66f3a5d 450->451 451->446 452 66f3a63-66f3b39 451->452 464 66f3b3b-66f3b3d 452->464 465 66f3b47-66f3b77 452->465 464->465 469 66f3b79-66f3b7b 465->469 470 66f3b85-66f3b91 465->470 469->470 471 66f3b93-66f3b97 470->471 472 66f3bf1-66f3bf5 470->472 471->472 475 66f3b99-66f3bc3 471->475 473 66f3bfb-66f3c37 472->473 474 66f3d32-66f3d3b 472->474 486 66f3c39-66f3c3b 473->486 487 66f3c45-66f3c53 473->487 474->446 474->452 482 66f3bc5-66f3bc7 475->482 483 66f3bd1-66f3bee call 66f3170 475->483 482->483 483->472 486->487 490 66f3c6a-66f3c75 487->490 491 66f3c55-66f3c60 487->491 494 66f3c8d-66f3c9e 490->494 495 66f3c77-66f3c7d 490->495 491->490 496 66f3c62 491->496 500 66f3cb6-66f3cc2 494->500 501 66f3ca0-66f3ca6 494->501 497 66f3c7f 495->497 498 66f3c81-66f3c83 495->498 496->490 497->494 498->494 505 66f3cda-66f3d2b 500->505 506 66f3cc4-66f3cca 500->506 502 66f3caa-66f3cac 501->502 503 66f3ca8 501->503 502->500 503->500 505->474 507 66f3cce-66f3cd0 506->507 508 66f3ccc 506->508 507->505 508->505 516->407 517->407
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                        • API String ID: 0-2392861976
                                        • Opcode ID: e82a68afd4530c58e2c913dfba133e3812704e8d50acd31df4bcaf393acee03d
                                        • Instruction ID: 658d7ce8ca38a10987cb733564f9c0f589998fd4ec974183ea5dbc6f69a084cb
                                        • Opcode Fuzzy Hash: e82a68afd4530c58e2c913dfba133e3812704e8d50acd31df4bcaf393acee03d
                                        • Instruction Fuzzy Hash: F1321D31E2061A8FCB54EF75C89459DB7B6BF89300F14C6A9D509BB364EB30AD85CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1060 66f7e50-66f7e6e 1061 66f7e70-66f7e73 1060->1061 1062 66f7e8a-66f7e8d 1061->1062 1063 66f7e75-66f7e83 1061->1063 1064 66f7e8f-66f7eab 1062->1064 1065 66f7eb0-66f7eb3 1062->1065 1071 66f7ef6-66f7f0c 1063->1071 1072 66f7e85 1063->1072 1064->1065 1066 66f7eb5-66f7ebf 1065->1066 1067 66f7ec0-66f7ec3 1065->1067 1069 66f7ec5-66f7edf 1067->1069 1070 66f7ee4-66f7ee6 1067->1070 1069->1070 1074 66f7eed-66f7ef0 1070->1074 1075 66f7ee8 1070->1075 1079 66f8127-66f8131 1071->1079 1080 66f7f12-66f7f1b 1071->1080 1072->1062 1074->1061 1074->1071 1075->1074 1081 66f8132-66f8167 1080->1081 1082 66f7f21-66f7f3e 1080->1082 1086 66f8169-66f816c 1081->1086 1092 66f8114-66f8121 1082->1092 1093 66f7f44-66f7f6c 1082->1093 1088 66f8172-66f8181 1086->1088 1089 66f83a1-66f83a4 1086->1089 1101 66f8183-66f819e 1088->1101 1102 66f81a0-66f81e4 1088->1102 1090 66f83c7-66f83ca 1089->1090 1091 66f83a6-66f83c2 1089->1091 1094 66f8475-66f8477 1090->1094 1095 66f83d0-66f83dc 1090->1095 1091->1090 1092->1079 1092->1080 1093->1092 1117 66f7f72-66f7f7b 1093->1117 1098 66f847e-66f8481 1094->1098 1099 66f8479 1094->1099 1104 66f83e7-66f83e9 1095->1104 1098->1086 1103 66f8487-66f8490 1098->1103 1099->1098 1101->1102 1115 66f81ea-66f81fb 1102->1115 1116 66f8375-66f838b 1102->1116 1105 66f83eb-66f83f1 1104->1105 1106 66f8401-66f8405 1104->1106 1111 66f83f5-66f83f7 1105->1111 1112 66f83f3 1105->1112 1113 66f8407-66f8411 1106->1113 1114 66f8413 1106->1114 1111->1106 1112->1106 1119 66f8418-66f841a 1113->1119 1114->1119 1127 66f8201-66f821e 1115->1127 1128 66f8360-66f836f 1115->1128 1116->1089 1117->1081 1121 66f7f81-66f7f9d 1117->1121 1122 66f841c-66f841f 1119->1122 1123 66f842b-66f8464 1119->1123 1130 66f7fa3-66f7fcd 1121->1130 1131 66f8102-66f810e 1121->1131 1122->1103 1123->1088 1143 66f846a-66f8474 1123->1143 1127->1128 1139 66f8224-66f831a call 66f6670 1127->1139 1128->1115 1128->1116 1144 66f80f8-66f80fd 1130->1144 1145 66f7fd3-66f7ffb 1130->1145 1131->1092 1131->1117 1193 66f831c-66f8326 1139->1193 1194 66f8328 1139->1194 1144->1131 1145->1144 1152 66f8001-66f802f 1145->1152 1152->1144 1157 66f8035-66f803e 1152->1157 1157->1144 1158 66f8044-66f8076 1157->1158 1166 66f8078-66f807c 1158->1166 1167 66f8081-66f809d 1158->1167 1166->1144 1169 66f807e 1166->1169 1167->1131 1170 66f809f-66f80f6 call 66f6670 1167->1170 1169->1167 1170->1131 1195 66f832d-66f832f 1193->1195 1194->1195 1195->1128 1196 66f8331-66f8336 1195->1196 1197 66f8338-66f8342 1196->1197 1198 66f8344 1196->1198 1199 66f8349-66f834b 1197->1199 1198->1199 1199->1128 1200 66f834d-66f8359 1199->1200 1200->1128
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q
                                        • API String ID: 0-355816377
                                        • Opcode ID: 15fcecad2ca0c5325a01bdaa55db3003af67b2225080bf8994b456a346cf41b2
                                        • Instruction ID: 518feb35cd75eb2b7e01922016e8ecd7f89ed99ef28848ea8e80c6d00f90b9ce
                                        • Opcode Fuzzy Hash: 15fcecad2ca0c5325a01bdaa55db3003af67b2225080bf8994b456a346cf41b2
                                        • Instruction Fuzzy Hash: 0002AE31B102059FDB54DB68D980AAEBBF2FF84304F148569E505EB394DB35EC86CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2895489172.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_1640000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 89c96bc5d40636394d7eea2952d099f8b2b1271867b17fedf2724f7f46a613e0
                                        • Instruction ID: 5c65417908433c44620b76a006228082b0ff493f5c29224897b15b6edce47b3c
                                        • Opcode Fuzzy Hash: 89c96bc5d40636394d7eea2952d099f8b2b1271867b17fedf2724f7f46a613e0
                                        • Instruction Fuzzy Hash: AC63E831D10B1A8EDB51EB68C880599F7B1FF99300F15D79AE458B7221EB70AAC5CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1870 164eb00-164eb22 1871 164eb24-164eb4f 1870->1871 1872 164eb86-164eb8d 1870->1872 1877 164eb56-164eb63 1871->1877 1879 164eb65-164eb7e 1877->1879 1880 164eb8e-164ebf5 1877->1880 1879->1872 1890 164ebf7-164ebf9 1880->1890 1891 164ebfe-164ec0e 1880->1891 1892 164ee9d-164eea4 1890->1892 1893 164ec15-164ec25 1891->1893 1894 164ec10 1891->1894 1896 164ee84-164ee92 1893->1896 1897 164ec2b-164ec39 1893->1897 1894->1892 1900 164ee94-164ee98 call 1647b88 1896->1900 1901 164eea5-164ef1e 1896->1901 1897->1901 1902 164ec3f 1897->1902 1900->1892 1902->1901 1904 164ec46-164ec58 1902->1904 1905 164ed42-164ed6a 1902->1905 1906 164ec83-164eca5 1902->1906 1907 164ed6f-164ed97 1902->1907 1908 164ee09-164ee35 1902->1908 1909 164ecaa-164eccb 1902->1909 1910 164ee54-164ee76 1902->1910 1911 164ecf6-164ed17 1902->1911 1912 164ee37-164ee52 call 1640350 1902->1912 1913 164ecd0-164ecf1 1902->1913 1914 164ed1c-164ed3d 1902->1914 1915 164ed9c-164edd9 1902->1915 1916 164ec5d-164ec7e 1902->1916 1917 164edde-164ee04 1902->1917 1918 164ee78-164ee82 1902->1918 1904->1892 1905->1892 1906->1892 1907->1892 1908->1892 1909->1892 1910->1892 1911->1892 1912->1892 1913->1892 1914->1892 1915->1892 1916->1892 1917->1892 1918->1892
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2895489172.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_1640000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: Xbq$$^q
                                        • API String ID: 0-1593437937
                                        • Opcode ID: cf9bed7a31870ec440ff63aca51199c658f54077bc854eaf061bbc4623508f59
                                        • Instruction ID: 5f3115f6928eb9311c58de0106c7261fde254f04e4515c237b5aa44c7cb8dec7
                                        • Opcode Fuzzy Hash: cf9bed7a31870ec440ff63aca51199c658f54077bc854eaf061bbc4623508f59
                                        • Instruction Fuzzy Hash: 85B1C674B042189BDB18AF799C6467E7BB7BFC8710B04892EE446D7398CE35CC029796
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8a735248b930427bcb143fdbe4b9681e327e556993ba40e373635e9ea80430f4
                                        • Instruction ID: e8981b8f07b16aa96b91348cc916e125b99b3d5eb12740d40f3bda399a583a96
                                        • Opcode Fuzzy Hash: 8a735248b930427bcb143fdbe4b9681e327e556993ba40e373635e9ea80430f4
                                        • Instruction Fuzzy Hash: 10230B31D20B198ECB15EF68C89059DF7B1FF99300F14D69AE558B7221EB70AAC5CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7864bba57ead5a452e8d02eb134b5dc001913cba04f8138d6c3151d7ebcb9820
                                        • Instruction ID: 0ddf731fedc54005e34505d96c41d6fb8db31e5d60095faf6be7f5a01b280afa
                                        • Opcode Fuzzy Hash: 7864bba57ead5a452e8d02eb134b5dc001913cba04f8138d6c3151d7ebcb9820
                                        • Instruction Fuzzy Hash: 8062E230B102049FDB54DB68D994AADBBF2FF88314F148469E50AEB354DB35ED86CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ef93218dedb635184df6b599d0fe0d79c47e2f25f76c4acc9a1381f355660fcd
                                        • Instruction ID: 1e4ede25b5e9a68c914b56ee6e656ddbc81642509f432c7e568c38e060dfeaeb
                                        • Opcode Fuzzy Hash: ef93218dedb635184df6b599d0fe0d79c47e2f25f76c4acc9a1381f355660fcd
                                        • Instruction Fuzzy Hash: 8732AF35B202099FDB54DB68E990BAEBBB2FB88310F108529E505E7354DB35EC46CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 18f3402ae056520cc0d2a67411278b678606ee669d0f3c72791dd43fad8d2806
                                        • Instruction ID: 276f8ce9b017d4a3c1691f04f62931e47ae6c9d5e10f6ff0081212cba851f5f5
                                        • Opcode Fuzzy Hash: 18f3402ae056520cc0d2a67411278b678606ee669d0f3c72791dd43fad8d2806
                                        • Instruction Fuzzy Hash: 92121531F202159BDF24DF64D8806AEB7B2EB95310F208429EA5BDB345CB34EC46CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b741cfe5bb70faea1b77764a012c8ed38572d97ae42a4192fe75503a00effa71
                                        • Instruction ID: 26c89cc0da31dfb121b310c25fab64c3c9672b09b7e7836ee6dc5c1d47964528
                                        • Opcode Fuzzy Hash: b741cfe5bb70faea1b77764a012c8ed38572d97ae42a4192fe75503a00effa71
                                        • Instruction Fuzzy Hash: BE227230E202099FDF64DF68D9807ADB7B6FB85310F248826E509EB395DA35DC81CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2895489172.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_1640000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 261d2d0f31d54fb0909ee4e0dc7acc23d88b2ac923ad847f11fcaadfa02d894e
                                        • Instruction ID: 50c1bf3d6800c6a61f73f9987dac1ff1dc6df4f71238faa1f3328957a243f6e3
                                        • Opcode Fuzzy Hash: 261d2d0f31d54fb0909ee4e0dc7acc23d88b2ac923ad847f11fcaadfa02d894e
                                        • Instruction Fuzzy Hash: 93B14B71E002198FDB14CFA9DC827DDBBF2AF88314F188529D855A7394EF749885CB85
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900655022.00000000066E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66e0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7b82dcfc28b8469c59fe274c11301c711bbc865d20203f274552d75459780855
                                        • Instruction ID: c835628353951194e7427de3556799288954c253c7798da179a5d06c8d9d57c6
                                        • Opcode Fuzzy Hash: 7b82dcfc28b8469c59fe274c11301c711bbc865d20203f274552d75459780855
                                        • Instruction Fuzzy Hash: 09A18F75E003199FCB44DFA4D884ADDFBBAFF89310F148219E419AB3A4DB30A946CB50
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2895489172.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_1640000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5ac79d1feed583f2299451bfb6920fbbbe054b4c389722cfd985ffc5d77aab7e
                                        • Instruction ID: b1bc051b79bd1806193cee0aae26760f17a71d9f4998c3fc70c43fa398940956
                                        • Opcode Fuzzy Hash: 5ac79d1feed583f2299451bfb6920fbbbe054b4c389722cfd985ffc5d77aab7e
                                        • Instruction Fuzzy Hash: 29914A70E002199FDF14CFA9C9857EEBBF2BF98714F148129E855A7394EB349885CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900655022.00000000066E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66e0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8134afef3092af5387b828ec438abb5b4e242686e5bf655448c5623a7afb4c08
                                        • Instruction ID: a35f56837deb72de3f01b86428fea303615a1aa53e29e54c11907299068a81a4
                                        • Opcode Fuzzy Hash: 8134afef3092af5387b828ec438abb5b4e242686e5bf655448c5623a7afb4c08
                                        • Instruction Fuzzy Hash: 4D917F75E0031ADFCB44DFA0D8449DDFBBAFF99310B148215E519AB3A4DB70A986CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 263 66fada8-66fadc6 264 66fadc8-66fadcb 263->264 265 66fadee-66fadf1 264->265 266 66fadcd-66fade9 264->266 267 66fae0b-66fae0e 265->267 268 66fadf3-66fadfc 265->268 266->265 271 66fafc5-66fafce 267->271 272 66fae14-66fae17 267->272 269 66fafdf-66fb016 268->269 270 66fae02-66fae06 268->270 282 66fb018-66fb01b 269->282 270->267 271->268 275 66fafd4-66fafde 271->275 276 66fae19-66fae1e 272->276 277 66fae21-66fae24 272->277 276->277 279 66fae3e-66fae41 277->279 280 66fae26-66fae39 277->280 283 66fae43-66fae4c 279->283 284 66fae51-66fae54 279->284 280->279 285 66fb03e-66fb041 282->285 286 66fb01d-66fb039 282->286 283->284 288 66fae68-66fae6b 284->288 289 66fae56-66fae63 284->289 292 66fb04e-66fb051 285->292 293 66fb043-66fb04d 285->293 286->285 290 66fae6d-66fae71 288->290 291 66fae7c-66fae7e 288->291 289->288 290->275 294 66fae77 290->294 295 66fae85-66fae88 291->295 296 66fae80 291->296 298 66fb2ba-66fb2bd 292->298 299 66fb057-66fb092 292->299 294->291 295->264 303 66fae8e-66faeb2 295->303 296->295 301 66fb2bf-66fb2c3 298->301 302 66fb2ce-66fb2d1 298->302 312 66fb098-66fb0a4 299->312 313 66fb285-66fb298 299->313 301->299 304 66fb2c9 301->304 305 66fb2d3 call 66fb2ff 302->305 306 66fb2e0-66fb2e2 302->306 321 66faeb8-66faec7 303->321 322 66fafc2 303->322 304->302 315 66fb2d9-66fb2db 305->315 310 66fb2e9-66fb2ec 306->310 311 66fb2e4 306->311 310->282 316 66fb2f2-66fb2fc 310->316 311->310 319 66fb0a6-66fb0bf 312->319 320 66fb0c4-66fb108 312->320 314 66fb29a 313->314 314->298 315->306 319->314 338 66fb10a-66fb11c 320->338 339 66fb124-66fb163 320->339 325 66faedf-66faf1a call 66f6670 321->325 326 66faec9-66faecf 321->326 322->271 345 66faf1c-66faf22 325->345 346 66faf32-66faf49 325->346 328 66faed3-66faed5 326->328 329 66faed1 326->329 328->325 329->325 338->339 343 66fb24a-66fb25f 339->343 344 66fb169-66fb244 call 66f6670 339->344 343->313 344->343 349 66faf26-66faf28 345->349 350 66faf24 345->350 356 66faf4b-66faf51 346->356 357 66faf61-66faf72 346->357 349->346 350->346 358 66faf55-66faf57 356->358 359 66faf53 356->359 362 66faf8a-66fafbb 357->362 363 66faf74-66faf7a 357->363 358->357 359->357 362->322 365 66faf7e-66faf80 363->365 366 66faf7c 363->366 365->362 366->362
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                        • API String ID: 0-3823777903
                                        • Opcode ID: 5d15e2dcedb9cf4fb6211c432710c1887800c94473850ac07c84cec69518f839
                                        • Instruction ID: 6bb15b9e12f7f2dd229d1e4f22c002946296a33a8f778cfeb75c6d45764f81b8
                                        • Opcode Fuzzy Hash: 5d15e2dcedb9cf4fb6211c432710c1887800c94473850ac07c84cec69518f839
                                        • Instruction Fuzzy Hash: 08E15030E202098FCB65DFA9D9846AEB7B2FF85304F108529E509EB354DB75DC46CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 518 66fb720-66fb742 519 66fb744-66fb747 518->519 520 66fb7ab-66fb7ae 519->520 521 66fb749-66fb7a6 call 66f6670 519->521 522 66fb7c5-66fb7c8 520->522 523 66fb7b0-66fb7b3 520->523 521->520 525 66fb7df-66fb7e2 522->525 526 66fb7ca-66fb7ce 522->526 527 66fbabb-66fbaf6 523->527 528 66fb7b9-66fb7c0 523->528 531 66fb9af-66fb9b0 525->531 532 66fb7e8-66fb7eb 525->532 526->527 530 66fb7d4-66fb7da 526->530 544 66fbaf8-66fbafb 527->544 528->522 530->525 534 66fb9b5-66fb9b8 531->534 535 66fb7ff-66fb802 532->535 536 66fb7ed-66fb7f4 532->536 538 66fb9db-66fb9de 534->538 539 66fb9ba-66fb9d6 534->539 542 66fb804-66fb819 535->542 543 66fb841-66fb844 535->543 540 66fb7fa 536->540 541 66fb913-66fb91c 536->541 546 66fba01-66fba04 538->546 547 66fb9e0-66fb9e4 538->547 539->538 540->535 550 66fb921-66fb924 541->550 542->527 575 66fb81f-66fb83c 542->575 551 66fb856-66fb859 543->551 552 66fb846 543->552 548 66fbb1e-66fbb21 544->548 549 66fbafd-66fbb19 544->549 560 66fba0e-66fba11 546->560 561 66fba06-66fba09 546->561 547->527 558 66fb9ea-66fb9fa 547->558 553 66fbd8d-66fbd8f 548->553 554 66fbb27-66fbb4f 548->554 549->548 562 66fb92b-66fb92e 550->562 563 66fb926-66fb928 550->563 555 66fb85f-66fb862 551->555 556 66fb99a-66fb9a3 551->556 564 66fb84e-66fb851 552->564 572 66fbd96-66fbd99 553->572 573 66fbd91 553->573 625 66fbb59-66fbb9d 554->625 626 66fbb51-66fbb54 554->626 569 66fb864-66fb86d 555->569 570 66fb872-66fb875 555->570 568 66fb930-66fb939 556->568 574 66fb9a5 556->574 580 66fba26-66fba2a 558->580 598 66fb9fc 558->598 565 66fba13-66fba1c 560->565 566 66fba21-66fba24 560->566 561->560 567 66fb94b-66fb94e 562->567 562->568 563->562 564->551 565->566 579 66fba4b-66fba4e 566->579 566->580 581 66fb95e-66fb961 567->581 582 66fb950-66fb953 567->582 568->527 578 66fb93f-66fb946 568->578 569->570 583 66fb877-66fb87d 570->583 584 66fb882-66fb885 570->584 572->544 586 66fbd9f-66fbda8 572->586 573->572 585 66fb9aa-66fb9ad 574->585 575->543 578->567 596 66fba88-66fba8b 579->596 597 66fba50-66fba65 579->597 580->527 589 66fba30-66fba40 580->589 591 66fb978-66fb97b 581->591 592 66fb963-66fb967 581->592 582->523 590 66fb959 582->590 583->584 593 66fb88f-66fb892 584->593 594 66fb887-66fb88a 584->594 585->531 585->534 589->531 618 66fba46 589->618 590->581 603 66fb97d-66fb986 591->603 604 66fb98b-66fb98e 591->604 592->527 602 66fb96d-66fb973 592->602 605 66fb8b9-66fb8bc 593->605 606 66fb894-66fb898 593->606 594->593 607 66fba8d-66fba92 596->607 608 66fba95-66fba98 596->608 597->527 619 66fba67-66fba83 597->619 598->546 602->591 603->604 604->531 613 66fb990-66fb993 604->613 614 66fb8cf-66fb8d2 605->614 615 66fb8be-66fb8ca 605->615 606->527 611 66fb89e-66fb8ae 606->611 607->608 608->582 616 66fba9e-66fbaa0 608->616 611->547 633 66fb8b4 611->633 613->531 620 66fb995-66fb998 613->620 623 66fb8f4-66fb8f7 614->623 624 66fb8d4-66fb8ef 614->624 615->614 621 66fbaa7-66fbaaa 616->621 622 66fbaa2 616->622 618->579 619->596 620->556 620->585 621->519 630 66fbab0-66fbaba 621->630 622->621 631 66fb90e-66fb911 623->631 632 66fb8f9-66fb8fd 623->632 624->623 641 66fbba3-66fbbac 625->641 642 66fbd82-66fbd8c 625->642 626->586 631->541 631->550 632->527 636 66fb903-66fb909 632->636 633->605 636->631 643 66fbd78-66fbd7d 641->643 644 66fbbb2-66fbc1e call 66f6670 641->644 643->642 652 66fbd18-66fbd2d 644->652 653 66fbc24-66fbc29 644->653 652->643 655 66fbc2b-66fbc31 653->655 656 66fbc45 653->656 658 66fbc37-66fbc39 655->658 659 66fbc33-66fbc35 655->659 657 66fbc47-66fbc4d 656->657 660 66fbc4f-66fbc55 657->660 661 66fbc62-66fbc6f 657->661 662 66fbc43 658->662 659->662 663 66fbc5b 660->663 664 66fbd03-66fbd12 660->664 669 66fbc87-66fbc94 661->669 670 66fbc71-66fbc77 661->670 662->657 663->661 665 66fbcca-66fbcd7 663->665 666 66fbc96-66fbca3 663->666 664->652 664->653 678 66fbcef-66fbcfc 665->678 679 66fbcd9-66fbcdf 665->679 676 66fbcbb-66fbcc8 666->676 677 66fbca5-66fbcab 666->677 669->664 671 66fbc7b-66fbc7d 670->671 672 66fbc79 670->672 671->669 672->669 676->664 680 66fbcaf-66fbcb1 677->680 681 66fbcad 677->681 678->664 682 66fbce3-66fbce5 679->682 683 66fbce1 679->683 680->676 681->676 682->678 683->678
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                        • API String ID: 0-2392861976
                                        • Opcode ID: 51075c17f5e3e341f446713ce2be041c692843157e6bce145b5547e3da4a35ee
                                        • Instruction ID: 4d02d94b71d6c7969fbe21c63e3166c3350d0f4c1a54879f5cf4e08483481d8f
                                        • Opcode Fuzzy Hash: 51075c17f5e3e341f446713ce2be041c692843157e6bce145b5547e3da4a35ee
                                        • Instruction Fuzzy Hash: C7026B30E202098FDBA4DF68D4807ADB7B2FB85310F24856AE515EB355DB31ED86CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 686 66f9220-66f9245 687 66f9247-66f924a 686->687 688 66f924c-66f926b 687->688 689 66f9270-66f9273 687->689 688->689 690 66f9279-66f928e 689->690 691 66f9b33-66f9b35 689->691 697 66f92a6-66f92bc 690->697 698 66f9290-66f9296 690->698 693 66f9b3c-66f9b3f 691->693 694 66f9b37 691->694 693->687 696 66f9b45-66f9b4f 693->696 694->693 703 66f92c7-66f92c9 697->703 700 66f929a-66f929c 698->700 701 66f9298 698->701 700->697 701->697 704 66f92cb-66f92d1 703->704 705 66f92e1-66f9352 703->705 706 66f92d5-66f92d7 704->706 707 66f92d3 704->707 716 66f937e-66f939a 705->716 717 66f9354-66f9377 705->717 706->705 707->705 722 66f939c-66f93bf 716->722 723 66f93c6-66f93e1 716->723 717->716 722->723 728 66f940c-66f9427 723->728 729 66f93e3-66f9405 723->729 734 66f9429-66f944b 728->734 735 66f9452-66f945c 728->735 729->728 734->735 736 66f945e-66f9467 735->736 737 66f946c-66f94e6 735->737 736->696 743 66f94e8-66f9506 737->743 744 66f9533-66f9548 737->744 748 66f9508-66f9517 743->748 749 66f9522-66f9531 743->749 744->691 748->749 749->743 749->744
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q
                                        • API String ID: 0-2125118731
                                        • Opcode ID: 2a6c8c0946e3eea8b54fba4d6bf6c415fe924e1925cc8a969f3cb76b00461342
                                        • Instruction ID: bda1d60e689c32cfef336547cd3fdd8a10f25ff8ad83fcf70bcf77ada0498928
                                        • Opcode Fuzzy Hash: 2a6c8c0946e3eea8b54fba4d6bf6c415fe924e1925cc8a969f3cb76b00461342
                                        • Instruction Fuzzy Hash: 42916E31B2020A9FDB54DB64D8507AEB3F6AF89704F108569D509EB348EF31DD468B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 752 66fd020-66fd03b 753 66fd03d-66fd040 752->753 754 66fd089-66fd08c 753->754 755 66fd042-66fd084 753->755 756 66fd08e-66fd0d0 754->756 757 66fd0d5-66fd0d8 754->757 755->754 756->757 759 66fd0da-66fd0dc 757->759 760 66fd0e7-66fd0ea 757->760 761 66fd509 759->761 762 66fd0e2 759->762 763 66fd0ec-66fd12e 760->763 764 66fd133-66fd136 760->764 769 66fd50c-66fd518 761->769 762->760 763->764 767 66fd17f-66fd182 764->767 768 66fd138-66fd17a 764->768 771 66fd1a5-66fd1a8 767->771 772 66fd184-66fd1a0 767->772 768->767 773 66fd51e-66fd80b 769->773 774 66fd2cd-66fd2dc 769->774 779 66fd1aa-66fd1af 771->779 780 66fd1b2-66fd1b5 771->780 772->771 965 66fda32-66fda3c 773->965 966 66fd811-66fd817 773->966 776 66fd2de-66fd2e3 774->776 777 66fd2eb-66fd2f7 774->777 776->777 784 66fda3d-66fda76 777->784 785 66fd2fd-66fd30f 777->785 779->780 786 66fd1fe-66fd201 780->786 787 66fd1b7-66fd1f9 780->787 808 66fda78-66fda7b 784->808 807 66fd314-66fd317 785->807 790 66fd21e-66fd221 786->790 791 66fd203-66fd219 786->791 787->786 800 66fd26a-66fd26d 790->800 801 66fd223-66fd265 790->801 791->790 804 66fd26f-66fd271 800->804 805 66fd27c-66fd27f 800->805 801->800 813 66fd3c7-66fd3d0 804->813 814 66fd277 804->814 815 66fd2c8-66fd2cb 805->815 816 66fd281-66fd290 805->816 817 66fd319-66fd35b 807->817 818 66fd360-66fd363 807->818 819 66fdaae-66fdab1 808->819 820 66fda7d-66fdaa9 808->820 823 66fd3df-66fd3eb 813->823 824 66fd3d2-66fd3d7 813->824 814->805 815->774 815->807 829 66fd29f-66fd2ab 816->829 830 66fd292-66fd297 816->830 817->818 827 66fd3ac-66fd3af 818->827 828 66fd365-66fd3a7 818->828 831 66fdab3 call 66fdb95 819->831 832 66fdac0-66fdac3 819->832 820->819 840 66fd4fc-66fd501 823->840 841 66fd3f1-66fd405 823->841 824->823 827->769 838 66fd3b5-66fd3b7 827->838 828->827 829->784 833 66fd2b1-66fd2c3 829->833 830->829 844 66fdab9-66fdabb 831->844 835 66fdae6-66fdae8 832->835 836 66fdac5-66fdae1 832->836 833->815 847 66fdaef-66fdaf2 835->847 848 66fdaea 835->848 836->835 845 66fd3be-66fd3c1 838->845 846 66fd3b9 838->846 840->761 841->761 860 66fd40b-66fd41d 841->860 844->832 845->753 845->813 846->845 847->808 855 66fdaf4-66fdb03 847->855 848->847 868 66fdb6a-66fdb7f 855->868 869 66fdb05-66fdb68 call 66f6670 855->869 874 66fd41f-66fd425 860->874 875 66fd441-66fd443 860->875 882 66fdb80 868->882 869->868 880 66fd429-66fd435 874->880 881 66fd427 874->881 887 66fd44d-66fd459 875->887 885 66fd437-66fd43f 880->885 881->885 882->882 885->887 895 66fd45b-66fd465 887->895 896 66fd467 887->896 897 66fd46c-66fd46e 895->897 896->897 897->761 899 66fd474-66fd490 call 66f6670 897->899 908 66fd49f-66fd4ab 899->908 909 66fd492-66fd497 899->909 908->840 911 66fd4ad-66fd4fa 908->911 909->908 911->761 967 66fd819-66fd81e 966->967 968 66fd826-66fd82f 966->968 967->968 968->784 969 66fd835-66fd848 968->969 971 66fd84e-66fd854 969->971 972 66fda22-66fda2c 969->972 973 66fd856-66fd85b 971->973 974 66fd863-66fd86c 971->974 972->965 972->966 973->974 974->784 975 66fd872-66fd893 974->975 978 66fd895-66fd89a 975->978 979 66fd8a2-66fd8ab 975->979 978->979 979->784 980 66fd8b1-66fd8ce 979->980 980->972 983 66fd8d4-66fd8da 980->983 983->784 984 66fd8e0-66fd8f9 983->984 986 66fd8ff-66fd926 984->986 987 66fda15-66fda1c 984->987 986->784 990 66fd92c-66fd936 986->990 987->972 987->983 990->784 991 66fd93c-66fd953 990->991 993 66fd955-66fd960 991->993 994 66fd962-66fd97d 991->994 993->994 994->987 999 66fd983-66fd99c call 66f6670 994->999 1003 66fd99e-66fd9a3 999->1003 1004 66fd9ab-66fd9b4 999->1004 1003->1004 1004->784 1005 66fd9ba-66fda0e 1004->1005 1005->987
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q
                                        • API String ID: 0-831282457
                                        • Opcode ID: d5b12431af43744cdbfe655de3cec69387665e41a679a379326a75b59487267c
                                        • Instruction ID: 0462a6d2ef0eee2e1d1edafb0f8f4b6ceb4c2b497db04e15edaa44b7a7157ced
                                        • Opcode Fuzzy Hash: d5b12431af43744cdbfe655de3cec69387665e41a679a379326a75b59487267c
                                        • Instruction Fuzzy Hash: D8622E34A102059FCB55EB68D580A5EB7F2FF85314F248A69D005DF369EB71ED8ACB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1013 66f4c80-66f4ca4 1014 66f4ca6-66f4ca9 1013->1014 1015 66f4caf-66f4da7 1014->1015 1016 66f5388-66f538b 1014->1016 1036 66f4dad-66f4dfa call 66f5528 1015->1036 1037 66f4e2a-66f4e31 1015->1037 1017 66f538d-66f53a7 1016->1017 1018 66f53ac-66f53ae 1016->1018 1017->1018 1020 66f53b5-66f53b8 1018->1020 1021 66f53b0 1018->1021 1020->1014 1023 66f53be-66f53cb 1020->1023 1021->1020 1050 66f4e00-66f4e1c 1036->1050 1038 66f4e37-66f4ea7 1037->1038 1039 66f4eb5-66f4ebe 1037->1039 1056 66f4ea9 1038->1056 1057 66f4eb2 1038->1057 1039->1023 1053 66f4e1e 1050->1053 1054 66f4e27-66f4e28 1050->1054 1053->1054 1054->1037 1056->1057 1057->1039
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: fcq$XPcq$\Ocq
                                        • API String ID: 0-3575482020
                                        • Opcode ID: f6ddb4f981daced0d30b2587ae3d68724e4154f2b74f5b1d68f540d63164d84b
                                        • Instruction ID: f53b3c4bc48ffe327e631e2374cc72472a87b7b74931592813fc6e84f9b937c9
                                        • Opcode Fuzzy Hash: f6ddb4f981daced0d30b2587ae3d68724e4154f2b74f5b1d68f540d63164d84b
                                        • Instruction Fuzzy Hash: 22617231F102099FEB559FA9C8547AEBBF2EF88700F208429E106AB395DF758D458B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1970 66f9212-66f9245 1972 66f9247-66f924a 1970->1972 1973 66f924c-66f926b 1972->1973 1974 66f9270-66f9273 1972->1974 1973->1974 1975 66f9279-66f928e 1974->1975 1976 66f9b33-66f9b35 1974->1976 1982 66f92a6-66f92bc 1975->1982 1983 66f9290-66f9296 1975->1983 1978 66f9b3c-66f9b3f 1976->1978 1979 66f9b37 1976->1979 1978->1972 1981 66f9b45-66f9b4f 1978->1981 1979->1978 1988 66f92c7-66f92c9 1982->1988 1985 66f929a-66f929c 1983->1985 1986 66f9298 1983->1986 1985->1982 1986->1982 1989 66f92cb-66f92d1 1988->1989 1990 66f92e1-66f9352 1988->1990 1991 66f92d5-66f92d7 1989->1991 1992 66f92d3 1989->1992 2001 66f937e-66f939a 1990->2001 2002 66f9354-66f9377 1990->2002 1991->1990 1992->1990 2007 66f939c-66f93bf 2001->2007 2008 66f93c6-66f93e1 2001->2008 2002->2001 2007->2008 2013 66f940c-66f9427 2008->2013 2014 66f93e3-66f9405 2008->2014 2019 66f9429-66f944b 2013->2019 2020 66f9452-66f945c 2013->2020 2014->2013 2019->2020 2021 66f945e-66f9467 2020->2021 2022 66f946c-66f94e6 2020->2022 2021->1981 2028 66f94e8-66f9506 2022->2028 2029 66f9533-66f9548 2022->2029 2033 66f9508-66f9517 2028->2033 2034 66f9522-66f9531 2028->2034 2029->1976 2033->2034 2034->2028 2034->2029
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q
                                        • API String ID: 0-355816377
                                        • Opcode ID: cc5585edf6470beee2e77dd7c53a42c5b98bf3454781ae5ea2ca3834f2367348
                                        • Instruction ID: 727ac8ef883c63d010a410ffb7ff8bb08b9f5312412a21fecaaffda0a215fb6c
                                        • Opcode Fuzzy Hash: cc5585edf6470beee2e77dd7c53a42c5b98bf3454781ae5ea2ca3834f2367348
                                        • Instruction Fuzzy Hash: AE515D30B201059FDB94DB78D890BAEB3E6AF89744F108569D509EB388EF31DC428B95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2434 66eb708-66eb717 2435 66eb719-66eb726 call 66ea6a8 2434->2435 2436 66eb743-66eb747 2434->2436 2441 66eb73c 2435->2441 2442 66eb728-66eb736 call 66eb991 2435->2442 2437 66eb75b-66eb79c 2436->2437 2438 66eb749-66eb753 2436->2438 2445 66eb79e-66eb7a6 2437->2445 2446 66eb7a9-66eb7b7 2437->2446 2438->2437 2441->2436 2442->2441 2452 66eb878-66eb938 2442->2452 2445->2446 2448 66eb7db-66eb7dd 2446->2448 2449 66eb7b9-66eb7be 2446->2449 2453 66eb7e0-66eb7e7 2448->2453 2450 66eb7c9 2449->2450 2451 66eb7c0-66eb7c7 call 66ea6b4 2449->2451 2457 66eb7cb-66eb7d9 2450->2457 2451->2457 2485 66eb93a-66eb93d 2452->2485 2486 66eb940-66eb96b GetModuleHandleW 2452->2486 2455 66eb7e9-66eb7f1 2453->2455 2456 66eb7f4-66eb7fb 2453->2456 2455->2456 2460 66eb7fd-66eb805 2456->2460 2461 66eb808-66eb811 call 66e3cdc 2456->2461 2457->2453 2460->2461 2465 66eb81e-66eb823 2461->2465 2466 66eb813-66eb81b 2461->2466 2468 66eb825-66eb82c 2465->2468 2469 66eb841-66eb845 2465->2469 2466->2465 2468->2469 2470 66eb82e-66eb83e call 66e8ec8 call 66ea6c4 2468->2470 2490 66eb848 call 66ebc60 2469->2490 2491 66eb848 call 66ebc50 2469->2491 2470->2469 2471 66eb84b-66eb84e 2475 66eb850-66eb86e 2471->2475 2476 66eb871-66eb877 2471->2476 2475->2476 2485->2486 2487 66eb96d-66eb973 2486->2487 2488 66eb974-66eb988 2486->2488 2487->2488 2490->2471 2491->2471
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900655022.00000000066E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66e0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 4c51e3d588a76479d6d8a633efba85330be3d7860726df940b0f4a61403aab53
                                        • Instruction ID: d7caf7566fe77289ae15fbd53ba590bdc954b4a80ea827939d771bce229deb50
                                        • Opcode Fuzzy Hash: 4c51e3d588a76479d6d8a633efba85330be3d7860726df940b0f4a61403aab53
                                        • Instruction Fuzzy Hash: 76713170A01B058FDBA4DF2AD54475ABBF1BF88304F008A2DE48AD7B50DB75E945CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2493 164ef9b-164efb3 2494 164efb5-164efdc 2493->2494 2495 164efdd-164eff3 2493->2495 2516 164eff5 call 164f080 2495->2516 2517 164eff5 call 164ef9b 2495->2517 2498 164effa-164effc 2499 164f002-164f061 2498->2499 2500 164effe-164f001 2498->2500 2507 164f067-164f0f4 GlobalMemoryStatusEx 2499->2507 2508 164f063-164f066 2499->2508 2511 164f0f6-164f0fc 2507->2511 2512 164f0fd-164f125 2507->2512 2511->2512 2516->2498 2517->2498
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2895489172.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_1640000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c9ceb2b8ecd2a8cd9e4e378fbf1efc37ddbba100527aa64cd676aaa10b18f688
                                        • Instruction ID: e34826c16582080c31b1d467c76cd3fe0bb4c517ebe46af4ffd68d6be1bd0d74
                                        • Opcode Fuzzy Hash: c9ceb2b8ecd2a8cd9e4e378fbf1efc37ddbba100527aa64cd676aaa10b18f688
                                        • Instruction Fuzzy Hash: 4A414071E043859FCB14CFB9E8406EEBFF1AF89310F1485AAE504A7252DB749884CBE1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 066EDA02
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900655022.00000000066E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66e0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: 8768c53e0f9427a92f59c4a3f97224a7af2ca394b86572a44af7f8ec0de8db1c
                                        • Instruction ID: 0acb294fbd3dd8389cf482e5eac24a49a8c3c15f45aca814f7986e70c0e13dd2
                                        • Opcode Fuzzy Hash: 8768c53e0f9427a92f59c4a3f97224a7af2ca394b86572a44af7f8ec0de8db1c
                                        • Instruction Fuzzy Hash: 9751D0B1D00349EFDB14CFA9C984ADEBBB5BF48310F24812AE819AB250D7719945CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 066EDA02
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900655022.00000000066E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66e0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: 4724575f2f12fc44042a44795cd779443b9af8953e2fef340a21c4149f88d7a6
                                        • Instruction ID: 23a523c8349a4ce19da3e6d443b2a5addff25854bd4d4033c6f577bba93a54ca
                                        • Opcode Fuzzy Hash: 4724575f2f12fc44042a44795cd779443b9af8953e2fef340a21c4149f88d7a6
                                        • Instruction Fuzzy Hash: D141D2B1D00309EFDB14CFA9C884ADEBBB5FF48310F24812AE818AB210D7759945CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 066E349F
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900655022.00000000066E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66e0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: f98f3c3056998f207f0ad1ef87b06f7b725607c04f82dae2b733dde233632fe6
                                        • Instruction ID: eb0fb312719e44450baf84c333b72748946f2c495c2bc99d31f3694bc78bb206
                                        • Opcode Fuzzy Hash: f98f3c3056998f207f0ad1ef87b06f7b725607c04f82dae2b733dde233632fe6
                                        • Instruction Fuzzy Hash: 392105B5D00208EFDB10CFAAD984ADEBBF9EB48310F14841AE914A7310D375A944CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 066E349F
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900655022.00000000066E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66e0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: b35f7a7f2396704c9481bb8ea8f755cc70ca18811d290ed305831b4d251cdcfb
                                        • Instruction ID: ca88da3970b87017c204111ff04584e2fd5397dd937aeca25c88df55579234f4
                                        • Opcode Fuzzy Hash: b35f7a7f2396704c9481bb8ea8f755cc70ca18811d290ed305831b4d251cdcfb
                                        • Instruction Fuzzy Hash: B921E6B5900218DFDB10CFA9D584ADEFBF4FB48310F14841AE954A7310D375A944CF65
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DeleteFileW.KERNELBASE(00000000), ref: 016480E8
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2895489172.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_1640000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: 8d11bcb88db4606ad322011170e522c3eec5d3010e41aa3065de57f8c7ad3b5b
                                        • Instruction ID: b67a3ce2d1f5c4dbf63a296f3c2a7b68b99c3dd5183ee754ea1dccfe00f3426a
                                        • Opcode Fuzzy Hash: 8d11bcb88db4606ad322011170e522c3eec5d3010e41aa3065de57f8c7ad3b5b
                                        • Instruction Fuzzy Hash: F72158B6C006199BCB14DF9AC8447EEFBF4FF08720F108129D918A7240D778A940CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DeleteFileW.KERNELBASE(00000000), ref: 016480E8
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2895489172.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_1640000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: 6c5286313c72fab36b7866bf9e6fd20c8f7cb2930545a12370af17ecba50e7da
                                        • Instruction ID: 20fb7b9897a13f2ad5cd565ac116b6c8453ec60c1df0811091c5071ee04d8313
                                        • Opcode Fuzzy Hash: 6c5286313c72fab36b7866bf9e6fd20c8f7cb2930545a12370af17ecba50e7da
                                        • Instruction Fuzzy Hash: 861133B1C0061A9BCB14CF9AC944BAEFBB4FB48720F10812AD818A7250D778A940CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 066EBBCA
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900655022.00000000066E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66e0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 46f658a8c26939c4b50c80536d70a3b5625d822a54f549b9fd51be127dcc3036
                                        • Instruction ID: 646bb7683a570694ed7c4f2ed0acb2f8786f3737692a72612647ae1319a10a5d
                                        • Opcode Fuzzy Hash: 46f658a8c26939c4b50c80536d70a3b5625d822a54f549b9fd51be127dcc3036
                                        • Instruction Fuzzy Hash: 9A1126B6D003099FDB10CFAAC985ADEFBF4EB48310F14842AE419A7210C775A545CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GlobalMemoryStatusEx.KERNELBASE ref: 0164F0E7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2895489172.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_1640000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: GlobalMemoryStatus
                                        • String ID:
                                        • API String ID: 1890195054-0
                                        • Opcode ID: 8c9d5cd547f4a18192e684ef1559a6c34aa859bbf0be08290724e70cae53efd9
                                        • Instruction ID: a07eeaee3c43acd4d791a3c791b7ac1c18263dfe7359a131617237a2f096b581
                                        • Opcode Fuzzy Hash: 8c9d5cd547f4a18192e684ef1559a6c34aa859bbf0be08290724e70cae53efd9
                                        • Instruction Fuzzy Hash: FF1123B1C002599BCB10DFAAC444BDEFBF4BF48320F10816AD818A7250D778A940CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 066EBBCA
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900655022.00000000066E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66e0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: ddf049f9877d5c8ac61b2b272c3c920dc067f5f7783b8d58fb506c4fe8b718ce
                                        • Instruction ID: 20fd229288f716959634961ba10e364179a248df0a7bc51ca7aad3d09b1aae2a
                                        • Opcode Fuzzy Hash: ddf049f9877d5c8ac61b2b272c3c920dc067f5f7783b8d58fb506c4fe8b718ce
                                        • Instruction Fuzzy Hash: FA1104B6D003099FDB10CF9AC984ADEFBF4EB88310F14842AD459A7710C775A545CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,066EB724), ref: 066EB95E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900655022.00000000066E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66e0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 0a0a698dd15aea82c0ce8ab6f927739a979a31d3897350d24e7ec75dbfaaeed5
                                        • Instruction ID: 4a18dc1fbd82351024a3bb14e68602823abe7f8c7525508f73db4672ad382458
                                        • Opcode Fuzzy Hash: 0a0a698dd15aea82c0ce8ab6f927739a979a31d3897350d24e7ec75dbfaaeed5
                                        • Instruction Fuzzy Hash: 3D11FDB5C01349DFDB20DF9AD584A9EFBF4EB88324F10842AD869A7310D379A545CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: XPcq
                                        • API String ID: 0-714321711
                                        • Opcode ID: 687b6a5f8d0929154e2250c6d7c3bb8df5881ee84fe885a5d700f78d108963b4
                                        • Instruction ID: 1e4d08922a1195e411427eba6ab30e099fe0b4044b4d7283d71bdc8b74a18c22
                                        • Opcode Fuzzy Hash: 687b6a5f8d0929154e2250c6d7c3bb8df5881ee84fe885a5d700f78d108963b4
                                        • Instruction Fuzzy Hash: FD418D30F102089FDB559FA9C854BAEBBF7EF88700F20852AE105AB395DF758D418B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PH^q
                                        • API String ID: 0-2549759414
                                        • Opcode ID: 0b6e3ac1aac322cbd24d0577f1de4d8f31a817e72d56912ab26e7df680fa042d
                                        • Instruction ID: 8944a9453d3edcdadbd19fa3576c46790805e96551e6386aa49b2798bce11636
                                        • Opcode Fuzzy Hash: 0b6e3ac1aac322cbd24d0577f1de4d8f31a817e72d56912ab26e7df680fa042d
                                        • Instruction Fuzzy Hash: 6641B070E1020A9FDB55DF65C89469EBBB6EF85340F20492AE506EB340DF71E846CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PH^q
                                        • API String ID: 0-2549759414
                                        • Opcode ID: 84e80b0b273108dc98923f7c4a569fa4a76a21723095ffe36fb585ae4e16654a
                                        • Instruction ID: 1de3e0cac289e5e6a515b59bc3218023c309228ceccc6615b79ef4a7390a7b85
                                        • Opcode Fuzzy Hash: 84e80b0b273108dc98923f7c4a569fa4a76a21723095ffe36fb585ae4e16654a
                                        • Instruction Fuzzy Hash: D0412530B242058FCB499BB4C82426E7BE7AF89200F144569D606DB395DF36DE42CFE1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PH^q
                                        • API String ID: 0-2549759414
                                        • Opcode ID: 91c42fb81307de43917fe1bd4d9a49251597bd95e5574bd60e8e06ff57024888
                                        • Instruction ID: 00f3c56d1542460d161a4a70ccb8d415d5bd14017d1b702fc6c6195020f24b1e
                                        • Opcode Fuzzy Hash: 91c42fb81307de43917fe1bd4d9a49251597bd95e5574bd60e8e06ff57024888
                                        • Instruction Fuzzy Hash: 8B312231B202058FCB49ABB4C92466F7BE7AF89304F204428D106DB394DF36DE42CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q
                                        • API String ID: 0-388095546
                                        • Opcode ID: 4f0edfd917d6a105b3f0a806f593afc79235718b90c3b764192b75174001691d
                                        • Instruction ID: 790c391eafe7c9e14e8b12efb9947318fc00300d91b4842ff120a7692ea8ccc6
                                        • Opcode Fuzzy Hash: 4f0edfd917d6a105b3f0a806f593afc79235718b90c3b764192b75174001691d
                                        • Instruction Fuzzy Hash: B6F0C232B241119FDF649F94E9806A8B7B8EB40314F1444BEEA05DB355CB31ED17CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \Ocq
                                        • API String ID: 0-2995510325
                                        • Opcode ID: fe2a379b685610dfe538ebfb9fb7b4edb725f7f48506b398188d4e18afcdf09a
                                        • Instruction ID: d4606df1dbf69744b16680a2850457f0a90411a44bcc85ad67523c9c16732d3d
                                        • Opcode Fuzzy Hash: fe2a379b685610dfe538ebfb9fb7b4edb725f7f48506b398188d4e18afcdf09a
                                        • Instruction Fuzzy Hash: 53F0DA30E20129DBDB14DF94E9997AEBBB2FF88714F204519E502A7795CB741D05CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 572871a4ff8bac0f0e386f3fd2f04fb397d4be75628a9c9f4c10ff7a51abd140
                                        • Instruction ID: 1f4fb3e75a58cd56cd65fa431e2ffd40ad09645fb263dbaff9b80c0740800c40
                                        • Opcode Fuzzy Hash: 572871a4ff8bac0f0e386f3fd2f04fb397d4be75628a9c9f4c10ff7a51abd140
                                        • Instruction Fuzzy Hash: 1E61C172F100214FCB109B7DC88466FAAD7AFC5624B25443AE90EDB364DEA6DD0287C2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b2f22727689ed438d92ba484d30e8ac78b3b0c61dd1e54a02e357b234d5939ad
                                        • Instruction ID: 9a0948eff3263c593d0d2a19065d69a11f02ca577cf1089683042625494f9a0f
                                        • Opcode Fuzzy Hash: b2f22727689ed438d92ba484d30e8ac78b3b0c61dd1e54a02e357b234d5939ad
                                        • Instruction Fuzzy Hash: A5814F30B102059FDF54DFA9D5906AEB7F6AF89304F108425E50AEB795EF30EC468B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 75d7b5b0d51f2d1fe6625eb3abf5b09705dc6c837bd730c4bd49f8407a876f60
                                        • Instruction ID: 93c422495a82c998f6c172074c8f7632b63a2db27969673f6737e016932d145b
                                        • Opcode Fuzzy Hash: 75d7b5b0d51f2d1fe6625eb3abf5b09705dc6c837bd730c4bd49f8407a876f60
                                        • Instruction Fuzzy Hash: 51915E30E102198FDF60DF68C890B9EB7B1FF89314F208599D549AB395DB70AA85CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3952eb20dd4052e9134b88ad5b5e288889c65f1fb12cff4b7155f13b0d4f3ed9
                                        • Instruction ID: 93575441a85d21e234624f1d32d25faa754fdbebfc01335ebe7f6f32f4cbe6ba
                                        • Opcode Fuzzy Hash: 3952eb20dd4052e9134b88ad5b5e288889c65f1fb12cff4b7155f13b0d4f3ed9
                                        • Instruction Fuzzy Hash: CA914E30E102198BDF60DF68C980B9EB7B1FF89310F208599D559BB355DB70AA85CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 778691bca13e6bec812b24ea64b1a3cc8b2d4e43a497b22f497c5f6914000ab0
                                        • Instruction ID: bf450ab561c047ed75e32e141fef8ee5da77179fc2cb784ce42338a6d899d34b
                                        • Opcode Fuzzy Hash: 778691bca13e6bec812b24ea64b1a3cc8b2d4e43a497b22f497c5f6914000ab0
                                        • Instruction Fuzzy Hash: 5F716A30A102499FDB54DFA8D980A9EBBF6FF88300F248429E105EB355DB31ED46CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0699a044a33c7a455fb99de1147cd77430298d1ee0949f44a130d82992c0354b
                                        • Instruction ID: 0db2ad9bd73ca2ee0f097a68108b86ad8532bfff2f9ed263ccf38b542d7c1ba2
                                        • Opcode Fuzzy Hash: 0699a044a33c7a455fb99de1147cd77430298d1ee0949f44a130d82992c0354b
                                        • Instruction Fuzzy Hash: 3D714B70A102099FDB54DFA9D980A9DBBF6FF88300F248429E105EB355DB31ED46CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 51e7211e78a97acf36b62c10058bef0a5f50c911e83e983bb2a69fa06a56ddaf
                                        • Instruction ID: faa8562dd24fcebe33ac3c4e28157fe2f1509133f417f5be8813a36e29815f37
                                        • Opcode Fuzzy Hash: 51e7211e78a97acf36b62c10058bef0a5f50c911e83e983bb2a69fa06a56ddaf
                                        • Instruction Fuzzy Hash: 3F51E231E11105AFCBA4EFB8E8946ADBBB2FF85315F10486AE206D7350DF358956CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2a4598938c2273f435e5a867a1e069356c06dda720ddf95fa4dbd1325b3eb131
                                        • Instruction ID: 287110f64f8b3be5c2bc498d041e17a51307c1a115bbf14603f71691a0121310
                                        • Opcode Fuzzy Hash: 2a4598938c2273f435e5a867a1e069356c06dda720ddf95fa4dbd1325b3eb131
                                        • Instruction Fuzzy Hash: 4B51DB34B202149FEFA4677CD99476F265FD789310F20092AF60AD73D5CA79CC5683A2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bbc2cf965ebf69a74bf28a7a313ebf9df83e63dfd7fd588ee79b28a4203f77a1
                                        • Instruction ID: 8f06de885f8611bab03ab6ceeb2508d250efa74b7865c91b6ce4be6da9fe8aa6
                                        • Opcode Fuzzy Hash: bbc2cf965ebf69a74bf28a7a313ebf9df83e63dfd7fd588ee79b28a4203f77a1
                                        • Instruction Fuzzy Hash: A051C834B202159FEFA4677CD99476F255FD789310F20082AE60AD73D8CA79CC5683A2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 23467d46aa77b7722ffc3621d9d961aad5c5d4c54505f404851fe35dfd1ecc17
                                        • Instruction ID: 7394ae7b88b562564383771dc059e09deff688248bef92a9723da1c74cee525b
                                        • Opcode Fuzzy Hash: 23467d46aa77b7722ffc3621d9d961aad5c5d4c54505f404851fe35dfd1ecc17
                                        • Instruction Fuzzy Hash: CF415E71E106099FDF70CFA9D880AAFFBB2EB95310F10492AE256D7654D730EC498B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8bc4eeab13433de9e1e4c7f68989fec7558d7147968270195408faadc1baed99
                                        • Instruction ID: 226a6d3cd4801dba8e6af2820c40265d3e73a2dc7e69ebefb065e105cabea2bc
                                        • Opcode Fuzzy Hash: 8bc4eeab13433de9e1e4c7f68989fec7558d7147968270195408faadc1baed99
                                        • Instruction Fuzzy Hash: F3319030E142099FCF15DF65D98069EBBB2EF85304F104929E505E7354EB70F94ACB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f8a0c08d6124ddb3e491a181d040da3c693ebbb2d9e9dd0e96e3c17d0c102e57
                                        • Instruction ID: 35c6a86c969f03969d616a643ac05768d4226329aa62243b858083778bf638c1
                                        • Opcode Fuzzy Hash: f8a0c08d6124ddb3e491a181d040da3c693ebbb2d9e9dd0e96e3c17d0c102e57
                                        • Instruction Fuzzy Hash: C0317031E142059BCF55DFA4D8A469EB7B6BF89300F108529EA06E7390DB71ED46CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3bc960e59222532fe32e2e90dc95119661f8f2ef305be173b0cab87e3d2b75cf
                                        • Instruction ID: f49b98b586ce7cd9d4d2cb3ee09a3f0b1cc583c15cd56cfb289f91840f7087d5
                                        • Opcode Fuzzy Hash: 3bc960e59222532fe32e2e90dc95119661f8f2ef305be173b0cab87e3d2b75cf
                                        • Instruction Fuzzy Hash: 5B218D36F102059FDB41DFB9D840AAEBBF5AB88250F048025E915E7385E731E952CBD1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 114e7b0ff4a6718164d0349e82c619d0d5ea956544752f5150f7652b9b197436
                                        • Instruction ID: 30728400c76eb3575f5d49654d38eb71b72d5ec47a4bb6d253900b2a2e41b9fd
                                        • Opcode Fuzzy Hash: 114e7b0ff4a6718164d0349e82c619d0d5ea956544752f5150f7652b9b197436
                                        • Instruction Fuzzy Hash: A3219C76F102059FDB50DF68D940AAEBBF5FB48250F108029EA05E7384E731DC42CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2895211109.0000000000F2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F2D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_f2d000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 15527d0a657713d66cf27868c4bb6a55cb34d1cf8e9765cb3aa25f52472ca465
                                        • Instruction ID: 2dceecb4141308f773c32b9e1320cffc92071cbf1da4a6e3eadc720bdd36f4a5
                                        • Opcode Fuzzy Hash: 15527d0a657713d66cf27868c4bb6a55cb34d1cf8e9765cb3aa25f52472ca465
                                        • Instruction Fuzzy Hash: 4B212671504204DFDB14DF14E9C0B26BBA5FB84324F34C66DD94A4B2AAC33AD847EA62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2895211109.0000000000F2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F2D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_f2d000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 01c7da19aa66dcb74f6c4ef3bbfc395b939f5be597c0d59b0fdfb998a978e7df
                                        • Instruction ID: a72714a8b096563b431f222fe0d29c7492d1440ab07cf87345fc94c56077bc75
                                        • Opcode Fuzzy Hash: 01c7da19aa66dcb74f6c4ef3bbfc395b939f5be597c0d59b0fdfb998a978e7df
                                        • Instruction Fuzzy Hash: 9F215C7150D3C09FC703CB24D994711BF71EB46224F29C5DBD8898F2A7C23A981ADB62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d447b020616bab55565941737fc57ef3d5f9c124c01be61428d5045a043fb605
                                        • Instruction ID: 360423b7d0bc59eb2c435cf2c793c6c90517d6d2ad08d22bd4d85fa24da13a9c
                                        • Opcode Fuzzy Hash: d447b020616bab55565941737fc57ef3d5f9c124c01be61428d5045a043fb605
                                        • Instruction Fuzzy Hash: 4121F071E002185FCB54DB79D8406DEFBB5EB89314F008469E10AE7300EA31DA45CBE1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3fc86a86be6f5ea68d5080c43b2164eb3cf8c1cd3b659d99d17c242ea5dce79d
                                        • Instruction ID: 1e970fbc3639d2190a2240ce1542f633673351e58fcc5945d568900b426267c4
                                        • Opcode Fuzzy Hash: 3fc86a86be6f5ea68d5080c43b2164eb3cf8c1cd3b659d99d17c242ea5dce79d
                                        • Instruction Fuzzy Hash: E6110831B242005FCB51DB7CE854B5ABBDADB46610F008479F60DD73A1DE24DC4287D2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2d9c996a080b1d3ed31f6eb8200581f4a6b01e7977a3df05e609101e57141ace
                                        • Instruction ID: 4ca741bedabd2bd60a064ca89700af622ba868ed7371458cbb4da83bdf953ede
                                        • Opcode Fuzzy Hash: 2d9c996a080b1d3ed31f6eb8200581f4a6b01e7977a3df05e609101e57141ace
                                        • Instruction Fuzzy Hash: 92118B32B241289FDB549768DC14AAF73EBEBC8210B00843ADA0AE7344DE759C028BD1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7f8355df7c2f81d7a0548b8f3e21bff858b10a774e3b7ed39a0081c3a231047c
                                        • Instruction ID: 461656152d776c98dbe34f1fc00266f1c8f6f453a0b87031c139d869f35abe8a
                                        • Opcode Fuzzy Hash: 7f8355df7c2f81d7a0548b8f3e21bff858b10a774e3b7ed39a0081c3a231047c
                                        • Instruction Fuzzy Hash: 9401B131B141101FDB619A7EE81072FBBDACFCA320F248439E14ACB746DE25CD864392
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b8b8eaa8d8b5dad5f618999301c3dfc18fcd642c6d5cfcc35b4d3c7250d9a401
                                        • Instruction ID: dc364d71048c8a84b4271141e698327e87faa4593a7a4b88fd3be683fc48a617
                                        • Opcode Fuzzy Hash: b8b8eaa8d8b5dad5f618999301c3dfc18fcd642c6d5cfcc35b4d3c7250d9a401
                                        • Instruction Fuzzy Hash: DE21B2B5D01259EFCB00DF9AD885ACEFBB4FB48324F10852AE518A7200C375A954CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bcdb436724fd526d0ac0160df92659ac25daddf6e186dcd9436038f2b620c9f1
                                        • Instruction ID: 62fdf1358b20812331eb4bf8b339aa311b6d9c224e9edfd213d2bb9256290655
                                        • Opcode Fuzzy Hash: bcdb436724fd526d0ac0160df92659ac25daddf6e186dcd9436038f2b620c9f1
                                        • Instruction Fuzzy Hash: 1E01A235B100101BDB609ABDE990B6F67DBDBC9724F108839F60AC7340DE62DC4243D5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fa872dd0dd590eccf0586650f15d3a0c445b1bdf9fff3a9a9d93592d66913d2a
                                        • Instruction ID: 083b7f089f46ab8325467b840d088088f55b7a8f5cb04b32f0f7f2c81e64e33a
                                        • Opcode Fuzzy Hash: fa872dd0dd590eccf0586650f15d3a0c445b1bdf9fff3a9a9d93592d66913d2a
                                        • Instruction Fuzzy Hash: 7811C471E242558FDF608FAAC8806AEFFB5FB45210F10847BDA59D7242D630DE10CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7429e4256aceb40826706efbb341f468fcfaa04d59a678b74fdee19cfbd82880
                                        • Instruction ID: 39e3d6a8f24826076208317485842741a6108525a60cbfe40abf8cbef1bc95ca
                                        • Opcode Fuzzy Hash: 7429e4256aceb40826706efbb341f468fcfaa04d59a678b74fdee19cfbd82880
                                        • Instruction Fuzzy Hash: 3A01B136B200156BDB54DA68DC106EBB3EAEBC8310F004136D91AD3344EF71AC1287E2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a843fc1dde48eb98ba4047570d0274117200136e85a9e58b39610e902a6b2e30
                                        • Instruction ID: ccf47d3c13299bc2c841c385241ab929cb5c4c7d7cf14214b3c094e1fbca6264
                                        • Opcode Fuzzy Hash: a843fc1dde48eb98ba4047570d0274117200136e85a9e58b39610e902a6b2e30
                                        • Instruction Fuzzy Hash: 5211D0B5D01259AFCB00DF9AD884ACEFBB4FB48324F10812AE918B7300C375A954CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e8a69d979d9e6e1f45032213685f4bf7f1d920a840b091af77f978440506fa7c
                                        • Instruction ID: c880875bbe830576dca30b0eef8028d9a06c2d77d00727b5ad01361ec120e771
                                        • Opcode Fuzzy Hash: e8a69d979d9e6e1f45032213685f4bf7f1d920a840b091af77f978440506fa7c
                                        • Instruction Fuzzy Hash: B401D132B100101BEF609A7EE41072FB7DADBCA720F248439E20EC7745DE21DC424385
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: be8299c59d78c7048e0fcb95d5a4bbac47330e27879d6fca0ade7789cd62b34d
                                        • Instruction ID: 14b640b37635307bf190fcb4a70078085645d31f4322f6bbe4b53aaf182636b7
                                        • Opcode Fuzzy Hash: be8299c59d78c7048e0fcb95d5a4bbac47330e27879d6fca0ade7789cd62b34d
                                        • Instruction Fuzzy Hash: 7201AF35B200151BDB649ABDE59072EA7DBDBCA724F10883AF60AC7340EE76DC0247D5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bc0229d3fb8aba45cf84b36229dd6d495d71638008239f182f1477971726640c
                                        • Instruction ID: eba672995fe976afcebd1108b2b5965d70d659d321b97994730a86c892280593
                                        • Opcode Fuzzy Hash: bc0229d3fb8aba45cf84b36229dd6d495d71638008239f182f1477971726640c
                                        • Instruction Fuzzy Hash: 04016D31B201109FCB54EAADE85472AB3D6EB8A714F108438E60ED7354EE21EC4287C1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 97476c77bfe271658c71236d653808730963f67f98a211d9aa6890916d8f4486
                                        • Instruction ID: bfbe016c78e119791d5d2c61281bb699074f10463e01daa35202631c8e506808
                                        • Opcode Fuzzy Hash: 97476c77bfe271658c71236d653808730963f67f98a211d9aa6890916d8f4486
                                        • Instruction Fuzzy Hash: DDE09271E25248BBCB60CF78C94579EBBB8EB02208F1084D6D958EB203E632DE118791
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                        • API String ID: 0-2222239885
                                        • Opcode ID: acc86cb0e7e22f944bb05f4f78b74bce4fdd2d0dad7c8510c58103f2b2cc96df
                                        • Instruction ID: 28acc247378626b938a305d54a99cc15561c39051eca4713e9961fda14c83a00
                                        • Opcode Fuzzy Hash: acc86cb0e7e22f944bb05f4f78b74bce4fdd2d0dad7c8510c58103f2b2cc96df
                                        • Instruction Fuzzy Hash: E7122E30E10219CFDB68DF65D954AADBBF2BF89304F208569D509AB354DB309D86CF81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: XPcq$\Ocq
                                        • API String ID: 0-2802517751
                                        • Opcode ID: 7bd75b882657616ffdcf8af7b0823f0c9f54d03437628588e02dc23fb5e6d9cc
                                        • Instruction ID: 5828239818050f53403812449aba7c46d2d6d7d1c6fbfcda0c75a1932f257c18
                                        • Opcode Fuzzy Hash: 7bd75b882657616ffdcf8af7b0823f0c9f54d03437628588e02dc23fb5e6d9cc
                                        • Instruction Fuzzy Hash: 43E11431B201148FDB54DB78D890AAEBBF2FF89310F25846AE646DB392CA35DC41C791
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a811ee07afb876a5bf387c63c48df9d2fdba520d8a712e17065369ba389feb98
                                        • Instruction ID: 2b15090ee419aeb9658a639849246f83fc2f12fcc5f7f843a380714462d435e3
                                        • Opcode Fuzzy Hash: a811ee07afb876a5bf387c63c48df9d2fdba520d8a712e17065369ba389feb98
                                        • Instruction Fuzzy Hash: 46230A31D20B198ECB15EB68C89059DF7B1FF99300F15D79AE458B7221EB70AAC5CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PH^q
                                        • API String ID: 0-2549759414
                                        • Opcode ID: bc5dda43ea794272ca7770990233517cb4867ba8f0915f3f0e9389e4e74c8fd2
                                        • Instruction ID: 2d0574985ebad6940357428a81e582d8cf068298e59ded688ce5761229155fba
                                        • Opcode Fuzzy Hash: bc5dda43ea794272ca7770990233517cb4867ba8f0915f3f0e9389e4e74c8fd2
                                        • Instruction Fuzzy Hash: C122D130B101059FDB54DB68D984B9EBBF2EF89310F208469E506DB365DB36EC86CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900655022.00000000066E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66e0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9c3a89a86cfc1d8ae9c5f6cbf13d6dba8e9f73b834f9065728120c2d6f9f7ba3
                                        • Instruction ID: 4c0639b3aa194d9b994d0b8a20d688054a167d50b7a7683340fcb37cb653cad8
                                        • Opcode Fuzzy Hash: 9c3a89a86cfc1d8ae9c5f6cbf13d6dba8e9f73b834f9065728120c2d6f9f7ba3
                                        • Instruction Fuzzy Hash: 56523AB0501B66CFD722CF28E8881997BB1FB41328B90C71AD5616B2D9D7B4658FCF84
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2895489172.0000000001640000.00000040.00000800.00020000.00000000.sdmp, Offset: 01640000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_1640000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a2f5a40328507f2078052460ba6dd059487696a783bcf4740d5f8157df0ca402
                                        • Instruction ID: 57ba6a86c7282d8fa3f44d1cc312b3adaf1e35b8d1b0cf4d00db6bb97ec1bee8
                                        • Opcode Fuzzy Hash: a2f5a40328507f2078052460ba6dd059487696a783bcf4740d5f8157df0ca402
                                        • Instruction Fuzzy Hash: 42B12C70E002198FDF14CFA9D8867EEBBF2AF88714F148129D815A7394EF749846CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900655022.00000000066E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66e0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9d911cbf23307ea88bab9bda58b9ae5ca12f3afa797ce76a36e9eb24dd56c793
                                        • Instruction ID: 6737e3ff140cc8253d9d8c0f6b8c5d7218f759faf1e14fcadf8640f132466fbe
                                        • Opcode Fuzzy Hash: 9d911cbf23307ea88bab9bda58b9ae5ca12f3afa797ce76a36e9eb24dd56c793
                                        • Instruction Fuzzy Hash: F2A19F32E01209CFCF45DFB5D9805AEBBB2FF85300B15856AE915AB221DB31E916CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                        • API String ID: 0-3823777903
                                        • Opcode ID: 6e9e5d0bdc694482e91990ca72d61dfa2655ddb118e4d6b21dbbf39716475efc
                                        • Instruction ID: 68e5df8c6c2b71fda600d7a580f6a69e6b49616041b5cc230b8df102a1112921
                                        • Opcode Fuzzy Hash: 6e9e5d0bdc694482e91990ca72d61dfa2655ddb118e4d6b21dbbf39716475efc
                                        • Instruction Fuzzy Hash: 99917130E20209DFDB68DFA5D954BAEBBF6BF44301F108929E909AB354DB349D45CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                        • API String ID: 0-390881366
                                        • Opcode ID: 602c1ad50aff1e708c263a03fb8ecbb85c79caa7bfed6441d0e4b6952d9826bb
                                        • Instruction ID: f5b3c302880598e4bf4e804b1e086867f515565bd06eb1e3427698e43f8b0c4b
                                        • Opcode Fuzzy Hash: 602c1ad50aff1e708c263a03fb8ecbb85c79caa7bfed6441d0e4b6952d9826bb
                                        • Instruction Fuzzy Hash: FEF13F30A11209CFDB55EFA4E594A5EBBB3FF84300F248568E5059B398DB31EC86CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q
                                        • API String ID: 0-2125118731
                                        • Opcode ID: 2d4eefdba42537b50ac375335558bb4874464e60f0c830497763762307dc2f8f
                                        • Instruction ID: 5cd35326641cb2079732329e5f0211bb3e64349768cebd6f88d24e6bb3001d6a
                                        • Opcode Fuzzy Hash: 2d4eefdba42537b50ac375335558bb4874464e60f0c830497763762307dc2f8f
                                        • Instruction Fuzzy Hash: 95B13C30E102099FDB54EB69D99469EB7B2FF84300F24886DE506AB395DB75DC86CB80
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LR^q$LR^q$$^q$$^q
                                        • API String ID: 0-2454687669
                                        • Opcode ID: 2257baab2b6eb768300f078772eba9b5693c3659d78f971bd63e86e5e6f55252
                                        • Instruction ID: 67c2c6e3863768149d3f33ba581048d3b46e23f65fdff4c4d76ddf63d9252ae1
                                        • Opcode Fuzzy Hash: 2257baab2b6eb768300f078772eba9b5693c3659d78f971bd63e86e5e6f55252
                                        • Instruction Fuzzy Hash: 8051AE31B102059FDB58EB28D940A6AB7F6FF89700F1485ACE506DB3A5DE30EC45CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2900756933.00000000066F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066F0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_66f0000_Leoch-Purchase Order.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q
                                        • API String ID: 0-2125118731
                                        • Opcode ID: e37a1bf1ed5f18058aed8835592e27025d406d3db15af9d0312f7e82968f146e
                                        • Instruction ID: dbd2a67dc4a8eb810ecfb11d9a7f4cf1e4e80e242d569e430cdadb3c683bb0bb
                                        • Opcode Fuzzy Hash: e37a1bf1ed5f18058aed8835592e27025d406d3db15af9d0312f7e82968f146e
                                        • Instruction Fuzzy Hash: DD516230E21205DFDFA5DBA4E9806AEB7B2EF85310F148529E609DB354DB30EC45CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Execution Graph

                                        Execution Coverage:36.4%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:123
                                        Total number of Limit Nodes:0
                                        execution_graph 1166 ad0848 1167 ad0857 1166->1167 1170 ad0971 1167->1170 1171 ad09c4 1170->1171 1175 ad0a00 1171->1175 1179 ad0a10 1171->1179 1172 ad089f 1176 ad0a10 1175->1176 1183 ad0a88 1176->1183 1180 ad0a39 1179->1180 1182 ad0a88 2 API calls 1180->1182 1181 ad0a53 1181->1181 1182->1181 1191 ad0a8d 1183->1191 1184 ad0a53 1187 ad056c VirtualAlloc 1188 ad0b40 1187->1188 1196 ad0d88 1188->1196 1200 ad0d78 1188->1200 1191->1184 1192 ad056c 1191->1192 1193 ad0ce0 VirtualAlloc 1192->1193 1195 ad0b29 1193->1195 1195->1187 1197 ad0dd5 1196->1197 1204 ad0e11 1197->1204 1201 ad0d88 1200->1201 1203 ad0e11 CallWindowProcA 1201->1203 1202 ad0dfb 1202->1184 1203->1202 1205 ad0e49 1204->1205 1209 ad0ea8 1205->1209 1213 ad0e98 1205->1213 1206 ad0e63 1210 ad0ed1 1209->1210 1212 ad0f31 1210->1212 1217 ad05b4 1210->1217 1212->1206 1215 ad0ea8 1213->1215 1214 ad05b4 CallWindowProcA 1214->1215 1215->1214 1216 ad0f31 1215->1216 1216->1206 1218 ad0fe8 CallWindowProcA 1217->1218 1220 ad1062 1218->1220 1220->1210 1307 ad0578 1308 ad057d 1307->1308 1309 ad059e CallWindowProcA 1308->1309 1312 ad05fc 1308->1312 1311 ad1062 1309->1311 1314 ad0971 2 API calls 1312->1314 1313 ad089f 1314->1313 1221 2570000 1254 2570054 1221->1254 1223 2570006 1286 2570420 1223->1286 1225 2570083 1226 2570420 VirtualAlloc 1225->1226 1227 257008f 1226->1227 1228 2570420 VirtualAlloc 1227->1228 1229 2570098 1228->1229 1230 2570420 VirtualAlloc 1229->1230 1231 25700a1 1230->1231 1232 2570420 VirtualAlloc 1231->1232 1233 25700aa 1232->1233 1234 2570420 VirtualAlloc 1233->1234 1235 25700b6 1234->1235 1236 2570155 CreateProcessW 1235->1236 1237 2570170 1236->1237 1238 257018b NtUnmapViewOfSection 1237->1238 1239 257019b 1238->1239 1240 25701b8 VirtualAllocEx 1239->1240 1241 25701d2 1240->1241 1242 2570214 WriteProcessMemory 1241->1242 1243 2570220 1242->1243 1244 25702fa WriteProcessMemory 1243->1244 1245 257031e 1243->1245 1244->1243 1246 257034f Wow64GetThreadContext 1245->1246 1247 257035e 1246->1247 1248 257039e WriteProcessMemory 1247->1248 1249 25703aa 1248->1249 1250 25703e5 Wow64SetThreadContext 1249->1250 1251 25703f5 1250->1251 1252 2570407 ResumeThread 1251->1252 1253 2570415 1252->1253 1255 257005e 1254->1255 1256 2570420 VirtualAlloc 1255->1256 1257 2570083 1256->1257 1258 2570420 VirtualAlloc 1257->1258 1259 257008f 1258->1259 1260 2570420 VirtualAlloc 1259->1260 1261 2570098 1260->1261 1262 2570420 VirtualAlloc 1261->1262 1263 25700a1 1262->1263 1264 2570420 VirtualAlloc 1263->1264 1265 25700aa 1264->1265 1266 2570420 VirtualAlloc 1265->1266 1267 25700b6 1266->1267 1268 2570155 CreateProcessW 1267->1268 1269 2570170 1268->1269 1270 257018b NtUnmapViewOfSection 1269->1270 1271 257019b 1270->1271 1272 25701b8 VirtualAllocEx 1271->1272 1273 25701d2 1272->1273 1274 2570214 WriteProcessMemory 1273->1274 1275 2570220 1274->1275 1276 25702fa WriteProcessMemory 1275->1276 1277 257031e 1275->1277 1276->1275 1278 257034f Wow64GetThreadContext 1277->1278 1279 257035e 1278->1279 1280 257039e WriteProcessMemory 1279->1280 1281 25703aa 1280->1281 1282 25703e5 Wow64SetThreadContext 1281->1282 1283 25703f5 1282->1283 1284 2570407 ResumeThread 1283->1284 1285 2570415 1284->1285 1285->1223 1287 2570427 1286->1287 1288 2570432 VirtualAlloc 1287->1288 1289 257044a 1288->1289 1289->1225 1295 ad0fe0 1296 ad0fe8 CallWindowProcA 1295->1296 1298 ad1062 1296->1298 1303 ad0562 1304 ad0566 1303->1304 1306 ad0971 2 API calls 1304->1306 1305 ad089f 1306->1305 1315 ad0c72 1316 ad0cb3 VirtualAlloc 1315->1316 1317 ad0c8d 1315->1317 1319 ad0d57 1316->1319

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 02570054: CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?,00000042,0000002A,0000002E,?,16B3FE88,00000000), ref: 02570167
                                        • NtUnmapViewOfSection.NTDLL(?,?,0000002E,00000022,?,F21037D0,00000012,?,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 02570192
                                        • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040,0000002E,00000022,?,6E1A959C,00000000,?,?,0000002E,00000022,?,F21037D0), ref: 025701C9
                                        • WriteProcessMemory.KERNELBASE ref: 02570217
                                        • WriteProcessMemory.KERNELBASE(00000026,0000003E,00000026,?,CF14E85B,00000012), ref: 025702FD
                                        • Wow64GetThreadContext.KERNEL32(?,?,0000002E,00000032,?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 02570355
                                        • WriteProcessMemory.KERNELBASE(?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 025703A1
                                        • Wow64SetThreadContext.KERNEL32(?,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000,00000032,0000003A,00000036), ref: 025703EC
                                        • ResumeThread.KERNELBASE(?,0000002E,?,9E4A3F88,00000000,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000), ref: 0257040C
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1775596305.0000000002570000.00000040.00001000.00020000.00000000.sdmp, Offset: 02570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2570000_uaAWu.jbxd
                                        Similarity
                                        • API ID: Process$MemoryThreadWrite$ContextWow64$AllocCreateResumeSectionUnmapViewVirtual
                                        • String ID:
                                        • API String ID: 2814188497-0
                                        • Opcode ID: 083de847d8922841928b66d0ab862014bd189770b687f49c37d57b8513a74b61
                                        • Instruction ID: dee99e88c6bdc7eac9d70d7347335dc40c3224c46aa3fa79bbfa80f532b96ad8
                                        • Opcode Fuzzy Hash: 083de847d8922841928b66d0ab862014bd189770b687f49c37d57b8513a74b61
                                        • Instruction Fuzzy Hash: C1B10F746E0245BFE61577F1EC06F2937A7BFC6708F148079E2005F1E1D9A25811CB6A
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 02570420: VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040,?,91AFCA54,00000000,02570083,0000003C,0000001E,0000004A,0000003E,00000042), ref: 0257043F
                                        • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?,00000042,0000002A,0000002E,?,16B3FE88,00000000), ref: 02570167
                                        • NtUnmapViewOfSection.NTDLL(?,?,0000002E,00000022,?,F21037D0,00000012,?,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 02570192
                                        • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040,0000002E,00000022,?,6E1A959C,00000000,?,?,0000002E,00000022,?,F21037D0), ref: 025701C9
                                        • WriteProcessMemory.KERNELBASE ref: 02570217
                                        • WriteProcessMemory.KERNELBASE(00000026,0000003E,00000026,?,CF14E85B,00000012), ref: 025702FD
                                        • Wow64GetThreadContext.KERNEL32(?,?,0000002E,00000032,?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 02570355
                                        • WriteProcessMemory.KERNELBASE(?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 025703A1
                                        • Wow64SetThreadContext.KERNEL32(?,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000,00000032,0000003A,00000036), ref: 025703EC
                                        • ResumeThread.KERNELBASE(?,0000002E,?,9E4A3F88,00000000,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000), ref: 0257040C
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1775596305.0000000002570000.00000040.00001000.00020000.00000000.sdmp, Offset: 02570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2570000_uaAWu.jbxd
                                        Similarity
                                        • API ID: Process$MemoryThreadWrite$AllocContextVirtualWow64$CreateResumeSectionUnmapView
                                        • String ID:
                                        • API String ID: 4009322845-0
                                        • Opcode ID: abefd893c78f63ec501357fb14bf61d80a739cae84c00b71e3bd370fcc70d613
                                        • Instruction ID: a9306a9c03bc0d80599ab0265a18f81c9968f9ea93b1fd6ab8f1c6b130c85fd2
                                        • Opcode Fuzzy Hash: abefd893c78f63ec501357fb14bf61d80a739cae84c00b71e3bd370fcc70d613
                                        • Instruction Fuzzy Hash: C9A1DC747E0206BFE61577F1EC46F293697BFC5B0CF208178E2006F1D1D9A26D219A6A
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 341 ad0578-ad059c 344 ad05fc-ad088f 341->344 345 ad059e-ad1023 341->345 359 ad0897-ad08a6 call ad0971 344->359 351 ad102b-ad1060 CallWindowProcA 345->351 352 ad1069-ad107d 351->352 353 ad1062-ad1068 351->353 353->352 361 ad08ae-ad08b1 359->361
                                        APIs
                                        • CallWindowProcA.USER32(?,00000000,?,?,FFFFFFFF), ref: 00AD1053
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1775408709.0000000000AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_ad0000_uaAWu.jbxd
                                        Similarity
                                        • API ID: CallProcWindow
                                        • String ID:
                                        • API String ID: 2714655100-0
                                        • Opcode ID: 8810e58b302d6705024b374d3ec7fc97faba2c4259e60394726c82b6a1559a2e
                                        • Instruction ID: a72d70bcb54ba0cb39847351fbb190b0e3736793e323270307b99ea3eb08231a
                                        • Opcode Fuzzy Hash: 8810e58b302d6705024b374d3ec7fc97faba2c4259e60394726c82b6a1559a2e
                                        • Instruction Fuzzy Hash: FD41E6719083848FCB02EF78D858ADEBFF0EF4A310F0584AAD495DB262D7345849CBA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 363 ad05b4-ad1060 CallWindowProcA 366 ad1069-ad107d 363->366 367 ad1062-ad1068 363->367 367->366
                                        APIs
                                        • CallWindowProcA.USER32(?,00000000,?,?,FFFFFFFF), ref: 00AD1053
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1775408709.0000000000AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_ad0000_uaAWu.jbxd
                                        Similarity
                                        • API ID: CallProcWindow
                                        • String ID:
                                        • API String ID: 2714655100-0
                                        • Opcode ID: c475f4477e219b3927b16ca73eb340aca9c7e7c15fd6e2ad9c4714eed25dd962
                                        • Instruction ID: 9801559a433c21249ae764560f4f6ff7ef98edcaed798c1c934f1e9834c86bb3
                                        • Opcode Fuzzy Hash: c475f4477e219b3927b16ca73eb340aca9c7e7c15fd6e2ad9c4714eed25dd962
                                        • Instruction Fuzzy Hash: F31104B5900248DFCB20DF9AC844BDEBFF4EB48320F20842AE569A7350C375A940CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 369 ad0fe0-ad1023 371 ad102b-ad1060 CallWindowProcA 369->371 372 ad1069-ad107d 371->372 373 ad1062-ad1068 371->373 373->372
                                        APIs
                                        • CallWindowProcA.USER32(?,00000000,?,?,FFFFFFFF), ref: 00AD1053
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1775408709.0000000000AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_ad0000_uaAWu.jbxd
                                        Similarity
                                        • API ID: CallProcWindow
                                        • String ID:
                                        • API String ID: 2714655100-0
                                        • Opcode ID: f15214c56964eaa28b7e6d8c06ac03afada4bc405002db2952a652d36217bc64
                                        • Instruction ID: 5c6c88fb8823a240244454d19e0e6c21514be57c5534f49275d1f35f0e8d84f7
                                        • Opcode Fuzzy Hash: f15214c56964eaa28b7e6d8c06ac03afada4bc405002db2952a652d36217bc64
                                        • Instruction Fuzzy Hash: 711116B5900249DFDB20DF9AC844BDEBFF4FB48324F208419E558A7250C375A980CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 375 ad0c80-ad0c8b 376 ad0c8d-ad0cb2 375->376 377 ad0cb3-ad0d55 VirtualAlloc 375->377 387 ad0d5e-ad0d72 377->387 388 ad0d57-ad0d5d 377->388 388->387
                                        APIs
                                        • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 00AD0D48
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1775408709.0000000000AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_ad0000_uaAWu.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 34d7fd4bf9fd2d29f5dd7cc92eba8c7f7962189cb7f3bc29e5c81c23f1a83ce5
                                        • Instruction ID: 1132e5fdb90b5b12e18823d97e54c9efeaaa5ff6ed335b9787e0f2701b20efc2
                                        • Opcode Fuzzy Hash: 34d7fd4bf9fd2d29f5dd7cc92eba8c7f7962189cb7f3bc29e5c81c23f1a83ce5
                                        • Instruction Fuzzy Hash: 7D31BF75A002089FCB14DF9AD944B9EBBF5EF88320F10846AE559A7350CB74A841CBA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040,?,91AFCA54,00000000,02570083,0000003C,0000001E,0000004A,0000003E,00000042), ref: 0257043F
                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1775596305.0000000002570000.00000040.00001000.00020000.00000000.sdmp, Offset: 02570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_2570000_uaAWu.jbxd
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 06eb02c548db0a05d1e20e56bead04f6bc1efedc2ff2b69c3f0a506310807bbb
                                        • Instruction ID: 8ca280a8df2c68e2a64f7fcb3bdcddba9d1361b84ed39647e5016d55ffeda2c6
                                        • Opcode Fuzzy Hash: 06eb02c548db0a05d1e20e56bead04f6bc1efedc2ff2b69c3f0a506310807bbb
                                        • Instruction Fuzzy Hash: CCD0A9701D43026AE2017BA2AC02F0826C3BB80B09F400824F304380E0C5AA98180A5A
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1775312513.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_a7d000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0a024bd853a8bfa8ce2a24e04aba2b1fe8e5b7488e6e691414cfb25facfc0008
                                        • Instruction ID: 6aca07d1670c37dcfc94f0d88ab00c42d0e256ac815e50b5de7c3905886ace5f
                                        • Opcode Fuzzy Hash: 0a024bd853a8bfa8ce2a24e04aba2b1fe8e5b7488e6e691414cfb25facfc0008
                                        • Instruction Fuzzy Hash: 1401DB710083409AE7144B15CDC4767FFFCEF45364F18C929ED0D5A196C679D840CA71
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000002.00000002.1775312513.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_2_2_a7d000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: def5d5a1fdfe1d1223722952064a8697ff4c0da2b81f5e6f6e4f7ec9351f4eac
                                        • Instruction ID: cd00316e1cd1def30b76d4c4be17ad49818ebf2cf6b7067b325a4939f6d7170c
                                        • Opcode Fuzzy Hash: def5d5a1fdfe1d1223722952064a8697ff4c0da2b81f5e6f6e4f7ec9351f4eac
                                        • Instruction Fuzzy Hash: 1CF06271408384AAE7148B16DCC4B62FFACEF55774F18C45AED4C5A296C2799844CA71
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Execution Graph

                                        Execution Coverage:10.7%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:184
                                        Total number of Limit Nodes:8
                                        execution_graph 40903 6f6d8d0 40904 6f6d938 CreateWindowExW 40903->40904 40906 6f6d9f4 40904->40906 40906->40906 40909 196ef60 40910 196efa6 GlobalMemoryStatusEx 40909->40910 40911 196efd6 40910->40911 40912 6f6bb40 40913 6f6bb82 40912->40913 40914 6f6bb88 LoadLibraryExW 40912->40914 40913->40914 40915 6f6bbb9 40914->40915 40916 188d030 40917 188d048 40916->40917 40918 188d0a2 40917->40918 40925 6f6da77 40917->40925 40931 6f6da88 40917->40931 40937 6f6ebd8 40917->40937 40943 6f6dbb1 40917->40943 40947 6f6aa84 40917->40947 40953 6f6aa74 40917->40953 40926 6f6da88 40925->40926 40927 6f6aa74 GetModuleHandleW 40926->40927 40928 6f6daba 40927->40928 40929 6f6aa84 2 API calls 40928->40929 40930 6f6dacf 40929->40930 40930->40918 40932 6f6daae 40931->40932 40933 6f6aa74 GetModuleHandleW 40932->40933 40934 6f6daba 40933->40934 40935 6f6aa84 2 API calls 40934->40935 40936 6f6dacf 40935->40936 40936->40918 40938 6f6ebe8 40937->40938 40939 6f6ec47 40938->40939 40957 6f6ed70 40938->40957 40962 6f6ee3c 40938->40962 40968 6f6ed60 40938->40968 40944 6f6dbc0 40943->40944 40992 6f6aaac 40944->40992 40946 6f6dbc7 40946->40918 40948 6f6aa8f 40947->40948 40949 6f6ec47 40948->40949 40950 6f6ed70 2 API calls 40948->40950 40951 6f6ed60 2 API calls 40948->40951 40952 6f6ee3c 2 API calls 40948->40952 40950->40949 40951->40949 40952->40949 40954 6f6aa7f 40953->40954 40955 6f6aaac GetModuleHandleW 40954->40955 40956 6f6dbc7 40955->40956 40956->40918 40958 6f6ed84 40957->40958 40973 6f6ee28 40958->40973 40976 6f6ee18 40958->40976 40959 6f6ee10 40959->40939 40963 6f6edfa 40962->40963 40964 6f6ee4a 40962->40964 40966 6f6ee28 2 API calls 40963->40966 40967 6f6ee18 2 API calls 40963->40967 40965 6f6ee10 40965->40939 40966->40965 40967->40965 40970 6f6ed70 40968->40970 40969 6f6ee10 40969->40939 40971 6f6ee28 2 API calls 40970->40971 40972 6f6ee18 2 API calls 40970->40972 40971->40969 40972->40969 40974 6f6ee39 40973->40974 40980 196fdc0 40973->40980 40974->40959 40977 6f6ee28 40976->40977 40978 6f6ee39 40977->40978 40979 196fdc0 2 API calls 40977->40979 40978->40959 40979->40978 40984 196fde2 40980->40984 40988 196fdf0 40980->40988 40981 196fdda 40981->40974 40985 196fdf0 40984->40985 40986 196fe8a CallWindowProcW 40985->40986 40987 196fe39 40985->40987 40986->40987 40987->40981 40989 196fe32 40988->40989 40991 196fe39 40988->40991 40990 196fe8a CallWindowProcW 40989->40990 40989->40991 40990->40991 40991->40981 40993 6f6aab7 40992->40993 40995 6f6dc98 40993->40995 41006 6f6a8a0 40993->41006 40996 6f6dcf5 40995->40996 40998 6f6aaac GetModuleHandleW 40995->40998 40999 6f6dbd0 40995->40999 40996->40946 40998->40996 41000 6f6dbe0 40999->41000 41001 6f6dc98 41000->41001 41002 6f6a8a0 GetModuleHandleW 41000->41002 41003 6f6dcf5 41001->41003 41004 6f6dbd0 GetModuleHandleW 41001->41004 41005 6f6aaac GetModuleHandleW 41001->41005 41002->41001 41003->40996 41004->41003 41005->41003 41007 6f6b8d8 GetModuleHandleW 41006->41007 41009 6f6b94d 41007->41009 41009->40995 40907 6f63418 DuplicateHandle 40908 6f634ae 40907->40908 41010 1960848 41012 196084e 41010->41012 41011 196091b 41012->41011 41015 6f620c8 41012->41015 41019 6f620b8 41012->41019 41016 6f620d7 41015->41016 41023 6f61aa0 41016->41023 41020 6f620d7 41019->41020 41021 6f61aa0 3 API calls 41020->41021 41022 6f620f8 41021->41022 41022->41012 41024 6f61aab 41023->41024 41027 6f62f44 41024->41027 41026 6f63a7e 41026->41026 41028 6f62f4f 41027->41028 41029 6f641a4 41028->41029 41032 6f65a26 41028->41032 41036 6f65a28 41028->41036 41029->41026 41033 6f65a49 41032->41033 41034 6f65a6d 41033->41034 41040 6f65bd8 41033->41040 41034->41029 41037 6f65a49 41036->41037 41038 6f65a6d 41037->41038 41039 6f65bd8 3 API calls 41037->41039 41038->41029 41039->41038 41043 6f65be5 41040->41043 41041 6f65c1e 41041->41034 41043->41041 41044 6f63f54 41043->41044 41045 6f63f5f 41044->41045 41047 6f66090 41045->41047 41048 6f63f64 41045->41048 41049 6f63f6f 41048->41049 41055 6f63f74 41049->41055 41051 6f660ff 41059 6f6b408 41051->41059 41067 6f6b420 41051->41067 41052 6f66139 41052->41047 41058 6f63f7f 41055->41058 41056 6f67388 41056->41051 41057 6f65a28 3 API calls 41057->41056 41058->41056 41058->41057 41060 6f6b420 41059->41060 41061 6f6b45d 41060->41061 41076 6f6b698 41060->41076 41080 6f6b688 41060->41080 41061->41052 41062 6f6b49d 41085 6f6c998 41062->41085 41092 6f6c989 41062->41092 41069 6f6b451 41067->41069 41070 6f6b551 41067->41070 41068 6f6b45d 41068->41052 41069->41068 41072 6f6b698 3 API calls 41069->41072 41073 6f6b688 3 API calls 41069->41073 41070->41052 41071 6f6b49d 41074 6f6c998 GetModuleHandleW 41071->41074 41075 6f6c989 GetModuleHandleW 41071->41075 41072->41071 41073->41071 41074->41070 41075->41070 41099 6f6b6e8 41076->41099 41108 6f6b6d8 41076->41108 41077 6f6b6a2 41077->41062 41081 6f6b698 41080->41081 41083 6f6b6e8 2 API calls 41081->41083 41084 6f6b6d8 2 API calls 41081->41084 41082 6f6b6a2 41082->41062 41083->41082 41084->41082 41086 6f6c9c3 41085->41086 41117 6f6cef0 41086->41117 41122 6f6cf00 41086->41122 41087 6f6ca46 41088 6f6a8a0 GetModuleHandleW 41087->41088 41089 6f6ca72 41087->41089 41088->41089 41093 6f6c998 41092->41093 41097 6f6cef0 GetModuleHandleW 41093->41097 41098 6f6cf00 GetModuleHandleW 41093->41098 41094 6f6ca46 41095 6f6a8a0 GetModuleHandleW 41094->41095 41096 6f6ca72 41094->41096 41095->41096 41097->41094 41098->41094 41100 6f6b6f9 41099->41100 41103 6f6b71c 41099->41103 41101 6f6a8a0 GetModuleHandleW 41100->41101 41102 6f6b704 41101->41102 41102->41103 41107 6f6b972 GetModuleHandleW 41102->41107 41103->41077 41104 6f6b714 41104->41103 41105 6f6b920 GetModuleHandleW 41104->41105 41106 6f6b94d 41105->41106 41106->41077 41107->41104 41109 6f6b6dd 41108->41109 41110 6f6a8a0 GetModuleHandleW 41109->41110 41112 6f6b71c 41109->41112 41111 6f6b704 41110->41111 41111->41112 41116 6f6b972 GetModuleHandleW 41111->41116 41112->41077 41113 6f6b920 GetModuleHandleW 41115 6f6b94d 41113->41115 41114 6f6b714 41114->41112 41114->41113 41115->41077 41116->41114 41118 6f6cf00 41117->41118 41119 6f6cfae 41118->41119 41120 6f6d070 GetModuleHandleW 41118->41120 41121 6f6d060 GetModuleHandleW 41118->41121 41120->41119 41121->41119 41123 6f6cf2d 41122->41123 41124 6f6cfae 41123->41124 41125 6f6d070 GetModuleHandleW 41123->41125 41126 6f6d060 GetModuleHandleW 41123->41126 41125->41124 41126->41124

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 651 6f73170-6f73191 652 6f73193-6f73196 651->652 653 6f731bc-6f731bf 652->653 654 6f73198-6f731b7 652->654 655 6f731c5-6f731e4 653->655 656 6f73960-6f73962 653->656 654->653 664 6f731e6-6f731e9 655->664 665 6f731fd-6f73207 655->665 658 6f73964 656->658 659 6f73969-6f7396c 656->659 658->659 659->652 660 6f73972-6f7397b 659->660 664->665 666 6f731eb-6f731fb 664->666 669 6f7320d-6f7321c 665->669 666->669 777 6f7321e call 6f73990 669->777 778 6f7321e call 6f73988 669->778 670 6f73223-6f73228 671 6f73235-6f73512 670->671 672 6f7322a-6f73230 670->672 693 6f73952-6f7395f 671->693 694 6f73518-6f735c7 671->694 672->660 703 6f735f0 694->703 704 6f735c9-6f735ee 694->704 705 6f735f9-6f7360c 703->705 704->705 708 6f73612-6f73634 705->708 709 6f73939-6f73945 705->709 708->709 712 6f7363a-6f73644 708->712 709->694 710 6f7394b 709->710 710->693 712->709 713 6f7364a-6f73655 712->713 713->709 714 6f7365b-6f73731 713->714 726 6f73733-6f73735 714->726 727 6f7373f-6f7376f 714->727 726->727 731 6f73771-6f73773 727->731 732 6f7377d-6f73789 727->732 731->732 733 6f7378b-6f7378f 732->733 734 6f737e9-6f737ed 732->734 733->734 737 6f73791-6f737bb 733->737 735 6f737f3-6f7382f 734->735 736 6f7392a-6f73933 734->736 747 6f73831-6f73833 735->747 748 6f7383d-6f7384b 735->748 736->709 736->714 744 6f737bd-6f737bf 737->744 745 6f737c9-6f737e6 737->745 744->745 745->734 747->748 751 6f73862-6f7386d 748->751 752 6f7384d-6f73858 748->752 756 6f73885-6f73896 751->756 757 6f7386f-6f73875 751->757 752->751 755 6f7385a 752->755 755->751 761 6f738ae-6f738ba 756->761 762 6f73898-6f7389e 756->762 758 6f73877 757->758 759 6f73879-6f7387b 757->759 758->756 759->756 766 6f738d2-6f73923 761->766 767 6f738bc-6f738c2 761->767 763 6f738a2-6f738a4 762->763 764 6f738a0 762->764 763->761 764->761 766->736 768 6f738c6-6f738c8 767->768 769 6f738c4 767->769 768->766 769->766 777->670 778->670
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                        • API String ID: 0-2392861976
                                        • Opcode ID: 4033416a34005d0632367cc92cebcdfbaf9154fe278ee517ea239f95481926ff
                                        • Instruction ID: 12c611064fa6c524bf68690585b5967d79365ceedaab606c0d307172cdf8a678
                                        • Opcode Fuzzy Hash: 4033416a34005d0632367cc92cebcdfbaf9154fe278ee517ea239f95481926ff
                                        • Instruction Fuzzy Hash: C2323F31E1071ADFCB14DF79C8945ADB7B6FF89300F1486AAD449AB254EB30AD85CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1322 6f77e48-6f77e66 1323 6f77e68-6f77e6b 1322->1323 1324 6f77e82-6f77e85 1323->1324 1325 6f77e6d-6f77e7b 1323->1325 1326 6f77e87-6f77ea3 1324->1326 1327 6f77ea8-6f77eab 1324->1327 1331 6f77eee-6f77f04 1325->1331 1332 6f77e7d 1325->1332 1326->1327 1328 6f77ead-6f77eb7 1327->1328 1329 6f77eb8-6f77ebb 1327->1329 1334 6f77ebd-6f77ed7 1329->1334 1335 6f77edc-6f77ede 1329->1335 1341 6f7811f-6f78129 1331->1341 1342 6f77f0a-6f77f13 1331->1342 1332->1324 1334->1335 1336 6f77ee5-6f77ee8 1335->1336 1337 6f77ee0 1335->1337 1336->1323 1336->1331 1337->1336 1343 6f7812a-6f7815f 1342->1343 1344 6f77f19-6f77f36 1342->1344 1348 6f78161-6f78164 1343->1348 1354 6f7810c-6f78119 1344->1354 1355 6f77f3c-6f77f64 1344->1355 1350 6f7816a-6f78179 1348->1350 1351 6f78399-6f7839c 1348->1351 1359 6f7817b-6f78196 1350->1359 1360 6f78198-6f781dc 1350->1360 1352 6f783bf-6f783c2 1351->1352 1353 6f7839e-6f783ba 1351->1353 1357 6f7846d-6f7846f 1352->1357 1358 6f783c8-6f783d4 1352->1358 1353->1352 1354->1341 1354->1342 1355->1354 1373 6f77f6a-6f77f73 1355->1373 1362 6f78476-6f78479 1357->1362 1363 6f78471 1357->1363 1365 6f783df-6f783e1 1358->1365 1359->1360 1374 6f781e2-6f781f3 1360->1374 1375 6f7836d-6f78383 1360->1375 1362->1348 1366 6f7847f-6f78488 1362->1366 1363->1362 1370 6f783e3-6f783e9 1365->1370 1371 6f783f9-6f783fd 1365->1371 1376 6f783ed-6f783ef 1370->1376 1377 6f783eb 1370->1377 1378 6f783ff-6f78409 1371->1378 1379 6f7840b 1371->1379 1373->1343 1380 6f77f79-6f77f95 1373->1380 1389 6f781f9-6f78216 1374->1389 1390 6f78358-6f78367 1374->1390 1375->1351 1376->1371 1377->1371 1383 6f78410-6f78412 1378->1383 1379->1383 1392 6f77f9b-6f77fc5 1380->1392 1393 6f780fa-6f78106 1380->1393 1385 6f78414-6f78417 1383->1385 1386 6f78423-6f7845c 1383->1386 1385->1366 1386->1350 1405 6f78462-6f7846c 1386->1405 1389->1390 1399 6f7821c-6f78312 call 6f76668 1389->1399 1390->1374 1390->1375 1406 6f780f0-6f780f5 1392->1406 1407 6f77fcb-6f77ff3 1392->1407 1393->1354 1393->1373 1455 6f78314-6f7831e 1399->1455 1456 6f78320 1399->1456 1406->1393 1407->1406 1413 6f77ff9-6f78027 1407->1413 1413->1406 1419 6f7802d-6f78036 1413->1419 1419->1406 1420 6f7803c-6f7806e 1419->1420 1428 6f78070-6f78074 1420->1428 1429 6f78079-6f78095 1420->1429 1428->1406 1432 6f78076 1428->1432 1429->1393 1430 6f78097-6f780ee call 6f76668 1429->1430 1430->1393 1432->1429 1457 6f78325-6f78327 1455->1457 1456->1457 1457->1390 1458 6f78329-6f7832e 1457->1458 1459 6f78330-6f7833a 1458->1459 1460 6f7833c 1458->1460 1461 6f78341-6f78343 1459->1461 1460->1461 1461->1390 1462 6f78345-6f78351 1461->1462 1462->1390
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q
                                        • API String ID: 0-355816377
                                        • Opcode ID: 52e4a1c80588fdc885c9c01557f99fd4feca9ca7a2b76912da42e69fff75e9a8
                                        • Instruction ID: f0a10fa53d69679bc09390c72a0d0aa25d23bfd01155383fe42087fb6a6287b9
                                        • Opcode Fuzzy Hash: 52e4a1c80588fdc885c9c01557f99fd4feca9ca7a2b76912da42e69fff75e9a8
                                        • Instruction Fuzzy Hash: D8029E30F012059FDB54DB68D894AAEB7E6FF88344F14846AD819DB390DB75EC82CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f6cd679e31e4656bceaed09de98e849699647cfb6342e4012a51c15a03e50a09
                                        • Instruction ID: 78eb570c4a61a4ade1d7aef2b4388475e50212f78e54bd03cd42cf7be9dd6d9c
                                        • Opcode Fuzzy Hash: f6cd679e31e4656bceaed09de98e849699647cfb6342e4012a51c15a03e50a09
                                        • Instruction Fuzzy Hash: 66A2F234E002088FDB64CB68C584B99B7F2FB49314F5484AAE449AB361DB75EE85CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c74648c52015829b94a00f29792e28ee390aa8a53d8d3189ccbaaad82eff135b
                                        • Instruction ID: a85b7f45b2df3d219277cd12c8b8b14999834b272f80f41dbbf5f12259aa9f6e
                                        • Opcode Fuzzy Hash: c74648c52015829b94a00f29792e28ee390aa8a53d8d3189ccbaaad82eff135b
                                        • Instruction Fuzzy Hash: F4629D34F006058FDB54DB68D994AADB7F2EF88314F14846AE80ADB390DB35ED46CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 50b404604a2e626ba2ecd4b5d3e385b59ab0dfdff2bdd2292662a490519f1dd4
                                        • Instruction ID: 32177e2a9fe8bbfb059468e1e71b6208c253f4c28f6e68f189934ea27e292f66
                                        • Opcode Fuzzy Hash: 50b404604a2e626ba2ecd4b5d3e385b59ab0dfdff2bdd2292662a490519f1dd4
                                        • Instruction Fuzzy Hash: 93328034F002099FDB54DF68E990AAEB7B6FB89310F108566E409E7354DB35EC86CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5887d74029c7b4f9280c7a5c166e53b323ce5afe4ca93d38e19d8d6e78a3f39a
                                        • Instruction ID: c1f74b49d9b9ea2de52347ac6146bb3539b42ce0d09cf55fa917ba85100f621e
                                        • Opcode Fuzzy Hash: 5887d74029c7b4f9280c7a5c166e53b323ce5afe4ca93d38e19d8d6e78a3f39a
                                        • Instruction Fuzzy Hash: 0312E471F002059BDB64DB64D8847AEB7B2EB85314F24883AD85ADB384DF34ED46CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3fbbafae6c13c63378635740197c664597621c96aec6f139ed8de91160eba5dd
                                        • Instruction ID: e84f21d031bae139acb4b3828b7708419bd7d63e886bc8281f748febb7468d11
                                        • Opcode Fuzzy Hash: 3fbbafae6c13c63378635740197c664597621c96aec6f139ed8de91160eba5dd
                                        • Instruction Fuzzy Hash: 59224F30E002099FEFA4DF68D5907AEB7B6FB8A310F148566E415DB395CA35DC81CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 527 6f7ada0-6f7adbe 528 6f7adc0-6f7adc3 527->528 529 6f7ade6-6f7ade9 528->529 530 6f7adc5-6f7ade1 528->530 531 6f7ae03-6f7ae06 529->531 532 6f7adeb-6f7adf4 529->532 530->529 533 6f7afbd-6f7afc6 531->533 534 6f7ae0c-6f7ae0f 531->534 536 6f7afd7-6f7b00e 532->536 537 6f7adfa-6f7adfe 532->537 533->532 540 6f7afcc-6f7afd6 533->540 538 6f7ae11-6f7ae16 534->538 539 6f7ae19-6f7ae1c 534->539 547 6f7b010-6f7b013 536->547 537->531 538->539 541 6f7ae36-6f7ae39 539->541 542 6f7ae1e-6f7ae31 539->542 545 6f7ae3b-6f7ae44 541->545 546 6f7ae49-6f7ae4c 541->546 542->541 545->546 549 6f7ae60-6f7ae63 546->549 550 6f7ae4e-6f7ae5b 546->550 551 6f7b036-6f7b039 547->551 552 6f7b015-6f7b031 547->552 555 6f7ae65-6f7ae69 549->555 556 6f7ae74-6f7ae76 549->556 550->549 553 6f7b046-6f7b049 551->553 554 6f7b03b-6f7b045 551->554 552->551 560 6f7b2b2-6f7b2b5 553->560 561 6f7b04f-6f7b08a 553->561 555->540 563 6f7ae6f 555->563 558 6f7ae7d-6f7ae80 556->558 559 6f7ae78 556->559 558->528 566 6f7ae86-6f7aeaa 558->566 559->558 564 6f7b2b7-6f7b2bb 560->564 565 6f7b2c6-6f7b2c9 560->565 575 6f7b090-6f7b09c 561->575 576 6f7b27d-6f7b290 561->576 563->556 564->561 567 6f7b2c1 564->567 568 6f7b2cb call 6f7b2f7 565->568 569 6f7b2d8-6f7b2da 565->569 582 6f7aeb0-6f7aebf 566->582 583 6f7afba 566->583 567->565 577 6f7b2d1-6f7b2d3 568->577 573 6f7b2e1-6f7b2e4 569->573 574 6f7b2dc 569->574 573->547 578 6f7b2ea-6f7b2f4 573->578 574->573 584 6f7b09e-6f7b0b7 575->584 585 6f7b0bc-6f7b100 575->585 579 6f7b292 576->579 577->569 579->560 588 6f7aed7-6f7af12 call 6f76668 582->588 589 6f7aec1-6f7aec7 582->589 583->533 584->579 601 6f7b102-6f7b114 585->601 602 6f7b11c-6f7b15b 585->602 608 6f7af14-6f7af1a 588->608 609 6f7af2a-6f7af41 588->609 591 6f7aecb-6f7aecd 589->591 592 6f7aec9 589->592 591->588 592->588 601->602 606 6f7b242-6f7b257 602->606 607 6f7b161-6f7b23c call 6f76668 602->607 606->576 607->606 611 6f7af1e-6f7af20 608->611 612 6f7af1c 608->612 619 6f7af43-6f7af49 609->619 620 6f7af59-6f7af6a 609->620 611->609 612->609 621 6f7af4d-6f7af4f 619->621 622 6f7af4b 619->622 625 6f7af82-6f7afb3 620->625 626 6f7af6c-6f7af72 620->626 621->620 622->620 625->583 628 6f7af76-6f7af78 626->628 629 6f7af74 626->629 628->625 629->625
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                        • API String ID: 0-3823777903
                                        • Opcode ID: 20a352ffc841504ce1b8d879f2d16bb834d1d29c449a69552d2fe538624ba0e5
                                        • Instruction ID: 3ae3d4579a5d690eef0cd061a13d5b2b7b90125d77140499beaf9865e0a9791f
                                        • Opcode Fuzzy Hash: 20a352ffc841504ce1b8d879f2d16bb834d1d29c449a69552d2fe538624ba0e5
                                        • Instruction Fuzzy Hash: 84E15B30E0020A8FDB65DF69D9846AEB7B2FF89304F11852AE409EB354DB75DC46CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                        • API String ID: 0-2392861976
                                        • Opcode ID: bc62e08f92a802d4b198aa1c7ab058f937d8ee511a40715f85da6ff03977d5db
                                        • Instruction ID: 4239c5c2a3cc28703e2d0a847c8ec407b05a15e7df5dc19af64fb0fe28abbef4
                                        • Opcode Fuzzy Hash: bc62e08f92a802d4b198aa1c7ab058f937d8ee511a40715f85da6ff03977d5db
                                        • Instruction Fuzzy Hash: 61027B30E002098FDBA4DF68D5807AEB7B2FB46310F14856AE815DB355DB35DD86CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 949 6f79218-6f7923d 950 6f7923f-6f79242 949->950 951 6f79244-6f79263 950->951 952 6f79268-6f7926b 950->952 951->952 953 6f79271-6f79286 952->953 954 6f79b2b-6f79b2d 952->954 961 6f7929e-6f792b4 953->961 962 6f79288-6f7928e 953->962 956 6f79b34-6f79b37 954->956 957 6f79b2f 954->957 956->950 959 6f79b3d-6f79b47 956->959 957->956 966 6f792bf-6f792c1 961->966 963 6f79292-6f79294 962->963 964 6f79290 962->964 963->961 964->961 967 6f792c3-6f792c9 966->967 968 6f792d9-6f7934a 966->968 969 6f792cd-6f792cf 967->969 970 6f792cb 967->970 979 6f79376-6f79392 968->979 980 6f7934c-6f7936f 968->980 969->968 970->968 985 6f79394-6f793b7 979->985 986 6f793be-6f793d9 979->986 980->979 985->986 991 6f79404-6f7941f 986->991 992 6f793db-6f793fd 986->992 997 6f79421-6f79443 991->997 998 6f7944a-6f79454 991->998 992->991 997->998 999 6f79456-6f7945f 998->999 1000 6f79464-6f794de 998->1000 999->959 1006 6f794e0-6f794fe 1000->1006 1007 6f7952b-6f79540 1000->1007 1011 6f79500-6f7950f 1006->1011 1012 6f7951a-6f79529 1006->1012 1007->954 1011->1012 1012->1006 1012->1007
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q
                                        • API String ID: 0-2125118731
                                        • Opcode ID: 9776f5878a739030bae771d21318835b1bd6b74ccdef3c3f9e52fc893ddc9598
                                        • Instruction ID: 66e8eac6cfc01829fb811a84d03c20b34a8280ba5428a0594c97f03382606b43
                                        • Opcode Fuzzy Hash: 9776f5878a739030bae771d21318835b1bd6b74ccdef3c3f9e52fc893ddc9598
                                        • Instruction Fuzzy Hash: EE912C30F0021A9FDB54DB69D9507AEB3F6EBC9314F10856AC809EB344EA74DD86CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1015 6f7d018-6f7d033 1016 6f7d035-6f7d038 1015->1016 1017 6f7d081-6f7d084 1016->1017 1018 6f7d03a-6f7d07c 1016->1018 1019 6f7d086-6f7d0c8 1017->1019 1020 6f7d0cd-6f7d0d0 1017->1020 1018->1017 1019->1020 1022 6f7d0d2-6f7d0d4 1020->1022 1023 6f7d0df-6f7d0e2 1020->1023 1024 6f7d501 1022->1024 1025 6f7d0da 1022->1025 1026 6f7d0e4-6f7d126 1023->1026 1027 6f7d12b-6f7d12e 1023->1027 1032 6f7d504-6f7d510 1024->1032 1025->1023 1026->1027 1030 6f7d177-6f7d17a 1027->1030 1031 6f7d130-6f7d172 1027->1031 1034 6f7d19d-6f7d1a0 1030->1034 1035 6f7d17c-6f7d198 1030->1035 1031->1030 1036 6f7d516-6f7d803 1032->1036 1037 6f7d2c5-6f7d2d4 1032->1037 1042 6f7d1a2-6f7d1a7 1034->1042 1043 6f7d1aa-6f7d1ad 1034->1043 1035->1034 1228 6f7da2a-6f7da34 1036->1228 1229 6f7d809-6f7d80f 1036->1229 1039 6f7d2d6-6f7d2db 1037->1039 1040 6f7d2e3-6f7d2ef 1037->1040 1039->1040 1048 6f7da35-6f7da6e 1040->1048 1049 6f7d2f5-6f7d307 1040->1049 1042->1043 1050 6f7d1f6-6f7d1f9 1043->1050 1051 6f7d1af-6f7d1f1 1043->1051 1071 6f7da70-6f7da73 1048->1071 1070 6f7d30c-6f7d30f 1049->1070 1053 6f7d216-6f7d219 1050->1053 1054 6f7d1fb-6f7d211 1050->1054 1051->1050 1063 6f7d262-6f7d265 1053->1063 1064 6f7d21b-6f7d25d 1053->1064 1054->1053 1067 6f7d267-6f7d269 1063->1067 1068 6f7d274-6f7d277 1063->1068 1064->1063 1078 6f7d3bf-6f7d3c8 1067->1078 1079 6f7d26f 1067->1079 1080 6f7d2c0-6f7d2c3 1068->1080 1081 6f7d279-6f7d288 1068->1081 1082 6f7d311-6f7d353 1070->1082 1083 6f7d358-6f7d35b 1070->1083 1084 6f7daa6-6f7daa9 1071->1084 1085 6f7da75-6f7daa1 1071->1085 1088 6f7d3d7-6f7d3e3 1078->1088 1089 6f7d3ca-6f7d3cf 1078->1089 1079->1068 1080->1037 1080->1070 1094 6f7d297-6f7d2a3 1081->1094 1095 6f7d28a-6f7d28f 1081->1095 1082->1083 1092 6f7d3a4-6f7d3a7 1083->1092 1093 6f7d35d-6f7d39f 1083->1093 1086 6f7daab call 6f7db8d 1084->1086 1087 6f7dab8-6f7dabb 1084->1087 1085->1084 1107 6f7dab1-6f7dab3 1086->1107 1098 6f7dade-6f7dae0 1087->1098 1099 6f7dabd-6f7dad9 1087->1099 1103 6f7d4f4-6f7d4f9 1088->1103 1104 6f7d3e9-6f7d3fd 1088->1104 1089->1088 1092->1032 1101 6f7d3ad-6f7d3af 1092->1101 1093->1092 1094->1048 1096 6f7d2a9-6f7d2bb 1094->1096 1095->1094 1096->1080 1110 6f7dae7-6f7daea 1098->1110 1111 6f7dae2 1098->1111 1099->1098 1108 6f7d3b6-6f7d3b9 1101->1108 1109 6f7d3b1 1101->1109 1103->1024 1104->1024 1123 6f7d403-6f7d415 1104->1123 1107->1087 1108->1016 1108->1078 1109->1108 1110->1071 1118 6f7daec-6f7dafb 1110->1118 1111->1110 1131 6f7db62-6f7db77 1118->1131 1132 6f7dafd-6f7db60 call 6f76668 1118->1132 1137 6f7d417-6f7d41d 1123->1137 1138 6f7d439-6f7d43b 1123->1138 1145 6f7db78 1131->1145 1132->1131 1143 6f7d421-6f7d42d 1137->1143 1144 6f7d41f 1137->1144 1150 6f7d445-6f7d451 1138->1150 1148 6f7d42f-6f7d437 1143->1148 1144->1148 1145->1145 1148->1150 1158 6f7d453-6f7d45d 1150->1158 1159 6f7d45f 1150->1159 1160 6f7d464-6f7d466 1158->1160 1159->1160 1160->1024 1162 6f7d46c-6f7d488 call 6f76668 1160->1162 1171 6f7d497-6f7d4a3 1162->1171 1172 6f7d48a-6f7d48f 1162->1172 1171->1103 1174 6f7d4a5-6f7d4f2 1171->1174 1172->1171 1174->1024 1230 6f7d811-6f7d816 1229->1230 1231 6f7d81e-6f7d827 1229->1231 1230->1231 1231->1048 1232 6f7d82d-6f7d840 1231->1232 1234 6f7d846-6f7d84c 1232->1234 1235 6f7da1a-6f7da24 1232->1235 1236 6f7d84e-6f7d853 1234->1236 1237 6f7d85b-6f7d864 1234->1237 1235->1228 1235->1229 1236->1237 1237->1048 1238 6f7d86a-6f7d88b 1237->1238 1241 6f7d88d-6f7d892 1238->1241 1242 6f7d89a-6f7d8a3 1238->1242 1241->1242 1242->1048 1243 6f7d8a9-6f7d8c6 1242->1243 1243->1235 1246 6f7d8cc-6f7d8d2 1243->1246 1246->1048 1247 6f7d8d8-6f7d8f1 1246->1247 1249 6f7d8f7-6f7d91e 1247->1249 1250 6f7da0d-6f7da14 1247->1250 1249->1048 1253 6f7d924-6f7d92e 1249->1253 1250->1235 1250->1246 1253->1048 1254 6f7d934-6f7d94b 1253->1254 1256 6f7d94d-6f7d958 1254->1256 1257 6f7d95a-6f7d975 1254->1257 1256->1257 1257->1250 1262 6f7d97b-6f7d994 call 6f76668 1257->1262 1266 6f7d996-6f7d99b 1262->1266 1267 6f7d9a3-6f7d9ac 1262->1267 1266->1267 1267->1048 1268 6f7d9b2-6f7da06 1267->1268 1268->1250
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q
                                        • API String ID: 0-831282457
                                        • Opcode ID: bfe5b46cd2ae645a0fc530bdfb2bd4be7fd7aaf8cb0974e2b0586f2b2d962ea1
                                        • Instruction ID: da121cad245473c69310ba1ea496e59173c718f262dc67aee29d7ceb72d608ed
                                        • Opcode Fuzzy Hash: bfe5b46cd2ae645a0fc530bdfb2bd4be7fd7aaf8cb0974e2b0586f2b2d962ea1
                                        • Instruction Fuzzy Hash: 3B623E30B002068FCB55DF68E584A5DB7B2FF84304F648969D4099F369DB75ED8ACB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1276 6f74c78-6f74c9c 1277 6f74c9e-6f74ca1 1276->1277 1278 6f74ca7-6f74d9f 1277->1278 1279 6f75380-6f75383 1277->1279 1299 6f74da5-6f74df2 call 6f75520 1278->1299 1300 6f74e22-6f74e29 1278->1300 1280 6f75385-6f7539f 1279->1280 1281 6f753a4-6f753a6 1279->1281 1280->1281 1283 6f753ad-6f753b0 1281->1283 1284 6f753a8 1281->1284 1283->1277 1286 6f753b6-6f753c3 1283->1286 1284->1283 1313 6f74df8-6f74e14 1299->1313 1301 6f74e2f-6f74e9f 1300->1301 1302 6f74ead-6f74eb6 1300->1302 1319 6f74ea1 1301->1319 1320 6f74eaa 1301->1320 1302->1286 1316 6f74e16 1313->1316 1317 6f74e1f 1313->1317 1316->1317 1317->1300 1319->1320 1320->1302
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: fcq$XPcq$\Ocq
                                        • API String ID: 0-3575482020
                                        • Opcode ID: e6213d94588f3190bd190275960ac602f9dab9143a62473565b54d5ad9b325dd
                                        • Instruction ID: dce71457b82b6c4b977de2664c41018ce038a5f8f2583400f5ce63ecb6cf491d
                                        • Opcode Fuzzy Hash: e6213d94588f3190bd190275960ac602f9dab9143a62473565b54d5ad9b325dd
                                        • Instruction Fuzzy Hash: F1616230F002099FEB559FA9C8547AEBBF7FB88310F20842AE505EB395DB758D458B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2217 6f7920a-6f7923d 2219 6f7923f-6f79242 2217->2219 2220 6f79244-6f79263 2219->2220 2221 6f79268-6f7926b 2219->2221 2220->2221 2222 6f79271-6f79286 2221->2222 2223 6f79b2b-6f79b2d 2221->2223 2230 6f7929e-6f792b4 2222->2230 2231 6f79288-6f7928e 2222->2231 2225 6f79b34-6f79b37 2223->2225 2226 6f79b2f 2223->2226 2225->2219 2228 6f79b3d-6f79b47 2225->2228 2226->2225 2235 6f792bf-6f792c1 2230->2235 2232 6f79292-6f79294 2231->2232 2233 6f79290 2231->2233 2232->2230 2233->2230 2236 6f792c3-6f792c9 2235->2236 2237 6f792d9-6f7934a 2235->2237 2238 6f792cd-6f792cf 2236->2238 2239 6f792cb 2236->2239 2248 6f79376-6f79392 2237->2248 2249 6f7934c-6f7936f 2237->2249 2238->2237 2239->2237 2254 6f79394-6f793b7 2248->2254 2255 6f793be-6f793d9 2248->2255 2249->2248 2254->2255 2260 6f79404-6f7941f 2255->2260 2261 6f793db-6f793fd 2255->2261 2266 6f79421-6f79443 2260->2266 2267 6f7944a-6f79454 2260->2267 2261->2260 2266->2267 2268 6f79456-6f7945f 2267->2268 2269 6f79464-6f794de 2267->2269 2268->2228 2275 6f794e0-6f794fe 2269->2275 2276 6f7952b-6f79540 2269->2276 2280 6f79500-6f7950f 2275->2280 2281 6f7951a-6f79529 2275->2281 2276->2223 2280->2281 2281->2275 2281->2276
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q
                                        • API String ID: 0-355816377
                                        • Opcode ID: 5c5a8107789ca4cec378bf927ab5f509a776f769dbb86bd308196e33c9a7e9ad
                                        • Instruction ID: 6b299d308154c5563b6d1fbf20c5f93cd1c3f58628ed2741a6202c2fb9b0add0
                                        • Opcode Fuzzy Hash: 5c5a8107789ca4cec378bf927ab5f509a776f769dbb86bd308196e33c9a7e9ad
                                        • Instruction Fuzzy Hash: 8F515F30B041059FDB54DB78D950BAEB3FAEBC9354F10846AD809DB744EA74DC42CB96
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2310 6f6b6e8-6f6b6f7 2311 6f6b723-6f6b727 2310->2311 2312 6f6b6f9-6f6b706 call 6f6a8a0 2310->2312 2313 6f6b73b-6f6b77c 2311->2313 2314 6f6b729-6f6b733 2311->2314 2319 6f6b71c 2312->2319 2320 6f6b708-6f6b716 call 6f6b972 2312->2320 2321 6f6b77e-6f6b786 2313->2321 2322 6f6b789-6f6b797 2313->2322 2314->2313 2319->2311 2320->2319 2326 6f6b858-6f6b918 2320->2326 2321->2322 2323 6f6b7bb-6f6b7bd 2322->2323 2324 6f6b799-6f6b79e 2322->2324 2327 6f6b7c0-6f6b7c7 2323->2327 2328 6f6b7a0-6f6b7a7 call 6f6a8ac 2324->2328 2329 6f6b7a9 2324->2329 2361 6f6b920-6f6b94b GetModuleHandleW 2326->2361 2362 6f6b91a-6f6b91d 2326->2362 2331 6f6b7d4-6f6b7db 2327->2331 2332 6f6b7c9-6f6b7d1 2327->2332 2330 6f6b7ab-6f6b7b9 2328->2330 2329->2330 2330->2327 2334 6f6b7dd-6f6b7e5 2331->2334 2335 6f6b7e8-6f6b7f1 call 6f63cb0 2331->2335 2332->2331 2334->2335 2341 6f6b7f3-6f6b7fb 2335->2341 2342 6f6b7fe-6f6b803 2335->2342 2341->2342 2343 6f6b805-6f6b80c 2342->2343 2344 6f6b821-6f6b825 2342->2344 2343->2344 2346 6f6b80e-6f6b81e call 6f68f08 call 6f6a8bc 2343->2346 2367 6f6b828 call 6f6bc40 2344->2367 2368 6f6b828 call 6f6bc30 2344->2368 2346->2344 2347 6f6b82b-6f6b82e 2350 6f6b830-6f6b84e 2347->2350 2351 6f6b851-6f6b857 2347->2351 2350->2351 2363 6f6b954-6f6b968 2361->2363 2364 6f6b94d-6f6b953 2361->2364 2362->2361 2364->2363 2367->2347 2368->2347
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904263778.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f60000_uaAWu.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 083353b0096cd0a5d47133fae10c7be321fe5837673518359866f1ea72d9c5b0
                                        • Instruction ID: eb3c84ce82e2db3b1b3d7010cefe18584b3b5e8a9ff2d33a5bb65a20a43edc2d
                                        • Opcode Fuzzy Hash: 083353b0096cd0a5d47133fae10c7be321fe5837673518359866f1ea72d9c5b0
                                        • Instruction Fuzzy Hash: 6A714470A00B058FD7A4DF2AD44475ABBF1FF88300F008A2DE48AD7A50D775E95ACB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2369 6f6d8c4-6f6d936 2371 6f6d941-6f6d948 2369->2371 2372 6f6d938-6f6d93e 2369->2372 2373 6f6d953-6f6d98b 2371->2373 2374 6f6d94a-6f6d950 2371->2374 2372->2371 2375 6f6d993-6f6d9f2 CreateWindowExW 2373->2375 2374->2373 2376 6f6d9f4-6f6d9fa 2375->2376 2377 6f6d9fb-6f6da33 2375->2377 2376->2377 2381 6f6da35-6f6da38 2377->2381 2382 6f6da40 2377->2382 2381->2382 2383 6f6da41 2382->2383 2383->2383
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06F6D9E2
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904263778.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f60000_uaAWu.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: 7463370ae711c1e7419c0ecbdc3d197fa0b3a7d9faec0d3d065f0f27a7bc2791
                                        • Instruction ID: 8d4f82c42c2078a1c7b020c5087caa598fed5d13b110fd0cc1c5c808c5cf09e4
                                        • Opcode Fuzzy Hash: 7463370ae711c1e7419c0ecbdc3d197fa0b3a7d9faec0d3d065f0f27a7bc2791
                                        • Instruction Fuzzy Hash: FA51D0B1D043499FDB14CFAAC984ADEBFB5BF48314F24812AE819AB214D7749885CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06F6D9E2
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904263778.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f60000_uaAWu.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: e4b3b72e44fa26e30bb688287facd8405d2f04ca450f0739f25f57082a2d3448
                                        • Instruction ID: 175ad104518d39edfcc7379b67b40dbc6bc3a02918b39fc3bceb4ea630568089
                                        • Opcode Fuzzy Hash: e4b3b72e44fa26e30bb688287facd8405d2f04ca450f0739f25f57082a2d3448
                                        • Instruction Fuzzy Hash: 8341C0B1D043499FDB14CFAAC994ADEBBB5BF48314F24812AE818AB214D7749845CF90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 0196FEB1
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2895433954.0000000001960000.00000040.00000800.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_1960000_uaAWu.jbxd
                                        Similarity
                                        • API ID: CallProcWindow
                                        • String ID:
                                        • API String ID: 2714655100-0
                                        • Opcode ID: 4e51bc3cc5602b0edd587ec3fd0744056059d91f0e62d584731a85685335d7f2
                                        • Instruction ID: adfa7324bb9e05d53414f2141c302916b69212ff17609d0f4ae0aa04c1170d42
                                        • Opcode Fuzzy Hash: 4e51bc3cc5602b0edd587ec3fd0744056059d91f0e62d584731a85685335d7f2
                                        • Instruction Fuzzy Hash: F94117B4900349CFDB15CF99C888AAABBF9FB88714F24C459D519AB321D334A841CFA0
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06F6349F
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904263778.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f60000_uaAWu.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 347dbd4ec11cae9f2f7af8c8cf304a2f1f8921cb4ae5f4028faa31b63668953a
                                        • Instruction ID: 75769e5864bf6797325c195a8c4004d0f7472b536548aa26e3f7d7d555e5d21d
                                        • Opcode Fuzzy Hash: 347dbd4ec11cae9f2f7af8c8cf304a2f1f8921cb4ae5f4028faa31b63668953a
                                        • Instruction Fuzzy Hash: F921E6B5D002589FDB10CFAAD984ADEFBF5FB48310F14801AE954A7310D3749954CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06F6349F
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904263778.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f60000_uaAWu.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: f350b6bf99e4bb7644a0f7c0a75b635d4cd79463ee0f50d00fa3216b2bb84ded
                                        • Instruction ID: c1e814ce156ade3b0dcb4de7b62586cd61046e9128f83a393a6d588a1e13c12d
                                        • Opcode Fuzzy Hash: f350b6bf99e4bb7644a0f7c0a75b635d4cd79463ee0f50d00fa3216b2bb84ded
                                        • Instruction Fuzzy Hash: AB21E4B5D002589FDB10CFAAD984ADEFBF8FB48320F14801AE914A7310D379A944CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 06F6BBAA
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904263778.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f60000_uaAWu.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 455b8f8fcb9eed033ec76361a7f9b203c87fc66329d0fded17323c78acd61630
                                        • Instruction ID: 7b7ee6db39bc31f5bda99f40de270c4ba8507ab16d746cadff4a04d64a4b21a1
                                        • Opcode Fuzzy Hash: 455b8f8fcb9eed033ec76361a7f9b203c87fc66329d0fded17323c78acd61630
                                        • Instruction Fuzzy Hash: 7F1134B6C003488FCB10CF9AD884ADEFBF4EB88320F10842EE419A7210C375A545CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 06F6BBAA
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904263778.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f60000_uaAWu.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 8cf817713bcbdfd0bef56d4e1047a74d609f184f96813c668aa74ec1d9afd8ac
                                        • Instruction ID: 0a57d331030bd3920e7d7a98d316157afa4cd44e6a0bf6cb612ab3468a07a2c6
                                        • Opcode Fuzzy Hash: 8cf817713bcbdfd0bef56d4e1047a74d609f184f96813c668aa74ec1d9afd8ac
                                        • Instruction Fuzzy Hash: 7D1104B6D003498FDB10CF9AD884ADEFBF4EB88320F14842AE419A7210C375A545CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GlobalMemoryStatusEx.KERNELBASE ref: 0196EFC7
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2895433954.0000000001960000.00000040.00000800.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_1960000_uaAWu.jbxd
                                        Similarity
                                        • API ID: GlobalMemoryStatus
                                        • String ID:
                                        • API String ID: 1890195054-0
                                        • Opcode ID: 1c4ab07ad58faac6c267c425774c5159e4b52251bbd1299f0b53d6edbbabdc55
                                        • Instruction ID: 2e610abad261da2b5ec9c6e3bfede99a97d5d2b7d47341f38ccb2512d99796a9
                                        • Opcode Fuzzy Hash: 1c4ab07ad58faac6c267c425774c5159e4b52251bbd1299f0b53d6edbbabdc55
                                        • Instruction Fuzzy Hash: E81123B1C00259DFCB10CF9AD544BDEFBF4AF48320F24812AD418A7250D378A944CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GlobalMemoryStatusEx.KERNELBASE ref: 0196EFC7
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2895433954.0000000001960000.00000040.00000800.00020000.00000000.sdmp, Offset: 01960000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_1960000_uaAWu.jbxd
                                        Similarity
                                        • API ID: GlobalMemoryStatus
                                        • String ID:
                                        • API String ID: 1890195054-0
                                        • Opcode ID: 19fdf3a4f3266992656bb260986b0dd591b8abd618506ab20915d2831d51690a
                                        • Instruction ID: 57ae9242db70e6cc4f10a12890d9b29d0533080438113d9c6309ae9c7419f822
                                        • Opcode Fuzzy Hash: 19fdf3a4f3266992656bb260986b0dd591b8abd618506ab20915d2831d51690a
                                        • Instruction Fuzzy Hash: DD11F3B1C006599BCB10DF9AD544BDEFBF8AF48324F14816AD818A7250D778A944CFE5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,06F6B704), ref: 06F6B93E
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904263778.0000000006F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F60000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f60000_uaAWu.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: fcd5657d7319a8162222cfbd6bc01975122322fa00370b607118a759a84db146
                                        • Instruction ID: 16922dcc6dc3b6048ee1e26fb61a78e7bdcb4924efee2af78ed858700517d5ed
                                        • Opcode Fuzzy Hash: fcd5657d7319a8162222cfbd6bc01975122322fa00370b607118a759a84db146
                                        • Instruction Fuzzy Hash: 6D1143B6C003498FDB10CF9AD444ADEFBF4EB48324F10802AE458A7314C374A545CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: XPcq
                                        • API String ID: 0-714321711
                                        • Opcode ID: a1a74ae34a1ee729c2cf07b5d50831dd361c3a9c6bd02e6256bb0b56d4f1419a
                                        • Instruction ID: 1039dc24aea59885d923d145f4ca877dba6a8fd96e15a199cefcedf9aa232621
                                        • Opcode Fuzzy Hash: a1a74ae34a1ee729c2cf07b5d50831dd361c3a9c6bd02e6256bb0b56d4f1419a
                                        • Instruction Fuzzy Hash: FD417030F002099FDB559FA9C854BAEBBF7FF88700F20852AE505AB395DB758D018B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PH^q
                                        • API String ID: 0-2549759414
                                        • Opcode ID: 1761dd5cde6410f4b3e2ad86c67a4f43e098d80f00eaffceaec36e67f5e83a01
                                        • Instruction ID: dcb129b79974df8d321b52266e4348dcc898d43ae3727e6efcdb1a4f22bf20fb
                                        • Opcode Fuzzy Hash: 1761dd5cde6410f4b3e2ad86c67a4f43e098d80f00eaffceaec36e67f5e83a01
                                        • Instruction Fuzzy Hash: 8041C330E002099FDB65DFB9D84469EBBB2FF85300F54452AE405EB240DBB5E946CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PH^q
                                        • API String ID: 0-2549759414
                                        • Opcode ID: 6315ecbf5350b53e9e66e0f62baaa344ae38fad62665433aa2466ee824861ed6
                                        • Instruction ID: 7ef48a22fc02dd82ccf76c188dc56ce7215861cb805bdb0b2c5b49f3e08d739e
                                        • Opcode Fuzzy Hash: 6315ecbf5350b53e9e66e0f62baaa344ae38fad62665433aa2466ee824861ed6
                                        • Instruction Fuzzy Hash: 5B31BC30F102018FEB599B78D55466E7BE6EF89300F24842AD406DB394EF75DE46CBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q
                                        • API String ID: 0-388095546
                                        • Opcode ID: 36bc740493770d3be7258420b72bbd633a0d3be7d36e139198746a598fc0ab61
                                        • Instruction ID: 5989a5bc6d36315946bddbb87db94b37095ff7d9c9600520cf1b1b8f61e9ca34
                                        • Opcode Fuzzy Hash: 36bc740493770d3be7258420b72bbd633a0d3be7d36e139198746a598fc0ab61
                                        • Instruction Fuzzy Hash: 5CF08C31F00201DFDFA48E48F9892A8B7A9FB44394F144477D915CB250D676DD05C791
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \Ocq
                                        • API String ID: 0-2995510325
                                        • Opcode ID: 15787bcce68b3870bc960b0e329b674ed5fc35c6d2af3eb369bbd8e76b052c0c
                                        • Instruction ID: 68af9b5df1a8265dbabf077001f8a780a8a2e18094376186c5b0f24bebe8c570
                                        • Opcode Fuzzy Hash: 15787bcce68b3870bc960b0e329b674ed5fc35c6d2af3eb369bbd8e76b052c0c
                                        • Instruction Fuzzy Hash: F1F0DA30E10119DBDB14DF94E899BAEBBB2BF88700F20411AE402A7294CB705D05CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7b0fd9a660e8a30279ca7dc685a1f1bdb5dc61618db46b36c7f3a05d937ed783
                                        • Instruction ID: 06ead5a2d5b47dcc145a7d72f4a4600ba0abe2d250436b0e066f50d0e63ae8c9
                                        • Opcode Fuzzy Hash: 7b0fd9a660e8a30279ca7dc685a1f1bdb5dc61618db46b36c7f3a05d937ed783
                                        • Instruction Fuzzy Hash: B3812D30F002059FDB54DFA9D4546AEB7F6EF89304F20852AD40ADB394EB75ED428B92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2c88442aed83ab250ae969805a8ee81a36352859debb3d15b55dd4446811eda5
                                        • Instruction ID: d1f3f2be0b0e64c50e467413f0db579442093d1d9a94549678f142ac337ab251
                                        • Opcode Fuzzy Hash: 2c88442aed83ab250ae969805a8ee81a36352859debb3d15b55dd4446811eda5
                                        • Instruction Fuzzy Hash: 6761CF71F005214FCF509A7EC89466FEAD7AFC5620B25443AE80EDB364DEA5DD0287D2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f04f443bf61dab0473e45e1c19ab9d1b6f51abc6d106a40e773f09b7d930e88d
                                        • Instruction ID: bba11d033f189067692bb8153f32e85dc7e9bf046507cd5f5bf4007a96617a56
                                        • Opcode Fuzzy Hash: f04f443bf61dab0473e45e1c19ab9d1b6f51abc6d106a40e773f09b7d930e88d
                                        • Instruction Fuzzy Hash: 16914E30E102198FDF60DF68C890B9DB7B1FF89300F208596D559EB295EB70AA85CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9677ec87077dd04e5f95c034b4f9d97fb4986a7ab96bc3afd7b29ce8aeb4db25
                                        • Instruction ID: 6c48720fda8bdd7f9c5080d4319b4a0b8dd7366ab2ff08b6fab6943ab6efee06
                                        • Opcode Fuzzy Hash: 9677ec87077dd04e5f95c034b4f9d97fb4986a7ab96bc3afd7b29ce8aeb4db25
                                        • Instruction Fuzzy Hash: BA913D30E1021A8BDF60DF68C980B9DB7B1FF89304F208599D559AB355EB70AA85CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d6d73c12367092b610105851cca43c4593dadd3d3d5e74f60840915722154fb6
                                        • Instruction ID: 1e37dabc26aa630bcd841b513df93cfc86751543a911e2760b7362b2e1b53e9b
                                        • Opcode Fuzzy Hash: d6d73c12367092b610105851cca43c4593dadd3d3d5e74f60840915722154fb6
                                        • Instruction Fuzzy Hash: CA713A31E002099FDB54DBA8D990AAEBBF6FF84300F14846AE419EB355DB30ED46CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2c7a87408f8aeca3c251ea77c08f4ab7b88617844f2e81a8606f32eb23912c5a
                                        • Instruction ID: a526c77bfd06845fd4963596bdd6ba87eb75c406c33ca3c32dedc2ac15742e32
                                        • Opcode Fuzzy Hash: 2c7a87408f8aeca3c251ea77c08f4ab7b88617844f2e81a8606f32eb23912c5a
                                        • Instruction Fuzzy Hash: E5710A71E002099FDB54DBA9D990AADBBF6FF88300F14846AE419EB354DB30ED46CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 84066a2c33312279e8db1ef01ebf929a3f34917b5a9b8f90ea3996c5621629a4
                                        • Instruction ID: cdd22267021dd2e4774d47b7c33ccf10f760aaf5008aec9f466fe0742afa056c
                                        • Opcode Fuzzy Hash: 84066a2c33312279e8db1ef01ebf929a3f34917b5a9b8f90ea3996c5621629a4
                                        • Instruction Fuzzy Hash: 9C51C231E02109DFDB64EB78E8546ADBBB2EF85314F10897AE006D7254DF358956CB81
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e1f6ba3a6b00738b1b9b97036d413d463db91fe329416c4152cf5227789fe91e
                                        • Instruction ID: 9789a076449bd31ce83346fb7ab054e923f8d5cafa300bd54ed8e9ce8e70b070
                                        • Opcode Fuzzy Hash: e1f6ba3a6b00738b1b9b97036d413d463db91fe329416c4152cf5227789fe91e
                                        • Instruction Fuzzy Hash: 5951B270F112159FEF64567CED9872F265FD789310F20482AE50AD73D5C969CC8683E2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 74efccbd8ca17ac1c413cf221a2353d2e7bbed6d10bc74862eacfff788674000
                                        • Instruction ID: 2fd61c7f721834937f7e9fed78f4758243e9ca446886586921b2dd7cad7a0b11
                                        • Opcode Fuzzy Hash: 74efccbd8ca17ac1c413cf221a2353d2e7bbed6d10bc74862eacfff788674000
                                        • Instruction Fuzzy Hash: E1519370F112159FEF645A6CED98B2F269FE789310F20482AE50AD73D4C969CC8643E2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7a4f81c8a7060a956f2c7d4c976ec7fa6003c8a32bbe726050e9065cc5993e64
                                        • Instruction ID: 240b7c970fd815eeef6c70c9b27791824f19bff703bc960846279d0271ccdef3
                                        • Opcode Fuzzy Hash: 7a4f81c8a7060a956f2c7d4c976ec7fa6003c8a32bbe726050e9065cc5993e64
                                        • Instruction Fuzzy Hash: 9A416C71E006098FDF70CFA9DC80AAFFBB2EB95314F10492AE216D7654DB30E9558B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 30dd00497d1ef6c7cbe9a43d7fb3938b81da504f063fe35d0e66fdb8f014a55e
                                        • Instruction ID: a5c2286b1739246ad8ff1132a0a64feff0123aab2f4175c12c605782bb6a9f92
                                        • Opcode Fuzzy Hash: 30dd00497d1ef6c7cbe9a43d7fb3938b81da504f063fe35d0e66fdb8f014a55e
                                        • Instruction Fuzzy Hash: 1031A830E103069FDF15DF69D884A9EBBB2FF85300F54452AE405EB351DB70E9468B41
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b685b72ce3bb540eae0d044da84e124215742a6d93255113b22ec030ed1cbb6d
                                        • Instruction ID: f97c9db7ea5f566ae4c9f7d0d1c3e0ed72aeceeab075b6d7f37a2445f56c3807
                                        • Opcode Fuzzy Hash: b685b72ce3bb540eae0d044da84e124215742a6d93255113b22ec030ed1cbb6d
                                        • Instruction Fuzzy Hash: B8318F31E102169BCB55CF65D89469EB7F2BF89300F14851AE906EB340EB71AD46CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 015fbcbafbdbecc899694ac98b218a7b57e02139cf3309683ae34a28371d834a
                                        • Instruction ID: 9d5f87068c55b472cf033cae6d367b675cf5fc383cddf5d734818cf7048efa94
                                        • Opcode Fuzzy Hash: 015fbcbafbdbecc899694ac98b218a7b57e02139cf3309683ae34a28371d834a
                                        • Instruction Fuzzy Hash: 68314B31E102059BCB59CFA5D89469EB7B6BF89300F10852AE906EB340EBB1ED46CB51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 04c97aa9b121fec33f7b3058a8c5739244e78efbd036a42e9a155348bc3c5637
                                        • Instruction ID: 1fbdb1f089b1a43942e6dddfd9785408a4a0f62913d6e86bf14baca39859683f
                                        • Opcode Fuzzy Hash: 04c97aa9b121fec33f7b3058a8c5739244e78efbd036a42e9a155348bc3c5637
                                        • Instruction Fuzzy Hash: DD216B75E012059FDB00DF79D841AAEBBF9EB48750F008025E905EB390E735EC028BA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3e0f146ab64ef20e7aaed8a3b3ebc27fe6449c55db8334dbe9920c5c2660daa7
                                        • Instruction ID: 184baf0bb49fa6451ff39a84171caa7bf26c9701726410d46ba61c25aafbe664
                                        • Opcode Fuzzy Hash: 3e0f146ab64ef20e7aaed8a3b3ebc27fe6449c55db8334dbe9920c5c2660daa7
                                        • Instruction Fuzzy Hash: 57217A76F002159FDB40CF69D880AAEBBF5EB48710F109026E909EB390E735ED018B95
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2895199991.000000000188D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0188D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_188d000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5e5705493e4334ace27419b8d9330ccf3169ca1a61e2cfb56586d9812f31c79a
                                        • Instruction ID: 39eed1c1454a74904afc17794cd912373fe837f2f4bab8732e4a026492c342d3
                                        • Opcode Fuzzy Hash: 5e5705493e4334ace27419b8d9330ccf3169ca1a61e2cfb56586d9812f31c79a
                                        • Instruction Fuzzy Hash: BB210471504204DFDB15EF58D9C0B26BBA5FB84318F24C76DD9098B296C33AD947CA62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c46b649218225b2b64f1872442ddf21be8ed81558da3b27070b258a3f43486bf
                                        • Instruction ID: d8921d6f70873d66a2925cae1c0e94c519e57f6e9fa974a6519d7ab9ad9b1183
                                        • Opcode Fuzzy Hash: c46b649218225b2b64f1872442ddf21be8ed81558da3b27070b258a3f43486bf
                                        • Instruction Fuzzy Hash: 3B112630F042511FDB519A7CE804BAE77D6FB8B310F404426F40ACB3A0DD26DD068782
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cb7cac5923ea9ee8c2077a5eee3fde48d199e8fa652c076bacd1648c1a9a7e7d
                                        • Instruction ID: d243dd38be437a0df12a536a1f334aa4c9f589f05f6b34cb67b979b37c130536
                                        • Opcode Fuzzy Hash: cb7cac5923ea9ee8c2077a5eee3fde48d199e8fa652c076bacd1648c1a9a7e7d
                                        • Instruction Fuzzy Hash: BC11D230F041511FDBA1967DA415B6FB7EADBCA720F14893BE44EC7385E915CC024391
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b19b5f364acb7a9b8e80e8a656ae4c5f8d3e0c7e43631ad767effc063fa151b8
                                        • Instruction ID: b09aa604b6d3a1411c8b9399c341a6055b3eb401c5fa5239d186c884bc13ed28
                                        • Opcode Fuzzy Hash: b19b5f364acb7a9b8e80e8a656ae4c5f8d3e0c7e43631ad767effc063fa151b8
                                        • Instruction Fuzzy Hash: 04117C32B041249FDB559668D8146AE72EAEBC8311F00853AD50AEB380EAB59C128B91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2e0af654b61e83b0b0563c2819f3bb1a2527aa7656414faf160bbfa6f006b717
                                        • Instruction ID: 3da22dfae20f03f8d6d1af3d3aa63b653d4872b55d00baf5e1cd2870d7710ebc
                                        • Opcode Fuzzy Hash: 2e0af654b61e83b0b0563c2819f3bb1a2527aa7656414faf160bbfa6f006b717
                                        • Instruction Fuzzy Hash: 76018F30F052152FCB61967DA854B6B7BDADBCA610F11886BF10ACB341EDA9DC4343A2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b16d708dbe90102d56a2ca1f8149c01a8fd10588c734b3610f840b13a429d054
                                        • Instruction ID: c560e08ac7bedcfac5e58e91d5c26b91b6e513fff4fabbde43d7f8ebc1eb1b22
                                        • Opcode Fuzzy Hash: b16d708dbe90102d56a2ca1f8149c01a8fd10588c734b3610f840b13a429d054
                                        • Instruction Fuzzy Hash: F411C035E042998FDF608EBA8C806BFFBB5FB86210F54887BD458D7142DA34D6058BA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: beba363e51031e4871a295cd563d470165be4921243997046aa0d3caa040eb89
                                        • Instruction ID: 8c15e4ec8cd9130372405a3cc9ecbed0a1e4f464ec4758d23b20203a9e1bea4a
                                        • Opcode Fuzzy Hash: beba363e51031e4871a295cd563d470165be4921243997046aa0d3caa040eb89
                                        • Instruction Fuzzy Hash: 2401D432F142686BDB54A669DC14AEB37FFDBC8311F044136E50AD7384EEA59C1287E2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 589d6c053ee10b85675e17be0cc52291a0ad70c7d783a459bae4f529451d4419
                                        • Instruction ID: 62016672377d97c443f742c47104886ec21bd68e80f6a050ee3c377dd774d2c4
                                        • Opcode Fuzzy Hash: 589d6c053ee10b85675e17be0cc52291a0ad70c7d783a459bae4f529451d4419
                                        • Instruction Fuzzy Hash: 1A21E5B5D01259AFDB00DF9AD885ADEFFB4FB48310F10812AE518A7201D375A544CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2895199991.000000000188D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0188D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_188d000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                        • Instruction ID: 4058e45486e56061883ee09b8334a333154c80bef5d030bec7a4433af2443f2b
                                        • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                        • Instruction Fuzzy Hash: 4B11A975504284CFDB12DF58D584B15BBA1FB84314F28C6AAD8498B697C33AD44ACB62
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7fce079b0b336242f2fd8962c42b0e9841b8b9c35e3a7bb6515a9446ba1936d6
                                        • Instruction ID: 57711b1e7480a3921f2b7c7b48a909d979a8963c7bd0dc36c99671b0351a61d2
                                        • Opcode Fuzzy Hash: 7fce079b0b336242f2fd8962c42b0e9841b8b9c35e3a7bb6515a9446ba1936d6
                                        • Instruction Fuzzy Hash: 6D11D3B5D01259AFCB00DF9AD885ACEFFB4FB48310F10812AE518B7200C374A944CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ccc8374df05c28a04c4ab2ccb0b32a220d24dc9a67aeb56037efe41c3734b4c0
                                        • Instruction ID: 2146c5f83c8b2dab9ef99ae771f819010fafe27b6bead3290ea08881d6d8f3d2
                                        • Opcode Fuzzy Hash: ccc8374df05c28a04c4ab2ccb0b32a220d24dc9a67aeb56037efe41c3734b4c0
                                        • Instruction Fuzzy Hash: 80018C31F001111BDBA49A7EA415B2FF7DAEBC9724F24883AE50EC7384ED66DC424396
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 260148ec2b0419e417443c35d38c96f518810acc4df04fd265ea61c32c834c24
                                        • Instruction ID: 5bf331fc38b11db89bf255c23751556821eb662fbaecd4d615efea1ba059e029
                                        • Opcode Fuzzy Hash: 260148ec2b0419e417443c35d38c96f518810acc4df04fd265ea61c32c834c24
                                        • Instruction Fuzzy Hash: 4201AF31F001145BDB659A6DA454B3FA2DAEBCA710F108C3BE50ECB340EEA5DC034386
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 65cededc068dfb88563bd6af480070a59ed0f6030768cde38edc3ce01ce34c00
                                        • Instruction ID: 5e175c58a16d0cb4f3eebdd21347645707ce1413ef3c3e63a3a259ece6c5a661
                                        • Opcode Fuzzy Hash: 65cededc068dfb88563bd6af480070a59ed0f6030768cde38edc3ce01ce34c00
                                        • Instruction Fuzzy Hash: F1018C30F005101FCB60AA6DE858B2EB3DAFB89715F108839E50ECB350EE66DC028B85
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9ea756f3d405232dcc0ac6ab45cecdb20fe62ac84f3125ef7afb7d948645d8d3
                                        • Instruction ID: 1bba88663e68d9827f9c213a8307156a82bcbb5f19a54619c842d7acb502b563
                                        • Opcode Fuzzy Hash: 9ea756f3d405232dcc0ac6ab45cecdb20fe62ac84f3125ef7afb7d948645d8d3
                                        • Instruction Fuzzy Hash: 51E09231D19358ABDF60DAB49D45B6B7FADD742604F208597E408C7143E176CA00E7D1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                        • API String ID: 0-2222239885
                                        • Opcode ID: 3cf2949c0a666f6a7d77430290372ef3f056f4b462c4d636b66e66b118d58e6a
                                        • Instruction ID: fe4e1acd2fbff43d2f03be89d2b8c1b4a35e97c8b24176a541d009b0738df9ea
                                        • Opcode Fuzzy Hash: 3cf2949c0a666f6a7d77430290372ef3f056f4b462c4d636b66e66b118d58e6a
                                        • Instruction Fuzzy Hash: 4E121E30E10219CFDB64EF65C954AADB7F6BF88304F2485AAD409AB354DB309D85CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                        • API String ID: 0-3823777903
                                        • Opcode ID: 39ca5cd67a9aac04e36b96ce731b23591d77fc409ba6417e9c8cb02e06b5fac1
                                        • Instruction ID: 74c920e3076fb2165def1bc676cbb82c8257aec823d861a8e0fed5a252ce5ffd
                                        • Opcode Fuzzy Hash: 39ca5cd67a9aac04e36b96ce731b23591d77fc409ba6417e9c8cb02e06b5fac1
                                        • Instruction Fuzzy Hash: 25915D30E00209DFEB68DF68D994B6EB7B6FF84305F15842AE4069B294DB74DD45CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                        • API String ID: 0-390881366
                                        • Opcode ID: 22581fb1e45dac1f66fde920bbb817861dce12551056d7fde80d32579bc9d937
                                        • Instruction ID: 592006b00d57801aa33a1b97a2c8d336db718dfce8037e4860a5fb05e9d3aa99
                                        • Opcode Fuzzy Hash: 22581fb1e45dac1f66fde920bbb817861dce12551056d7fde80d32579bc9d937
                                        • Instruction Fuzzy Hash: 60F19030B11209CFDB58EF68D594A6EB7B6FF88305F248569D4059B368CB35EC82CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q
                                        • API String ID: 0-2125118731
                                        • Opcode ID: b77f9d14aed31f81da8ead173124c944c3cbaa388b78ccf0aa9f11d5daeb2be3
                                        • Instruction ID: b209b010fc79107cec2a0f6bf82a20c743ac60e8eddd06d9bf23afc6135c3955
                                        • Opcode Fuzzy Hash: b77f9d14aed31f81da8ead173124c944c3cbaa388b78ccf0aa9f11d5daeb2be3
                                        • Instruction Fuzzy Hash: 80B13930E002098FDB54DB68D58866EB7B6FF88355F24883AD41ADB354DB75DC82CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LR^q$LR^q$$^q$$^q
                                        • API String ID: 0-2454687669
                                        • Opcode ID: 14a9079b27649c9cd19311dea107c1facf7a0a7a1fe2ee01d32a71dd77fe9e2f
                                        • Instruction ID: feb5d3dd0b8f7c9635f1ce9690cc9964c263c43358218649fcf2e991cc6aeb1a
                                        • Opcode Fuzzy Hash: 14a9079b27649c9cd19311dea107c1facf7a0a7a1fe2ee01d32a71dd77fe9e2f
                                        • Instruction Fuzzy Hash: 9D51C330B00206DFDB58DB28D948A6AB7F6FF88704F14856AE415DF394DA31EC45CB92
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.2904315763.0000000006F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_6f70000_uaAWu.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $^q$$^q$$^q$$^q
                                        • API String ID: 0-2125118731
                                        • Opcode ID: ac36e5c9171586b6827f46faa516f87cb2c47c0b031501d43478fa4fcc66b0ba
                                        • Instruction ID: a4634079ed0d29e8e98f76bbe17f9a4ba1d16dc5ff5ba7322a0e660a77543887
                                        • Opcode Fuzzy Hash: ac36e5c9171586b6827f46faa516f87cb2c47c0b031501d43478fa4fcc66b0ba
                                        • Instruction Fuzzy Hash: 91518E30E012099FDFA5DB68E9806AEB7B6FB88311F15856BE405DB354DB34DC41CB91
                                        Uniqueness

                                        Uniqueness Score: -1.00%