Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ORDER SPECIFICATION.exe

Overview

General Information

Sample name:ORDER SPECIFICATION.exe
Analysis ID:1427952
MD5:34070a881f75f12cd4e5bfcb3bdf48c6
SHA1:68d694a74aa970c84bf48ca15c979b408970843a
SHA256:562b14cbead15ecad71e6e25e6c00656e47c3cf6e7d12eec64bfb4b9a6aaca05
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code contains very large strings
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • ORDER SPECIFICATION.exe (PID: 2576 cmdline: "C:\Users\user\Desktop\ORDER SPECIFICATION.exe" MD5: 34070A881F75F12CD4E5BFCB3BDF48C6)
    • ORDER SPECIFICATION.exe (PID: 6128 cmdline: "C:\Users\user\Desktop\ORDER SPECIFICATION.exe" MD5: 34070A881F75F12CD4E5BFCB3BDF48C6)
    • ORDER SPECIFICATION.exe (PID: 6664 cmdline: "C:\Users\user\Desktop\ORDER SPECIFICATION.exe" MD5: 34070A881F75F12CD4E5BFCB3BDF48C6)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.techwiser.in", "Username": "tech@techwiser.in", "Password": "tech@#$121"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3255257042.0000000003169000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000003.00000002.3252989012.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000003.00000002.3252989012.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000003.00000002.3255257042.0000000003141000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000003.00000002.3255257042.0000000003141000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            0.2.ORDER SPECIFICATION.exe.432e500.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.ORDER SPECIFICATION.exe.4368f20.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.ORDER SPECIFICATION.exe.4368f20.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.ORDER SPECIFICATION.exe.432e500.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    0.2.ORDER SPECIFICATION.exe.4368f20.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                    • 0x31673:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                    • 0x316e5:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                    • 0x3176f:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                    • 0x31801:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                    • 0x3186b:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                    • 0x318dd:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                    • 0x31973:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                    • 0x31a03:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                    Click to see the 10 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 162.241.123.30, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\ORDER SPECIFICATION.exe, Initiated: true, ProcessId: 6664, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49706
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 3.2.ORDER SPECIFICATION.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.techwiser.in", "Username": "tech@techwiser.in", "Password": "tech@#$121"}
                    Source: ORDER SPECIFICATION.exeReversingLabs: Detection: 34%
                    Source: ORDER SPECIFICATION.exeVirustotal: Detection: 38%Perma Link
                    Source: ORDER SPECIFICATION.exeJoe Sandbox ML: detected
                    Source: ORDER SPECIFICATION.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49705 version: TLS 1.2
                    Source: ORDER SPECIFICATION.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: DuePw.pdb source: ORDER SPECIFICATION.exe
                    Source: Binary string: DuePw.pdbSHA256 source: ORDER SPECIFICATION.exe
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 4x nop then jmp 00B009A5h0_2_00B00D33
                    Source: global trafficTCP traffic: 192.168.2.5:49706 -> 162.241.123.30:587
                    Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                    Source: Joe Sandbox ViewIP Address: 162.241.123.30 162.241.123.30
                    Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.5:49706 -> 162.241.123.30:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownDNS traffic detected: queries for: api.ipify.org
                    Source: ORDER SPECIFICATION.exe, 00000003.00000002.3255257042.0000000003169000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.techwiser.in
                    Source: ORDER SPECIFICATION.exe, 00000003.00000002.3253754912.000000000138C000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253558213.0000000001331000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253754912.0000000001363000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3255257042.0000000003169000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                    Source: ORDER SPECIFICATION.exe, 00000003.00000002.3253754912.000000000138C000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253558213.0000000001331000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253754912.0000000001363000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3255257042.0000000003169000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                    Source: ORDER SPECIFICATION.exe, 00000003.00000002.3255257042.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: ORDER SPECIFICATION.exeString found in binary or memory: http://tempuri.org/DataSet1.xsd)Microsoft
                    Source: ORDER SPECIFICATION.exe, 00000003.00000002.3253558213.0000000001331000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253754912.0000000001363000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253558213.000000000134E000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3255257042.0000000003169000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: ORDER SPECIFICATION.exe, 00000003.00000002.3253558213.0000000001331000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253754912.0000000001363000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253558213.000000000134E000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3255257042.0000000003169000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: ORDER SPECIFICATION.exe, 00000000.00000002.2054266616.000000000432E000.00000004.00000800.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3252989012.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: ORDER SPECIFICATION.exe, 00000000.00000002.2054266616.000000000432E000.00000004.00000800.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3255257042.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3252989012.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: ORDER SPECIFICATION.exe, 00000003.00000002.3255257042.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: ORDER SPECIFICATION.exe, 00000003.00000002.3255257042.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49705 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, oAKy.cs.Net Code: xXlophBw8
                    Source: 0.2.ORDER SPECIFICATION.exe.4368f20.0.raw.unpack, oAKy.cs.Net Code: xXlophBw8

                    System Summary

                    barindex
                    Source: 0.2.ORDER SPECIFICATION.exe.4368f20.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.ORDER SPECIFICATION.exe.432e500.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 3.2.ORDER SPECIFICATION.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.ORDER SPECIFICATION.exe.4368f20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.ORDER SPECIFICATION.exe.4cf0000.6.raw.unpack, LoginForm.csLarge array initialization: : array initializer size 33603
                    Source: ORDER SPECIFICATION.exe, Form1.csLong String: Length: 131612
                    Source: initial sampleStatic PE information: Filename: ORDER SPECIFICATION.exe
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 0_2_00B031500_2_00B03150
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 0_2_00B003900_2_00B00390
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 0_2_00BAD59C0_2_00BAD59C
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_0170E6D03_2_0170E6D0
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_0170A9483_2_0170A948
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_01704A983_2_01704A98
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_01703E803_2_01703E80
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_017041C83_2_017041C8
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_06C6A0683_2_06C6A068
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_06C6B9003_2_06C6B900
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_06C855703_2_06C85570
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_06C830283_2_06C83028
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_06C8B1E83_2_06C8B1E8
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_06C8C1483_2_06C8C148
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_06C87D403_2_06C87D40
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_06C876603_2_06C87660
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_06C8E3603_2_06C8E360
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_06C800403_2_06C80040
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_06C85CAF3_2_06C85CAF
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_06C800063_2_06C80006
                    Source: ORDER SPECIFICATION.exe, 00000000.00000002.2057108058.0000000004CF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dll8 vs ORDER SPECIFICATION.exe
                    Source: ORDER SPECIFICATION.exe, 00000000.00000002.2054266616.0000000003F15000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs ORDER SPECIFICATION.exe
                    Source: ORDER SPECIFICATION.exe, 00000000.00000002.2054266616.000000000432E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename28519625-fb4c-40d0-af15-66ea2f96c830.exe4 vs ORDER SPECIFICATION.exe
                    Source: ORDER SPECIFICATION.exe, 00000000.00000000.2002351467.0000000000140000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDuePw.exeT vs ORDER SPECIFICATION.exe
                    Source: ORDER SPECIFICATION.exe, 00000000.00000002.2053757578.0000000002580000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename28519625-fb4c-40d0-af15-66ea2f96c830.exe4 vs ORDER SPECIFICATION.exe
                    Source: ORDER SPECIFICATION.exe, 00000000.00000002.2058455099.00000000083D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs ORDER SPECIFICATION.exe
                    Source: ORDER SPECIFICATION.exe, 00000000.00000002.2052874317.000000000084E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs ORDER SPECIFICATION.exe
                    Source: ORDER SPECIFICATION.exe, 00000003.00000002.3253195215.0000000001169000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs ORDER SPECIFICATION.exe
                    Source: ORDER SPECIFICATION.exe, 00000003.00000002.3252989012.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename28519625-fb4c-40d0-af15-66ea2f96c830.exe4 vs ORDER SPECIFICATION.exe
                    Source: ORDER SPECIFICATION.exeBinary or memory string: OriginalFilenameDuePw.exeT vs ORDER SPECIFICATION.exe
                    Source: ORDER SPECIFICATION.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.ORDER SPECIFICATION.exe.4368f20.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.ORDER SPECIFICATION.exe.432e500.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 3.2.ORDER SPECIFICATION.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.ORDER SPECIFICATION.exe.4368f20.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: ORDER SPECIFICATION.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, ekKu0.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, vKf1z6NvS.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, ZNAvlD7qmXc.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, U2doU2.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, BgffYko.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, HrTdA63.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, Vvp22TrBv9g.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, Vvp22TrBv9g.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, Vvp22TrBv9g.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, Vvp22TrBv9g.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, za3l5cjND4NLNjUJsH.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, za3l5cjND4NLNjUJsH.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, F7eBRxBmOB5Brcbgw6.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, F7eBRxBmOB5Brcbgw6.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, F7eBRxBmOB5Brcbgw6.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, F7eBRxBmOB5Brcbgw6.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, F7eBRxBmOB5Brcbgw6.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, F7eBRxBmOB5Brcbgw6.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, za3l5cjND4NLNjUJsH.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, F7eBRxBmOB5Brcbgw6.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, F7eBRxBmOB5Brcbgw6.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, F7eBRxBmOB5Brcbgw6.csSecurity API names: _0020.AddAccessRule
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/1@2/2
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ORDER SPECIFICATION.exe.logJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMutant created: \Sessions\1\BaseNamedObjects\fdhqGoehwjUrjl
                    Source: ORDER SPECIFICATION.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: ORDER SPECIFICATION.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: ORDER SPECIFICATION.exeReversingLabs: Detection: 34%
                    Source: ORDER SPECIFICATION.exeVirustotal: Detection: 38%
                    Source: unknownProcess created: C:\Users\user\Desktop\ORDER SPECIFICATION.exe "C:\Users\user\Desktop\ORDER SPECIFICATION.exe"
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess created: C:\Users\user\Desktop\ORDER SPECIFICATION.exe "C:\Users\user\Desktop\ORDER SPECIFICATION.exe"
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess created: C:\Users\user\Desktop\ORDER SPECIFICATION.exe "C:\Users\user\Desktop\ORDER SPECIFICATION.exe"
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess created: C:\Users\user\Desktop\ORDER SPECIFICATION.exe "C:\Users\user\Desktop\ORDER SPECIFICATION.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess created: C:\Users\user\Desktop\ORDER SPECIFICATION.exe "C:\Users\user\Desktop\ORDER SPECIFICATION.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: ORDER SPECIFICATION.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: ORDER SPECIFICATION.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: ORDER SPECIFICATION.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: DuePw.pdb source: ORDER SPECIFICATION.exe
                    Source: Binary string: DuePw.pdbSHA256 source: ORDER SPECIFICATION.exe

                    Data Obfuscation

                    barindex
                    Source: 0.2.ORDER SPECIFICATION.exe.4cf0000.6.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, F7eBRxBmOB5Brcbgw6.cs.Net Code: cpIrJGqiVc System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, F7eBRxBmOB5Brcbgw6.cs.Net Code: cpIrJGqiVc System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, F7eBRxBmOB5Brcbgw6.cs.Net Code: cpIrJGqiVc System.Reflection.Assembly.Load(byte[])
                    Source: ORDER SPECIFICATION.exeStatic PE information: 0xBCABE6C0 [Tue Apr 22 08:52:16 2070 UTC]
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_01700C3D push edi; ret 3_2_01700CC2
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_01700C95 push edi; retf 3_2_01700C3A
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeCode function: 3_2_06C6FCC7 push es; retf 3_2_06C6FCC8
                    Source: ORDER SPECIFICATION.exeStatic PE information: section name: .text entropy: 7.283155285954524
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, cYjlLH4jCW2VOlKR96.csHigh entropy of concatenated method names: 'RY63fXqJfB', 'd8e32uj7tE', 'dwx3FvXEu7', 'ToString', 'oDt3GZme21', 'tNw3eJVhhS', 'oA4DiRCFHQPLQAFUXfZ', 'O5G7lVC5aDrtyQq0W4q'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, uJG2vZ80tU5P3l0MYT.csHigh entropy of concatenated method names: 'aWV39DPkal', 'y063NMXHIn', 'hbo3aBIrmp', 'qpL3mvRulG', 'hZ73BTckGx', 'hWEaF1mVO6', 'OF7aGYl6vW', 'P7vaeQkyaL', 'VTpaMfZvCV', 'Llsauk5AdO'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, iWKyL5clMxLoJWmJ6C.csHigh entropy of concatenated method names: 'RCTaSc3vtG', 'V0CaUWVlki', 'imOYV4UmVV', 'LMoYdSVLaB', 'W46YC1wsJx', 'vGdY4emuxx', 'p0rYTpIoMe', 'hwOY62JYj1', 'EI1YyUXIO8', 'XH8YlAKwNt'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, QAP0keG8Yd5jv1Xl0Y.csHigh entropy of concatenated method names: 's6w7McJFGp', 'TWY7RDAUA0', 'dqDXLDcujR', 'HvHXKt24cx', 'FpT7p6XCq1', 'rPi7O8G46T', 'wUH71LDErX', 'Xvv7kCEkx9', 'sIC7nYlju0', 'ow57fOoglL'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, b2a5pwkX0lu50obdgL.csHigh entropy of concatenated method names: 'OwQElVEELJ', 'YVJEOcBTsC', 'VehEkP8Cj2', 'imiEnCBTMZ', 'rGaEWWCUne', 'YceEVutN5y', 'hecEdLWnro', 'EmGECcS55X', 'zexE4eNkx7', 'TsFETSLyO6'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, nVcNWUTErCgkCmphYN.csHigh entropy of concatenated method names: 'jy4mZHedR7', 'eR5mYC9n1U', 'ErYm3nqprX', 'acC3ROQyKK', 'BDT3z1Paqi', 'joUmL3yU7M', 'RdJmKSU2pA', 'VHNm5aVh3g', 'F3ymwiYmV1', 'DZimrPkJcW'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, gl3oKrR1qqiT30vSiT.csHigh entropy of concatenated method names: 'rnloKkR3Th', 'R6MowMpUQa', 'MLnorBitFX', 'y5YoZ18di3', 'JtYoNlT2FC', 'hHcoaivcq5', 'gS0o3xRvsd', 'UCUXexrV1V', 'XwrXMYhjeF', 'P2ZXu5U4Uy'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, WpKvZJijw23n3QB5iC.csHigh entropy of concatenated method names: 'OPiYx9LcR9', 'zM3YIu4pwo', 'COOYjro1mt', 'ja4Yig34Kj', 'yBRYEuQAMC', 'XvlYg8y9GP', 'rfTY7sfc5p', 'UPeYXIYMCA', 'pyKYoNGcCE', 'DF6YhjTTCP'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, zmiTT8MfIrnMZdAt1J.csHigh entropy of concatenated method names: 'UQZXZmYZQv', 'qbvXN6rUMN', 'fLQXYyWUXe', 'pOMXayqro5', 'mG7X3ERV1D', 'kUTXmMQWCd', 'ODgXBsxEVy', 'HjpX0x5XKn', 'uHZXHOlDg5', 'YyUXb73SpC'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, za3l5cjND4NLNjUJsH.csHigh entropy of concatenated method names: 'P4jNkO70Md', 'LGgNn2BCYg', 'qixNf4c8IL', 'VWoN2JueQj', 'rY0NF8vrJ3', 'rSsNGBZHny', 'SCNNeV8Ang', 'wMpNMbbIwf', 'CWKNucKItI', 'hcyNRENRNQ'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, wobfetzyoCSKIeE3kM.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'N9GoAghS9M', 'q79oE67rFb', 'DdNogEDDfc', 'xamo7s4sUS', 'Ej5oXd6oON', 'Jfcoo6Wc8M', 'FKrohpL3e6'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, f8hAT8YLP7gxbLHpdL.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'aZf5uxmO16', 'uHL5Rucfrq', 'lrx5ziJkpS', 'afJwLTkeM3', 'EgHwKvGQpq', 'nXKw544gx0', 'fVlwwBK3Xe', 'vKoV3NXJqSnOT71W59c'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, FMqbjCKLh4H5q0Ba22L.csHigh entropy of concatenated method names: 'EbOoPIviEc', 'opAoDduFUP', 'p0qoJ4JfHb', 's9Woxh5l6d', 'hl1oSWTEMs', 'mU3oI1qEfI', 'aL4oU0aaaA', 'Lk8ojPeyK4', 'fOUoi7SMfO', 'u9bocKbmLo'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, YXPk43Ni1pBKjVfOSf.csHigh entropy of concatenated method names: 'Dispose', 'KnaKuZU6WX', 'iZP5WKZYBs', 'sqKVV5a6ns', 'rJmKRiTT8f', 'CrnKzMZdAt', 'ProcessDialogKey', 'QJg5LCEuMf', 'WvA5KZf0Ll', 'ds455Yl3oK'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, dZGeiGrj2NrVuLS35e.csHigh entropy of concatenated method names: 'YsJKma3l5c', 'gD4KBNLNjU', 'zjwKH23n3Q', 'k5iKbC3WKy', 'GmJKE6CvJG', 'TvZKg0tU5P', 'h0Lm08lTro6U2YJ687', 'vxaXjQeNiv56dMfiSX', 'fLWKK4Ia1r', 'JkpKws709I'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, L0oDSqyO4bbtafwmkS.csHigh entropy of concatenated method names: 'Y8WmPWF83V', 'cZfmDTMN7u', 'LIYmJA7r2k', 'H0ymxZPEdO', 'qQTmSayvND', 'jyqmIYll5n', 'ojEmUO51tI', 'S7GmjnsZtQ', 'NrlmiPG784', 'eSjmcmx7vZ'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, e8xLqc1syX4Orjh579.csHigh entropy of concatenated method names: 'rMMAj1a75d', 'CQlAiUOLib', 's1NA8bnVqj', 'ztIAW5Acvv', 'DLrAdtojoS', 'bOGACUiu8K', 'J5TATgSa8k', 'UUFA6u8nw2', 'l3eAlNFtm1', 'FjvApxMSks'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, F7eBRxBmOB5Brcbgw6.csHigh entropy of concatenated method names: 'bsEw9lhSZJ', 'h0AwZq1dji', 'qo0wN0P0E9', 'Oq4wYhjVZL', 'Ji4waVtVbU', 'jFOw3ur8vD', 'I8dwmtka2B', 'hOTwBt80Iu', 'z2Sw0NR8Ew', 'LpGwHlFyTX'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, X44r6cK5dk9PsSvkBKA.csHigh entropy of concatenated method names: 'tCahPAFxpd', 'EA9hD78dFU', 'XvZhJ3l6V2', 'zMnUAYZwX0gLTRMtHE9', 'cRn6flZHHxTo3YUIXxb', 'trBZkiZ0eaj39TEe2Rr', 'XxNACGZzwqQDjKw9bPk', 'VNEb34tQgVJ38NMywtW', 'EBLtHXtXrjbgJxMOEJo'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, NilLd55MB9vBSZax7f.csHigh entropy of concatenated method names: 'aBnJIgun8', 'Qe2xQBILP', 'UNPIbyOmq', 'VvCUGpgLI', 'q0siESqWH', 'CrgcvsYmx', 'cKoCtXRx6HXpWxVIUd', 'b8jYn6NTE6ZbhBaMXg', 'qYqX2w56o', 'WAghmHEX7'
                    Source: 0.2.ORDER SPECIFICATION.exe.41aedf8.1.raw.unpack, pCEuMfuMvAZf0Llrs4.csHigh entropy of concatenated method names: 'OGsX8pHqeO', 'NSnXW4sRnK', 'w35XVHhXPn', 'o6IXdLnnhQ', 'lGpXkeAQea', 'YdaXCvs9EN', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, cYjlLH4jCW2VOlKR96.csHigh entropy of concatenated method names: 'RY63fXqJfB', 'd8e32uj7tE', 'dwx3FvXEu7', 'ToString', 'oDt3GZme21', 'tNw3eJVhhS', 'oA4DiRCFHQPLQAFUXfZ', 'O5G7lVC5aDrtyQq0W4q'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, uJG2vZ80tU5P3l0MYT.csHigh entropy of concatenated method names: 'aWV39DPkal', 'y063NMXHIn', 'hbo3aBIrmp', 'qpL3mvRulG', 'hZ73BTckGx', 'hWEaF1mVO6', 'OF7aGYl6vW', 'P7vaeQkyaL', 'VTpaMfZvCV', 'Llsauk5AdO'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, iWKyL5clMxLoJWmJ6C.csHigh entropy of concatenated method names: 'RCTaSc3vtG', 'V0CaUWVlki', 'imOYV4UmVV', 'LMoYdSVLaB', 'W46YC1wsJx', 'vGdY4emuxx', 'p0rYTpIoMe', 'hwOY62JYj1', 'EI1YyUXIO8', 'XH8YlAKwNt'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, QAP0keG8Yd5jv1Xl0Y.csHigh entropy of concatenated method names: 's6w7McJFGp', 'TWY7RDAUA0', 'dqDXLDcujR', 'HvHXKt24cx', 'FpT7p6XCq1', 'rPi7O8G46T', 'wUH71LDErX', 'Xvv7kCEkx9', 'sIC7nYlju0', 'ow57fOoglL'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, b2a5pwkX0lu50obdgL.csHigh entropy of concatenated method names: 'OwQElVEELJ', 'YVJEOcBTsC', 'VehEkP8Cj2', 'imiEnCBTMZ', 'rGaEWWCUne', 'YceEVutN5y', 'hecEdLWnro', 'EmGECcS55X', 'zexE4eNkx7', 'TsFETSLyO6'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, nVcNWUTErCgkCmphYN.csHigh entropy of concatenated method names: 'jy4mZHedR7', 'eR5mYC9n1U', 'ErYm3nqprX', 'acC3ROQyKK', 'BDT3z1Paqi', 'joUmL3yU7M', 'RdJmKSU2pA', 'VHNm5aVh3g', 'F3ymwiYmV1', 'DZimrPkJcW'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, gl3oKrR1qqiT30vSiT.csHigh entropy of concatenated method names: 'rnloKkR3Th', 'R6MowMpUQa', 'MLnorBitFX', 'y5YoZ18di3', 'JtYoNlT2FC', 'hHcoaivcq5', 'gS0o3xRvsd', 'UCUXexrV1V', 'XwrXMYhjeF', 'P2ZXu5U4Uy'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, WpKvZJijw23n3QB5iC.csHigh entropy of concatenated method names: 'OPiYx9LcR9', 'zM3YIu4pwo', 'COOYjro1mt', 'ja4Yig34Kj', 'yBRYEuQAMC', 'XvlYg8y9GP', 'rfTY7sfc5p', 'UPeYXIYMCA', 'pyKYoNGcCE', 'DF6YhjTTCP'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, zmiTT8MfIrnMZdAt1J.csHigh entropy of concatenated method names: 'UQZXZmYZQv', 'qbvXN6rUMN', 'fLQXYyWUXe', 'pOMXayqro5', 'mG7X3ERV1D', 'kUTXmMQWCd', 'ODgXBsxEVy', 'HjpX0x5XKn', 'uHZXHOlDg5', 'YyUXb73SpC'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, za3l5cjND4NLNjUJsH.csHigh entropy of concatenated method names: 'P4jNkO70Md', 'LGgNn2BCYg', 'qixNf4c8IL', 'VWoN2JueQj', 'rY0NF8vrJ3', 'rSsNGBZHny', 'SCNNeV8Ang', 'wMpNMbbIwf', 'CWKNucKItI', 'hcyNRENRNQ'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, wobfetzyoCSKIeE3kM.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'N9GoAghS9M', 'q79oE67rFb', 'DdNogEDDfc', 'xamo7s4sUS', 'Ej5oXd6oON', 'Jfcoo6Wc8M', 'FKrohpL3e6'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, f8hAT8YLP7gxbLHpdL.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'aZf5uxmO16', 'uHL5Rucfrq', 'lrx5ziJkpS', 'afJwLTkeM3', 'EgHwKvGQpq', 'nXKw544gx0', 'fVlwwBK3Xe', 'vKoV3NXJqSnOT71W59c'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, FMqbjCKLh4H5q0Ba22L.csHigh entropy of concatenated method names: 'EbOoPIviEc', 'opAoDduFUP', 'p0qoJ4JfHb', 's9Woxh5l6d', 'hl1oSWTEMs', 'mU3oI1qEfI', 'aL4oU0aaaA', 'Lk8ojPeyK4', 'fOUoi7SMfO', 'u9bocKbmLo'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, YXPk43Ni1pBKjVfOSf.csHigh entropy of concatenated method names: 'Dispose', 'KnaKuZU6WX', 'iZP5WKZYBs', 'sqKVV5a6ns', 'rJmKRiTT8f', 'CrnKzMZdAt', 'ProcessDialogKey', 'QJg5LCEuMf', 'WvA5KZf0Ll', 'ds455Yl3oK'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, dZGeiGrj2NrVuLS35e.csHigh entropy of concatenated method names: 'YsJKma3l5c', 'gD4KBNLNjU', 'zjwKH23n3Q', 'k5iKbC3WKy', 'GmJKE6CvJG', 'TvZKg0tU5P', 'h0Lm08lTro6U2YJ687', 'vxaXjQeNiv56dMfiSX', 'fLWKK4Ia1r', 'JkpKws709I'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, L0oDSqyO4bbtafwmkS.csHigh entropy of concatenated method names: 'Y8WmPWF83V', 'cZfmDTMN7u', 'LIYmJA7r2k', 'H0ymxZPEdO', 'qQTmSayvND', 'jyqmIYll5n', 'ojEmUO51tI', 'S7GmjnsZtQ', 'NrlmiPG784', 'eSjmcmx7vZ'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, e8xLqc1syX4Orjh579.csHigh entropy of concatenated method names: 'rMMAj1a75d', 'CQlAiUOLib', 's1NA8bnVqj', 'ztIAW5Acvv', 'DLrAdtojoS', 'bOGACUiu8K', 'J5TATgSa8k', 'UUFA6u8nw2', 'l3eAlNFtm1', 'FjvApxMSks'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, F7eBRxBmOB5Brcbgw6.csHigh entropy of concatenated method names: 'bsEw9lhSZJ', 'h0AwZq1dji', 'qo0wN0P0E9', 'Oq4wYhjVZL', 'Ji4waVtVbU', 'jFOw3ur8vD', 'I8dwmtka2B', 'hOTwBt80Iu', 'z2Sw0NR8Ew', 'LpGwHlFyTX'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, X44r6cK5dk9PsSvkBKA.csHigh entropy of concatenated method names: 'tCahPAFxpd', 'EA9hD78dFU', 'XvZhJ3l6V2', 'zMnUAYZwX0gLTRMtHE9', 'cRn6flZHHxTo3YUIXxb', 'trBZkiZ0eaj39TEe2Rr', 'XxNACGZzwqQDjKw9bPk', 'VNEb34tQgVJ38NMywtW', 'EBLtHXtXrjbgJxMOEJo'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, NilLd55MB9vBSZax7f.csHigh entropy of concatenated method names: 'aBnJIgun8', 'Qe2xQBILP', 'UNPIbyOmq', 'VvCUGpgLI', 'q0siESqWH', 'CrgcvsYmx', 'cKoCtXRx6HXpWxVIUd', 'b8jYn6NTE6ZbhBaMXg', 'qYqX2w56o', 'WAghmHEX7'
                    Source: 0.2.ORDER SPECIFICATION.exe.424f418.3.raw.unpack, pCEuMfuMvAZf0Llrs4.csHigh entropy of concatenated method names: 'OGsX8pHqeO', 'NSnXW4sRnK', 'w35XVHhXPn', 'o6IXdLnnhQ', 'lGpXkeAQea', 'YdaXCvs9EN', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, cYjlLH4jCW2VOlKR96.csHigh entropy of concatenated method names: 'RY63fXqJfB', 'd8e32uj7tE', 'dwx3FvXEu7', 'ToString', 'oDt3GZme21', 'tNw3eJVhhS', 'oA4DiRCFHQPLQAFUXfZ', 'O5G7lVC5aDrtyQq0W4q'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, uJG2vZ80tU5P3l0MYT.csHigh entropy of concatenated method names: 'aWV39DPkal', 'y063NMXHIn', 'hbo3aBIrmp', 'qpL3mvRulG', 'hZ73BTckGx', 'hWEaF1mVO6', 'OF7aGYl6vW', 'P7vaeQkyaL', 'VTpaMfZvCV', 'Llsauk5AdO'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, iWKyL5clMxLoJWmJ6C.csHigh entropy of concatenated method names: 'RCTaSc3vtG', 'V0CaUWVlki', 'imOYV4UmVV', 'LMoYdSVLaB', 'W46YC1wsJx', 'vGdY4emuxx', 'p0rYTpIoMe', 'hwOY62JYj1', 'EI1YyUXIO8', 'XH8YlAKwNt'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, QAP0keG8Yd5jv1Xl0Y.csHigh entropy of concatenated method names: 's6w7McJFGp', 'TWY7RDAUA0', 'dqDXLDcujR', 'HvHXKt24cx', 'FpT7p6XCq1', 'rPi7O8G46T', 'wUH71LDErX', 'Xvv7kCEkx9', 'sIC7nYlju0', 'ow57fOoglL'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, b2a5pwkX0lu50obdgL.csHigh entropy of concatenated method names: 'OwQElVEELJ', 'YVJEOcBTsC', 'VehEkP8Cj2', 'imiEnCBTMZ', 'rGaEWWCUne', 'YceEVutN5y', 'hecEdLWnro', 'EmGECcS55X', 'zexE4eNkx7', 'TsFETSLyO6'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, nVcNWUTErCgkCmphYN.csHigh entropy of concatenated method names: 'jy4mZHedR7', 'eR5mYC9n1U', 'ErYm3nqprX', 'acC3ROQyKK', 'BDT3z1Paqi', 'joUmL3yU7M', 'RdJmKSU2pA', 'VHNm5aVh3g', 'F3ymwiYmV1', 'DZimrPkJcW'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, gl3oKrR1qqiT30vSiT.csHigh entropy of concatenated method names: 'rnloKkR3Th', 'R6MowMpUQa', 'MLnorBitFX', 'y5YoZ18di3', 'JtYoNlT2FC', 'hHcoaivcq5', 'gS0o3xRvsd', 'UCUXexrV1V', 'XwrXMYhjeF', 'P2ZXu5U4Uy'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, WpKvZJijw23n3QB5iC.csHigh entropy of concatenated method names: 'OPiYx9LcR9', 'zM3YIu4pwo', 'COOYjro1mt', 'ja4Yig34Kj', 'yBRYEuQAMC', 'XvlYg8y9GP', 'rfTY7sfc5p', 'UPeYXIYMCA', 'pyKYoNGcCE', 'DF6YhjTTCP'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, zmiTT8MfIrnMZdAt1J.csHigh entropy of concatenated method names: 'UQZXZmYZQv', 'qbvXN6rUMN', 'fLQXYyWUXe', 'pOMXayqro5', 'mG7X3ERV1D', 'kUTXmMQWCd', 'ODgXBsxEVy', 'HjpX0x5XKn', 'uHZXHOlDg5', 'YyUXb73SpC'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, za3l5cjND4NLNjUJsH.csHigh entropy of concatenated method names: 'P4jNkO70Md', 'LGgNn2BCYg', 'qixNf4c8IL', 'VWoN2JueQj', 'rY0NF8vrJ3', 'rSsNGBZHny', 'SCNNeV8Ang', 'wMpNMbbIwf', 'CWKNucKItI', 'hcyNRENRNQ'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, wobfetzyoCSKIeE3kM.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'N9GoAghS9M', 'q79oE67rFb', 'DdNogEDDfc', 'xamo7s4sUS', 'Ej5oXd6oON', 'Jfcoo6Wc8M', 'FKrohpL3e6'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, f8hAT8YLP7gxbLHpdL.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'aZf5uxmO16', 'uHL5Rucfrq', 'lrx5ziJkpS', 'afJwLTkeM3', 'EgHwKvGQpq', 'nXKw544gx0', 'fVlwwBK3Xe', 'vKoV3NXJqSnOT71W59c'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, FMqbjCKLh4H5q0Ba22L.csHigh entropy of concatenated method names: 'EbOoPIviEc', 'opAoDduFUP', 'p0qoJ4JfHb', 's9Woxh5l6d', 'hl1oSWTEMs', 'mU3oI1qEfI', 'aL4oU0aaaA', 'Lk8ojPeyK4', 'fOUoi7SMfO', 'u9bocKbmLo'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, YXPk43Ni1pBKjVfOSf.csHigh entropy of concatenated method names: 'Dispose', 'KnaKuZU6WX', 'iZP5WKZYBs', 'sqKVV5a6ns', 'rJmKRiTT8f', 'CrnKzMZdAt', 'ProcessDialogKey', 'QJg5LCEuMf', 'WvA5KZf0Ll', 'ds455Yl3oK'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, dZGeiGrj2NrVuLS35e.csHigh entropy of concatenated method names: 'YsJKma3l5c', 'gD4KBNLNjU', 'zjwKH23n3Q', 'k5iKbC3WKy', 'GmJKE6CvJG', 'TvZKg0tU5P', 'h0Lm08lTro6U2YJ687', 'vxaXjQeNiv56dMfiSX', 'fLWKK4Ia1r', 'JkpKws709I'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, L0oDSqyO4bbtafwmkS.csHigh entropy of concatenated method names: 'Y8WmPWF83V', 'cZfmDTMN7u', 'LIYmJA7r2k', 'H0ymxZPEdO', 'qQTmSayvND', 'jyqmIYll5n', 'ojEmUO51tI', 'S7GmjnsZtQ', 'NrlmiPG784', 'eSjmcmx7vZ'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, e8xLqc1syX4Orjh579.csHigh entropy of concatenated method names: 'rMMAj1a75d', 'CQlAiUOLib', 's1NA8bnVqj', 'ztIAW5Acvv', 'DLrAdtojoS', 'bOGACUiu8K', 'J5TATgSa8k', 'UUFA6u8nw2', 'l3eAlNFtm1', 'FjvApxMSks'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, F7eBRxBmOB5Brcbgw6.csHigh entropy of concatenated method names: 'bsEw9lhSZJ', 'h0AwZq1dji', 'qo0wN0P0E9', 'Oq4wYhjVZL', 'Ji4waVtVbU', 'jFOw3ur8vD', 'I8dwmtka2B', 'hOTwBt80Iu', 'z2Sw0NR8Ew', 'LpGwHlFyTX'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, X44r6cK5dk9PsSvkBKA.csHigh entropy of concatenated method names: 'tCahPAFxpd', 'EA9hD78dFU', 'XvZhJ3l6V2', 'zMnUAYZwX0gLTRMtHE9', 'cRn6flZHHxTo3YUIXxb', 'trBZkiZ0eaj39TEe2Rr', 'XxNACGZzwqQDjKw9bPk', 'VNEb34tQgVJ38NMywtW', 'EBLtHXtXrjbgJxMOEJo'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, NilLd55MB9vBSZax7f.csHigh entropy of concatenated method names: 'aBnJIgun8', 'Qe2xQBILP', 'UNPIbyOmq', 'VvCUGpgLI', 'q0siESqWH', 'CrgcvsYmx', 'cKoCtXRx6HXpWxVIUd', 'b8jYn6NTE6ZbhBaMXg', 'qYqX2w56o', 'WAghmHEX7'
                    Source: 0.2.ORDER SPECIFICATION.exe.83d0000.7.raw.unpack, pCEuMfuMvAZf0Llrs4.csHigh entropy of concatenated method names: 'OGsX8pHqeO', 'NSnXW4sRnK', 'w35XVHhXPn', 'o6IXdLnnhQ', 'lGpXkeAQea', 'YdaXCvs9EN', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: ORDER SPECIFICATION.exe PID: 2576, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMemory allocated: AB0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMemory allocated: 24B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMemory allocated: B00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMemory allocated: 5B00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMemory allocated: 6B00000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMemory allocated: 6C40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMemory allocated: 7C40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMemory allocated: 8480000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMemory allocated: 9480000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMemory allocated: A480000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMemory allocated: B480000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMemory allocated: 1700000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMemory allocated: 30F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMemory allocated: 50F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeWindow / User API: threadDelayed 3809Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeWindow / User API: threadDelayed 1468Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 5520Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -99890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 5032Thread sleep count: 3809 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 5032Thread sleep count: 1468 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -99781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -99672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -99562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -99438s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -99328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -99219s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -99108s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -99000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -98890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -98781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -98672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -98562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -98453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -98344s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -98234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -98125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -98015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -97906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -97796s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -97687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -97578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -97468s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -97359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -97246s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exe TID: 3396Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 99890Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 99672Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 99562Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 99438Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 99328Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 99219Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 99108Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 99000Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 98890Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 98781Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 98672Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 98562Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 98453Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 98344Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 98234Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 98125Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 98015Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 97906Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 97796Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 97687Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 97578Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 97468Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 97359Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 97246Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: ORDER SPECIFICATION.exe, 00000003.00000002.3253754912.000000000138C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess created: C:\Users\user\Desktop\ORDER SPECIFICATION.exe "C:\Users\user\Desktop\ORDER SPECIFICATION.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeProcess created: C:\Users\user\Desktop\ORDER SPECIFICATION.exe "C:\Users\user\Desktop\ORDER SPECIFICATION.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeQueries volume information: C:\Users\user\Desktop\ORDER SPECIFICATION.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeQueries volume information: C:\Users\user\Desktop\ORDER SPECIFICATION.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.ORDER SPECIFICATION.exe.4368f20.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER SPECIFICATION.exe.432e500.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.ORDER SPECIFICATION.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER SPECIFICATION.exe.4368f20.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.3255257042.0000000003169000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3252989012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3255257042.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2054266616.000000000432E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ORDER SPECIFICATION.exe PID: 2576, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ORDER SPECIFICATION.exe PID: 6664, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\ORDER SPECIFICATION.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 0.2.ORDER SPECIFICATION.exe.432e500.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER SPECIFICATION.exe.4368f20.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.ORDER SPECIFICATION.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER SPECIFICATION.exe.4368f20.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.3252989012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3255257042.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2054266616.000000000432E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ORDER SPECIFICATION.exe PID: 2576, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ORDER SPECIFICATION.exe PID: 6664, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.ORDER SPECIFICATION.exe.4368f20.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER SPECIFICATION.exe.432e500.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.ORDER SPECIFICATION.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER SPECIFICATION.exe.4368f20.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ORDER SPECIFICATION.exe.432e500.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.3255257042.0000000003169000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3252989012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3255257042.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2054266616.000000000432E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: ORDER SPECIFICATION.exe PID: 2576, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: ORDER SPECIFICATION.exe PID: 6664, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS111
                    Security Software Discovery
                    Distributed Component Object Model1
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Timestomp
                    LSA Secrets1
                    Process Discovery
                    SSHKeylogging23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Masquerading
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                    Virtualization/Sandbox Evasion
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                    Process Injection
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    ORDER SPECIFICATION.exe34%ReversingLabsByteCode-MSIL.Trojan.Generic
                    ORDER SPECIFICATION.exe38%VirustotalBrowse
                    ORDER SPECIFICATION.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    mail.techwiser.in1%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://r3.o.lencr.org00%URL Reputationsafe
                    http://x1.c.lencr.org/00%URL Reputationsafe
                    http://x1.i.lencr.org/00%URL Reputationsafe
                    http://r3.i.lencr.org/00%URL Reputationsafe
                    http://mail.techwiser.in1%VirustotalBrowse
                    http://tempuri.org/DataSet1.xsd)Microsoft1%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ipify.org
                    104.26.12.205
                    truefalse
                      high
                      mail.techwiser.in
                      162.241.123.30
                      truetrueunknown
                      NameMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://r3.o.lencr.org0ORDER SPECIFICATION.exe, 00000003.00000002.3253754912.000000000138C000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253558213.0000000001331000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253754912.0000000001363000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3255257042.0000000003169000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.orgORDER SPECIFICATION.exe, 00000000.00000002.2054266616.000000000432E000.00000004.00000800.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3255257042.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3252989012.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          high
                          http://mail.techwiser.inORDER SPECIFICATION.exe, 00000003.00000002.3255257042.0000000003169000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                          https://account.dyn.com/ORDER SPECIFICATION.exe, 00000000.00000002.2054266616.000000000432E000.00000004.00000800.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3252989012.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            https://api.ipify.org/tORDER SPECIFICATION.exe, 00000003.00000002.3255257042.00000000030F1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://tempuri.org/DataSet1.xsd)MicrosoftORDER SPECIFICATION.exefalseunknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameORDER SPECIFICATION.exe, 00000003.00000002.3255257042.00000000030F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://x1.c.lencr.org/0ORDER SPECIFICATION.exe, 00000003.00000002.3253558213.0000000001331000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253754912.0000000001363000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253558213.000000000134E000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3255257042.0000000003169000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://x1.i.lencr.org/0ORDER SPECIFICATION.exe, 00000003.00000002.3253558213.0000000001331000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253754912.0000000001363000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253558213.000000000134E000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3255257042.0000000003169000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://r3.i.lencr.org/0ORDER SPECIFICATION.exe, 00000003.00000002.3253754912.000000000138C000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253558213.0000000001331000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3253754912.0000000001363000.00000004.00000020.00020000.00000000.sdmp, ORDER SPECIFICATION.exe, 00000003.00000002.3255257042.0000000003169000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                104.26.12.205
                                api.ipify.orgUnited States
                                13335CLOUDFLARENETUSfalse
                                162.241.123.30
                                mail.techwiser.inUnited States
                                46606UNIFIEDLAYER-AS-1UStrue
                                Joe Sandbox version:40.0.0 Tourmaline
                                Analysis ID:1427952
                                Start date and time:2024-04-18 11:31:07 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 6m 35s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:6
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:ORDER SPECIFICATION.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@5/1@2/2
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 83
                                • Number of non-executed functions: 9
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                11:31:53API Interceptor27x Sleep call for process: ORDER SPECIFICATION.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                104.26.12.205Sky-Beta.exeGet hashmaliciousStealitBrowse
                                • api.ipify.org/?format=json
                                SecuriteInfo.com.Backdoor.Win32.Agent.myuuxz.13708.17224.exeGet hashmaliciousBunny LoaderBrowse
                                • api.ipify.org/
                                lods.cmdGet hashmaliciousRemcosBrowse
                                • api.ipify.org/
                                162.241.123.30invoice & packing list.exeGet hashmaliciousAgentTeslaBrowse
                                  Draft Sales contract.exeGet hashmaliciousAgentTeslaBrowse
                                    signed documents and BOL.exeGet hashmaliciousAgentTeslaBrowse
                                      NOA, BL and invoice.exeGet hashmaliciousAgentTeslaBrowse
                                        #568350035791.exeGet hashmaliciousAgentTeslaBrowse
                                          shipping documents and ETA.exeGet hashmaliciousAgentTeslaBrowse
                                            shipping documents and ETA.exeGet hashmaliciousAgentTeslaBrowse
                                              QUOTATION.exeGet hashmaliciousAgentTeslaBrowse
                                                https://t.co/hkbALnjMCQGet hashmaliciousHTMLPhisherBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  api.ipify.orgBKG#SGN2106728.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 172.67.74.152
                                                  product11221.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 104.26.12.205
                                                  DHL-9384915702.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                  • 104.26.13.205
                                                  Outstanding Payment Invoice PO 3400375980.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                  • 104.26.13.205
                                                  Arrival Notice PUS_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                  • 104.26.13.205
                                                  Purchase Order PDF.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 104.26.13.205
                                                  Leoch-Purchase Order.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 172.67.74.152
                                                  p silp AI240190.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 104.26.12.205
                                                  SecuriteInfo.com.Win32.PWSX-gen.1728.1300.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 104.26.12.205
                                                  SecuriteInfo.com.Heur.15333.25205.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 172.67.74.152
                                                  mail.techwiser.ininvoice & packing list.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.241.123.30
                                                  Draft Sales contract.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.241.123.30
                                                  signed documents and BOL.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.241.123.30
                                                  NOA, BL and invoice.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.241.123.30
                                                  #568350035791.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.241.123.30
                                                  shipping documents and ETA.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.241.123.30
                                                  shipping documents and ETA.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.241.123.30
                                                  QUOTATION.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.241.123.30
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  CLOUDFLARENETUSBKG#SGN2106728.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 172.67.74.152
                                                  product11221.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 104.26.12.205
                                                  http://streaming.jsonmediapacks.comGet hashmaliciousUnknownBrowse
                                                  • 1.1.1.1
                                                  https://www.hegemann-reiners.de/Get hashmaliciousUnknownBrowse
                                                  • 172.67.157.200
                                                  http://gamma.app/docs/Adobe-1098-uanmwmhgl6i90tc?mode=docGet hashmaliciousUnknownBrowse
                                                  • 104.18.11.200
                                                  DHL-9384915702.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                  • 104.26.13.205
                                                  Outstanding Payment Invoice PO 3400375980.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                  • 104.26.13.205
                                                  Arrival Notice PUS_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                  • 104.26.13.205
                                                  5FU4LRpQdy.rtfGet hashmaliciousRemcosBrowse
                                                  • 104.21.84.67
                                                  NEW ORDER.docGet hashmaliciousHTMLPhisherBrowse
                                                  • 104.21.25.202
                                                  UNIFIEDLAYER-AS-1USDHL-9384915702.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                  • 192.185.13.234
                                                  I-IN-6757165752-DEL983527_20240416074318.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 50.87.253.239
                                                  MY69DoYgp5.elfGet hashmaliciousMiraiBrowse
                                                  • 98.131.25.121
                                                  SecuriteInfo.com.PWSX-gen.32561.14552.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 50.87.253.239
                                                  SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 192.185.35.67
                                                  SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 50.87.219.149
                                                  invoice & packing list.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.241.123.30
                                                  Draft Sales contract.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 162.241.123.30
                                                  Bank slip.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 50.87.219.149
                                                  https://tracker.club-os.com/campaign/click?msgId=f8ea317d963149a518aa35e03e5541f797badf3c&target=splendidanimations.com%2F%40%2FQuantexa/IpoXF42991IpoXF42991IpoXF/bWFzc2ltb2JvcnJlbGxpQHF1YW50ZXhhLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                  • 192.185.104.70
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  3b5074b1b5d032e5620f69f9f700ff0eBKG#SGN2106728.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 104.26.12.205
                                                  product11221.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 104.26.12.205
                                                  product1122.htmlGet hashmaliciousUnknownBrowse
                                                  • 104.26.12.205
                                                  DHL-9384915702.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                  • 104.26.12.205
                                                  FACTURA24021151 - BP.vbsGet hashmaliciousUnknownBrowse
                                                  • 104.26.12.205
                                                  Outstanding Payment Invoice PO 3400375980.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                  • 104.26.12.205
                                                  Arrival Notice PUS_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                  • 104.26.12.205
                                                  Transferencias SEPA.vbsGet hashmaliciousUnknownBrowse
                                                  • 104.26.12.205
                                                  shipping doc.vbsGet hashmaliciousGuLoaderBrowse
                                                  • 104.26.12.205
                                                  FACTURA 130424435.vbsGet hashmaliciousUnknownBrowse
                                                  • 104.26.12.205
                                                  No context
                                                  Process:C:\Users\user\Desktop\ORDER SPECIFICATION.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1216
                                                  Entropy (8bit):5.34331486778365
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                  Malicious:false
                                                  Reputation:high, very likely benign file
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.275411324523825
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  • DOS Executable Generic (2002/1) 0.01%
                                                  File name:ORDER SPECIFICATION.exe
                                                  File size:1'036'288 bytes
                                                  MD5:34070a881f75f12cd4e5bfcb3bdf48c6
                                                  SHA1:68d694a74aa970c84bf48ca15c979b408970843a
                                                  SHA256:562b14cbead15ecad71e6e25e6c00656e47c3cf6e7d12eec64bfb4b9a6aaca05
                                                  SHA512:c2bcac60beacd3f58e90bf1b04ad5b9dd4397c4e38efa191c1c74ace3bbeaf2ca0c35c17d5f29b21e414061fc27177084c220b5d2fd951f7c1ba0131ac86ffca
                                                  SSDEEP:24576:N6gObWRvPAbx/N35bTeguR2EHPF9kPps:BObIAt/nbTeguRdnd
                                                  TLSH:8725D13D1CBD2A3B91B6D2A9CFE98567F040D07B3A11AD7698D383958346A9335C313E
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............R.... ........@.. .......................@............@................................
                                                  Icon Hash:00928e8e8686b000
                                                  Entrypoint:0x4fe352
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0xBCABE6C0 [Tue Apr 22 08:52:16 2070 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xfe2ff0x4f.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1000000x624.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1020000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xfc0240x70.text
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000xfc3580xfc400e0f0abf6c3d65bb0b192c6d7de41c6feFalse0.7812267715559961data7.283155285954524IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rsrc0x1000000x6240x800bf635c92f289ace403c7be99ceb5d032False0.33349609375data3.458579280664745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0x1020000xc0x200b14bd444b924a15fdc3663ba6da3afbbFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_VERSION0x1000900x394OpenPGP Secret Key0.42139737991266374
                                                  RT_MANIFEST0x1004340x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                  DLLImport
                                                  mscoree.dll_CorExeMain
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Apr 18, 2024 11:31:57.957952023 CEST49705443192.168.2.5104.26.12.205
                                                  Apr 18, 2024 11:31:57.958019972 CEST44349705104.26.12.205192.168.2.5
                                                  Apr 18, 2024 11:31:57.958092928 CEST49705443192.168.2.5104.26.12.205
                                                  Apr 18, 2024 11:31:57.966128111 CEST49705443192.168.2.5104.26.12.205
                                                  Apr 18, 2024 11:31:57.966165066 CEST44349705104.26.12.205192.168.2.5
                                                  Apr 18, 2024 11:31:58.198847055 CEST44349705104.26.12.205192.168.2.5
                                                  Apr 18, 2024 11:31:58.198915958 CEST49705443192.168.2.5104.26.12.205
                                                  Apr 18, 2024 11:31:58.202697039 CEST49705443192.168.2.5104.26.12.205
                                                  Apr 18, 2024 11:31:58.202708006 CEST44349705104.26.12.205192.168.2.5
                                                  Apr 18, 2024 11:31:58.203125954 CEST44349705104.26.12.205192.168.2.5
                                                  Apr 18, 2024 11:31:58.245042086 CEST49705443192.168.2.5104.26.12.205
                                                  Apr 18, 2024 11:31:58.362745047 CEST49705443192.168.2.5104.26.12.205
                                                  Apr 18, 2024 11:31:58.404118061 CEST44349705104.26.12.205192.168.2.5
                                                  Apr 18, 2024 11:31:58.520750999 CEST44349705104.26.12.205192.168.2.5
                                                  Apr 18, 2024 11:31:58.520826101 CEST44349705104.26.12.205192.168.2.5
                                                  Apr 18, 2024 11:31:58.520888090 CEST49705443192.168.2.5104.26.12.205
                                                  Apr 18, 2024 11:31:58.527442932 CEST49705443192.168.2.5104.26.12.205
                                                  Apr 18, 2024 11:31:59.350140095 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:31:59.510189056 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:31:59.510404110 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:31:59.940258980 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:31:59.940485001 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:32:00.100958109 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:00.101159096 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:32:00.262620926 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:00.263204098 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:32:00.435519934 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:00.435547113 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:00.435561895 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:00.435661077 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:32:00.473829985 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:32:00.634385109 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:00.640681028 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:32:00.800903082 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:00.802711010 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:32:00.963260889 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:00.964385033 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:32:01.139029026 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:01.139482021 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:32:01.299968004 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:01.300234079 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:32:01.504909992 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:01.528764009 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:01.528966904 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:32:01.689587116 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:01.691016912 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:01.691673040 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:32:01.691730976 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:32:01.691752911 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:32:01.691771030 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:32:01.865835905 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:01.865876913 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:01.865914106 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:01.865950108 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:32:01.916928053 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:33:39.135857105 CEST49706587192.168.2.5162.241.123.30
                                                  Apr 18, 2024 11:33:39.296905994 CEST58749706162.241.123.30192.168.2.5
                                                  Apr 18, 2024 11:33:39.297616005 CEST49706587192.168.2.5162.241.123.30
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Apr 18, 2024 11:31:57.839766979 CEST5130253192.168.2.51.1.1.1
                                                  Apr 18, 2024 11:31:57.944309950 CEST53513021.1.1.1192.168.2.5
                                                  Apr 18, 2024 11:31:59.112888098 CEST4972053192.168.2.51.1.1.1
                                                  Apr 18, 2024 11:31:59.349308968 CEST53497201.1.1.1192.168.2.5
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Apr 18, 2024 11:31:57.839766979 CEST192.168.2.51.1.1.10x5f5cStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                  Apr 18, 2024 11:31:59.112888098 CEST192.168.2.51.1.1.10x4bf7Standard query (0)mail.techwiser.inA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Apr 18, 2024 11:31:57.944309950 CEST1.1.1.1192.168.2.50x5f5cNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                  Apr 18, 2024 11:31:57.944309950 CEST1.1.1.1192.168.2.50x5f5cNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                  Apr 18, 2024 11:31:57.944309950 CEST1.1.1.1192.168.2.50x5f5cNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                  Apr 18, 2024 11:31:59.349308968 CEST1.1.1.1192.168.2.50x4bf7No error (0)mail.techwiser.in162.241.123.30A (IP address)IN (0x0001)false
                                                  • api.ipify.org
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.549705104.26.12.2054436664C:\Users\user\Desktop\ORDER SPECIFICATION.exe
                                                  TimestampBytes transferredDirectionData
                                                  2024-04-18 09:31:58 UTC155OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                  Host: api.ipify.org
                                                  Connection: Keep-Alive
                                                  2024-04-18 09:31:58 UTC211INHTTP/1.1 200 OK
                                                  Date: Thu, 18 Apr 2024 09:31:58 GMT
                                                  Content-Type: text/plain
                                                  Content-Length: 12
                                                  Connection: close
                                                  Vary: Origin
                                                  CF-Cache-Status: DYNAMIC
                                                  Server: cloudflare
                                                  CF-RAY: 8763a51a19356740-ATL
                                                  2024-04-18 09:31:58 UTC12INData Raw: 38 31 2e 31 38 31 2e 35 37 2e 35 32
                                                  Data Ascii: 81.181.57.52


                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                  Apr 18, 2024 11:31:59.940258980 CEST58749706162.241.123.30192.168.2.5220-sh014.hostgator.in ESMTP Exim 4.96.2 #2 Thu, 18 Apr 2024 15:01:59 +0530
                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                  220 and/or bulk e-mail.
                                                  Apr 18, 2024 11:31:59.940485001 CEST49706587192.168.2.5162.241.123.30EHLO 494126
                                                  Apr 18, 2024 11:32:00.100958109 CEST58749706162.241.123.30192.168.2.5250-sh014.hostgator.in Hello 494126 [81.181.57.52]
                                                  250-SIZE 52428800
                                                  250-8BITMIME
                                                  250-PIPELINING
                                                  250-PIPECONNECT
                                                  250-AUTH PLAIN LOGIN
                                                  250-STARTTLS
                                                  250 HELP
                                                  Apr 18, 2024 11:32:00.101159096 CEST49706587192.168.2.5162.241.123.30STARTTLS
                                                  Apr 18, 2024 11:32:00.262620926 CEST58749706162.241.123.30192.168.2.5220 TLS go ahead

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:11:31:53
                                                  Start date:18/04/2024
                                                  Path:C:\Users\user\Desktop\ORDER SPECIFICATION.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\ORDER SPECIFICATION.exe"
                                                  Imagebase:0x40000
                                                  File size:1'036'288 bytes
                                                  MD5 hash:34070A881F75F12CD4E5BFCB3BDF48C6
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2054266616.000000000432E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2054266616.000000000432E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:11:31:56
                                                  Start date:18/04/2024
                                                  Path:C:\Users\user\Desktop\ORDER SPECIFICATION.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\Users\user\Desktop\ORDER SPECIFICATION.exe"
                                                  Imagebase:0x140000
                                                  File size:1'036'288 bytes
                                                  MD5 hash:34070A881F75F12CD4E5BFCB3BDF48C6
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:11:31:56
                                                  Start date:18/04/2024
                                                  Path:C:\Users\user\Desktop\ORDER SPECIFICATION.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\ORDER SPECIFICATION.exe"
                                                  Imagebase:0xcd0000
                                                  File size:1'036'288 bytes
                                                  MD5 hash:34070A881F75F12CD4E5BFCB3BDF48C6
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3255257042.0000000003169000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3252989012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3252989012.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3255257042.0000000003141000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3255257042.0000000003141000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:9.2%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:58
                                                    Total number of Limit Nodes:1
                                                    execution_graph 19645 ba4668 19646 ba467a 19645->19646 19647 ba4686 19646->19647 19649 ba4778 19646->19649 19650 ba479d 19649->19650 19654 ba4888 19650->19654 19658 ba4878 19650->19658 19656 ba48af 19654->19656 19655 ba498c 19655->19655 19656->19655 19662 ba44b0 19656->19662 19660 ba48af 19658->19660 19659 ba498c 19659->19659 19660->19659 19661 ba44b0 CreateActCtxA 19660->19661 19661->19659 19663 ba5918 CreateActCtxA 19662->19663 19665 ba59db 19663->19665 19666 b017c8 19667 b01953 19666->19667 19668 b017ee 19666->19668 19668->19667 19671 b01a40 PostMessageW 19668->19671 19673 b01a48 PostMessageW 19668->19673 19672 b01ab4 19671->19672 19672->19668 19674 b01ab4 19673->19674 19674->19668 19613 baac90 19617 baad78 19613->19617 19625 baad88 19613->19625 19614 baac9f 19618 baad99 19617->19618 19619 baadbc 19617->19619 19618->19619 19633 bab020 19618->19633 19637 bab010 19618->19637 19619->19614 19620 baadb4 19620->19619 19621 baafc0 GetModuleHandleW 19620->19621 19622 baafed 19621->19622 19622->19614 19626 baad99 19625->19626 19627 baadbc 19625->19627 19626->19627 19631 bab020 LoadLibraryExW 19626->19631 19632 bab010 LoadLibraryExW 19626->19632 19627->19614 19628 baadb4 19628->19627 19629 baafc0 GetModuleHandleW 19628->19629 19630 baafed 19629->19630 19630->19614 19631->19628 19632->19628 19634 bab034 19633->19634 19635 bab059 19634->19635 19641 baa110 19634->19641 19635->19620 19638 bab034 19637->19638 19639 baa110 LoadLibraryExW 19638->19639 19640 bab059 19638->19640 19639->19640 19640->19620 19642 bab200 LoadLibraryExW 19641->19642 19644 bab279 19642->19644 19644->19635 19675 bad020 19676 bad066 19675->19676 19680 bad5f8 19676->19680 19683 bad608 19676->19683 19677 bad153 19686 bad25c 19680->19686 19684 bad636 19683->19684 19685 bad25c DuplicateHandle 19683->19685 19684->19677 19685->19684 19687 bad670 DuplicateHandle 19686->19687 19688 bad636 19687->19688 19688->19677
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2053254130.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_b00000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ae4abd4259564bde245765f86575d2d2e57c0ca854fe97d64b9018f7b616b822
                                                    • Instruction ID: 85ead32842cedca393bd53692a07132107c60932247951bc5faaaef334f60fc5
                                                    • Opcode Fuzzy Hash: ae4abd4259564bde245765f86575d2d2e57c0ca854fe97d64b9018f7b616b822
                                                    • Instruction Fuzzy Hash: A0A00240D9E455F1F4043C1A10811B5C8BD664F304D2138C4409A334930680D500305D
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 558 baad88-baad97 559 baad99-baada6 call baa0ac 558->559 560 baadc3-baadc7 558->560 565 baada8 559->565 566 baadbc 559->566 561 baaddb-baae1c 560->561 562 baadc9-baadd3 560->562 569 baae29-baae37 561->569 570 baae1e-baae26 561->570 562->561 613 baadae call bab020 565->613 614 baadae call bab010 565->614 566->560 572 baae5b-baae5d 569->572 573 baae39-baae3e 569->573 570->569 571 baadb4-baadb6 571->566 576 baaef8-baafb8 571->576 577 baae60-baae67 572->577 574 baae49 573->574 575 baae40-baae47 call baa0b8 573->575 579 baae4b-baae59 574->579 575->579 608 baafba-baafbd 576->608 609 baafc0-baafeb GetModuleHandleW 576->609 580 baae69-baae71 577->580 581 baae74-baae7b 577->581 579->577 580->581 583 baae88-baae91 call baa0c8 581->583 584 baae7d-baae85 581->584 589 baae9e-baaea3 583->589 590 baae93-baae9b 583->590 584->583 592 baaec1-baaec5 589->592 593 baaea5-baaeac 589->593 590->589 597 baaecb-baaece 592->597 593->592 594 baaeae-baaebe call baa0d8 call baa0e8 593->594 594->592 599 baaed0-baaeee 597->599 600 baaef1-baaef7 597->600 599->600 608->609 610 baafed-baaff3 609->610 611 baaff4-bab008 609->611 610->611 613->571 614->571
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00BAAFDE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2053368878.0000000000BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_ba0000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: b0faf77114052671748e2f1ab9301f76307ec6027c9f51387753c6fbb0884652
                                                    • Instruction ID: 4cae02ad78cd0ea2410e5de8e688903ab50b25c2a887736a131de2e92b380307
                                                    • Opcode Fuzzy Hash: b0faf77114052671748e2f1ab9301f76307ec6027c9f51387753c6fbb0884652
                                                    • Instruction Fuzzy Hash: ED716870A04B058FD724DF29D0407AABBF5FF89304F108A6DD48AD7A50DB75E949CBA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 615 ba5a84-ba5b14
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2053368878.0000000000BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_ba0000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 35f9d60b93989ced9b06abe375909129b79affc4717292e7736c4c16848d2016
                                                    • Instruction ID: 42fa229565aeafef725dc6c74fc4bd221c2ddbc0f363e9f1b5d7e8f0a8781464
                                                    • Opcode Fuzzy Hash: 35f9d60b93989ced9b06abe375909129b79affc4717292e7736c4c16848d2016
                                                    • Instruction Fuzzy Hash: 0741D1B1808A49CFDF21CFA8C8857EEBBF0EF56314F10829AC455AB251C775AA46CB51
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 618 ba590c-ba598c 619 ba598f-ba59d9 CreateActCtxA 618->619 621 ba59db-ba59e1 619->621 622 ba59e2-ba5a3c 619->622 621->622 629 ba5a4b-ba5a4f 622->629 630 ba5a3e-ba5a41 622->630 631 ba5a60 629->631 632 ba5a51-ba5a5d 629->632 630->629 634 ba5a61 631->634 632->631 634->634
                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 00BA59C9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2053368878.0000000000BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_ba0000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 4b90d5a0646bed3d5eb35de13bc7579c0df6315595a6396b1536b2382dc06da6
                                                    • Instruction ID: 8ae86b6e5650d61b964c5c12977655e88d6ee3765db4ded291753aa7c60d8f45
                                                    • Opcode Fuzzy Hash: 4b90d5a0646bed3d5eb35de13bc7579c0df6315595a6396b1536b2382dc06da6
                                                    • Instruction Fuzzy Hash: D841D2B1D04619CFDB24DFA9C884ACDBBF5FF49304F20816AD408AB255DB756946CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 635 ba44b0-ba59d9 CreateActCtxA 639 ba59db-ba59e1 635->639 640 ba59e2-ba5a3c 635->640 639->640 647 ba5a4b-ba5a4f 640->647 648 ba5a3e-ba5a41 640->648 649 ba5a60 647->649 650 ba5a51-ba5a5d 647->650 648->647 652 ba5a61 649->652 650->649 652->652
                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 00BA59C9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2053368878.0000000000BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_ba0000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: c70afa336056bf5a4573d78aa1a26d6c22f2cf217256c7a30a5a87aa5f58f1f9
                                                    • Instruction ID: f4d9f90d16e7f76e98ddc09acdc6b93677de633be23e47fdeb66ca247b0abe62
                                                    • Opcode Fuzzy Hash: c70afa336056bf5a4573d78aa1a26d6c22f2cf217256c7a30a5a87aa5f58f1f9
                                                    • Instruction Fuzzy Hash: 6441D2B0D0471DCBDB24DFA9C884A9EBBF5BF89304F20816AD408AB255DB756946CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 653 bad25c-bad704 DuplicateHandle 655 bad70d-bad72a 653->655 656 bad706-bad70c 653->656 656->655
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00BAD636,?,?,?,?,?), ref: 00BAD6F7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2053368878.0000000000BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_ba0000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: c74e86141624cfa384d6d1f6e00fa120d51fa7849e64c02c76e8fbbec009bb89
                                                    • Instruction ID: d73be23f8c1dd75fedb767971df1a1e3032f4ee5dc574a8362b8c68d903774c6
                                                    • Opcode Fuzzy Hash: c74e86141624cfa384d6d1f6e00fa120d51fa7849e64c02c76e8fbbec009bb89
                                                    • Instruction Fuzzy Hash: 0121E5B59002489FDB10CFAAD584ADEFBF4FB49310F14845AE919A7350D378A944CFA4
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 659 bad668-bad704 DuplicateHandle 660 bad70d-bad72a 659->660 661 bad706-bad70c 659->661 661->660
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00BAD636,?,?,?,?,?), ref: 00BAD6F7
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2053368878.0000000000BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_ba0000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 7f975768c7fa1e2db82057a245272e68fe9fbb5607cbbeb02712d15d47d6b72f
                                                    • Instruction ID: 199a158d6f4149af7225fae502c16864b24a45019e54dec0e29fca7cb235c92a
                                                    • Opcode Fuzzy Hash: 7f975768c7fa1e2db82057a245272e68fe9fbb5607cbbeb02712d15d47d6b72f
                                                    • Instruction Fuzzy Hash: 792114B59002189FDB10CF9AD984ADEFFF4FB48310F14801AE918A3350D378A940CFA0
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 664 baa110-bab240 666 bab248-bab277 LoadLibraryExW 664->666 667 bab242-bab245 664->667 668 bab279-bab27f 666->668 669 bab280-bab29d 666->669 667->666 668->669
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,00BAB059,00000800,00000000,00000000), ref: 00BAB26A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2053368878.0000000000BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_ba0000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 5fb0db775d50ced047730c25f5839a7f62d779d16b2579761a93a17f7af30e03
                                                    • Instruction ID: 6d2c508c60b2aa2c33e3e5effaec956c9706885cba890ad8305b40b4aadb5b73
                                                    • Opcode Fuzzy Hash: 5fb0db775d50ced047730c25f5839a7f62d779d16b2579761a93a17f7af30e03
                                                    • Instruction Fuzzy Hash: 351112B68043089FDB10DF9AC444BDEFBF4EB89310F10846AE529A7201C379A944CFA4
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 672 bab1f8-bab240 673 bab248-bab277 LoadLibraryExW 672->673 674 bab242-bab245 672->674 675 bab279-bab27f 673->675 676 bab280-bab29d 673->676 674->673 675->676
                                                    APIs
                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,00BAB059,00000800,00000000,00000000), ref: 00BAB26A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2053368878.0000000000BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_ba0000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 8946143c3e87cdae360b25a7f75bd8abe4733d06104382e7d1b5ac1f0cd0418d
                                                    • Instruction ID: 499b9f69f68229b683cd1a63cdc580ecd6e8114f5719a5cbfa2ddf80708bfaa3
                                                    • Opcode Fuzzy Hash: 8946143c3e87cdae360b25a7f75bd8abe4733d06104382e7d1b5ac1f0cd0418d
                                                    • Instruction Fuzzy Hash: E61114B69002498FDB10CF9AC984ADEFFF4EB89310F10856ED429A7650C378A545CFA4
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • PostMessageW.USER32(?,?,?,?), ref: 00B01AA5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2053254130.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_b00000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: MessagePost
                                                    • String ID:
                                                    • API String ID: 410705778-0
                                                    • Opcode ID: 955835e14021e14f50eabbc46e4e59b1c488fd0e39455c3120e5cfe7c15be2bb
                                                    • Instruction ID: 55515a6389b22caec584082189831d96ba8b46215a7fbd691ca6ed62722baab7
                                                    • Opcode Fuzzy Hash: 955835e14021e14f50eabbc46e4e59b1c488fd0e39455c3120e5cfe7c15be2bb
                                                    • Instruction Fuzzy Hash: AC11C2B58002499FDB10DF9AD985BDEFFF8EB49324F108459E918A7340D379A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00BAAFDE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2053368878.0000000000BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_ba0000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: acbee7062e337a2652e500813fdcb7069b0f26cc00346add10d54b38e7f6808e
                                                    • Instruction ID: 8ebc3d27985107d5db5a3fb1882903a313a64319d48e0fa3717d1b5ed886ad43
                                                    • Opcode Fuzzy Hash: acbee7062e337a2652e500813fdcb7069b0f26cc00346add10d54b38e7f6808e
                                                    • Instruction Fuzzy Hash: 6211E0B6C042498FCB14DF9AC544ADEFBF4EF89314F10845AD429A7610D379A545CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • PostMessageW.USER32(?,?,?,?), ref: 00B01AA5
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2053254130.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_b00000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: MessagePost
                                                    • String ID:
                                                    • API String ID: 410705778-0
                                                    • Opcode ID: ed0e2c66b09e9fb00f231d29446a88e0878acc5405a7cffd4851af4e4fa93ef6
                                                    • Instruction ID: 3cac0962a52cd858b8f0ca0c4902a9b2beec775537815cf9780ee87411092d3f
                                                    • Opcode Fuzzy Hash: ed0e2c66b09e9fb00f231d29446a88e0878acc5405a7cffd4851af4e4fa93ef6
                                                    • Instruction Fuzzy Hash: 2A11D3B58003499FDB10DF9AC585BDEFFF8EB49310F108459E518A7240C379A944CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2052771919.000000000081D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_81d000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aa064852e1c0bed6f1bd4af6d0abd53c91a6add9cdde15f57a59e0489b0c32fa
                                                    • Instruction ID: 81652b32e922e98221dcc66ee224107a80298dcf18517d9cd08fda89a4bb3187
                                                    • Opcode Fuzzy Hash: aa064852e1c0bed6f1bd4af6d0abd53c91a6add9cdde15f57a59e0489b0c32fa
                                                    • Instruction Fuzzy Hash: C6210371500344DFCB15DF14D9C0FA6BF6AFF98318F20C569E9098B256C33AD896DAA2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2052771919.000000000081D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_81d000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0214706e38216ff53403946c932dedda09288e8c13085b76f1c8e0962a32dc3a
                                                    • Instruction ID: b07ef6a066113149ed3619b28da39227b743cd7d42d29e1f9e980652fd4c3762
                                                    • Opcode Fuzzy Hash: 0214706e38216ff53403946c932dedda09288e8c13085b76f1c8e0962a32dc3a
                                                    • Instruction Fuzzy Hash: 70210671500304DFDB05DF14D9C0B56BF69FF98314F20C569E9098B256C33AE896D7A2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2052817378.000000000082D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_82d000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0c6988b9274c4b53ccf00242a5072493baa590991fe3d3a71526e436e400e884
                                                    • Instruction ID: d14687713803683bf5df468712494a1a1dc427cdd3ee976efdbcc618fcfcb38b
                                                    • Opcode Fuzzy Hash: 0c6988b9274c4b53ccf00242a5072493baa590991fe3d3a71526e436e400e884
                                                    • Instruction Fuzzy Hash: 092104B1544304EFDB04DF54E5C0B26BFA5FB98314F20C56DD8098B396C37AE886CAA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2052817378.000000000082D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_82d000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 750896bd3c41e49e590e5289dfc40c897d775b5c91813f88d5c08378b360479e
                                                    • Instruction ID: 30abcd788c9932c1e5cc79f476fac0539ba3662b6b64205c15688cf5262c7a65
                                                    • Opcode Fuzzy Hash: 750896bd3c41e49e590e5289dfc40c897d775b5c91813f88d5c08378b360479e
                                                    • Instruction Fuzzy Hash: 3A21F271604744DFCB14DF24E984B26BF65FB88314F20C569D94A8B3A6C33AD887CAA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2052771919.000000000081D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_81d000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                    • Instruction ID: e9c012e31079974d01c5059321bbd4f6f813f5ceeef44f05e0a49f58fa029e5f
                                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                    • Instruction Fuzzy Hash: A111DF72404340CFCB16CF00D5C4B56BF71FB98324F24C6A9D9094B256C33AE85ACBA2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2052771919.000000000081D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_81d000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                    • Instruction ID: 8dc1ce435c2f61966a31dc9f64e3bd0faa854ae5e06481acf88cd0d81c4908ad
                                                    • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                    • Instruction Fuzzy Hash: 2611DF72404280CFCB06CF10D5C4B96BF72FB98314F24C6A9D8494B256C336D85ACBA2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2052817378.000000000082D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_82d000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                    • Instruction ID: 460f3e033addf338c1e5be1228142f6b9ca31be27008ef511325c8de65cd7189
                                                    • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                    • Instruction Fuzzy Hash: AD119D75504380DFDB06CF54E5C4B15BFA2FB88314F24C6A9D8498B656C33AE84ACBA2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2052817378.000000000082D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0082D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_82d000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                    • Instruction ID: b8d386ea37286f8ca44eef2ad48a249ccd98d9364c9f1a8cbd729bcb213b2675
                                                    • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                    • Instruction Fuzzy Hash: BB118E75504780DFDB15CF14E5C4B15BF61FB44314F24C6A9D8498B666C33AD84ACB62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2052771919.000000000081D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_81d000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d4aba174cc50c8e2e847a2d87ede5f26bc98cfa859579e0af7e151e45f3c6aa9
                                                    • Instruction ID: f4c77831d892525fa48e57199a9d4910fd724608eca980ea57ff466e404b9da0
                                                    • Opcode Fuzzy Hash: d4aba174cc50c8e2e847a2d87ede5f26bc98cfa859579e0af7e151e45f3c6aa9
                                                    • Instruction Fuzzy Hash: 55012B710043089AE7108A65CD84BA7FF9CFF85324F28CD29ED098A2C2C2789C80CA71
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2052771919.000000000081D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0081D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_81d000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6fafb6b9d752337cf764e34006578ac382c0f10d0057d4311cd6e9761ceac738
                                                    • Instruction ID: d291546b33d574cf47aeaca385d28351a37773494c42daf427e61c06a857bb8b
                                                    • Opcode Fuzzy Hash: 6fafb6b9d752337cf764e34006578ac382c0f10d0057d4311cd6e9761ceac738
                                                    • Instruction Fuzzy Hash: EDF0C2720043449AE7108A16C884BA6FFACEF91334F18C95AED084A2C2C2799840CA70
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2053254130.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_b00000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2ca1879fb61adbfc789b12e4077a74a730d738ba830a67dc8b64ef57fb4309f6
                                                    • Instruction ID: bd8eb91e0c0a88e382d940c27947dbd07d6f6018a2e6056391a6e3cdbd98aa73
                                                    • Opcode Fuzzy Hash: 2ca1879fb61adbfc789b12e4077a74a730d738ba830a67dc8b64ef57fb4309f6
                                                    • Instruction Fuzzy Hash: 72D189317006008FDB19DB75C4597AEBBFAAF8AB40F1444ADE1469B2D1DB34EE41CB61
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2053254130.0000000000B00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_b00000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0f00048161995009114778119c844721db130997c730a3e7b0a61483df159841
                                                    • Instruction ID: 62bcda08bb10dd72c883901a0a472ed90ff7756bf1c06d578fbb6688e17c5a2c
                                                    • Opcode Fuzzy Hash: 0f00048161995009114778119c844721db130997c730a3e7b0a61483df159841
                                                    • Instruction Fuzzy Hash: AEE1B674E102198FCB14DFA9C980AAEBBF2FF89305F2481A9D415AB356D731AD41CF61
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2053368878.0000000000BA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_ba0000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 626bcc058f754e931ceef2f68075582d7bc944652ccdc8abccf78bedc3e374cc
                                                    • Instruction ID: 10d7a47675fcbdc8b35d024b3421a6e7ae56ae5aa5f09fe922da94b1ada9f196
                                                    • Opcode Fuzzy Hash: 626bcc058f754e931ceef2f68075582d7bc944652ccdc8abccf78bedc3e374cc
                                                    • Instruction Fuzzy Hash: E2A13932E0420ACFCF15DFA4C9445EEB7F2FF86300B1585BAE815AB265DB359916CB40
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Execution Graph

                                                    Execution Coverage:11.1%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:147
                                                    Total number of Limit Nodes:15
                                                    execution_graph 38736 6c63050 DuplicateHandle 38737 6c630e6 38736->38737 38738 1700848 38740 170084e 38738->38740 38739 170091b 38740->38739 38744 1701382 38740->38744 38748 6c61cf0 38740->38748 38752 6c61d00 38740->38752 38745 1701387 38744->38745 38745->38745 38746 1701484 38745->38746 38756 1707eb0 38745->38756 38746->38740 38749 6c61d0f 38748->38749 38769 6c614d4 38749->38769 38753 6c61d0f 38752->38753 38754 6c614d4 3 API calls 38753->38754 38755 6c61d30 38754->38755 38755->38740 38757 1707eba 38756->38757 38758 1707ed4 38757->38758 38761 6c8f9e8 38757->38761 38765 6c8f9f8 38757->38765 38758->38745 38763 6c8fa0d 38761->38763 38762 6c8fc1e 38762->38758 38763->38762 38764 6c8fc39 GlobalMemoryStatusEx 38763->38764 38764->38763 38767 6c8fa0d 38765->38767 38766 6c8fc1e 38766->38758 38767->38766 38768 6c8fc39 GlobalMemoryStatusEx 38767->38768 38768->38767 38770 6c614df 38769->38770 38773 6c62c34 38770->38773 38772 6c636b6 38772->38772 38775 6c62c3f 38773->38775 38774 6c63ddc 38774->38772 38775->38774 38777 6c65a60 38775->38777 38778 6c65a81 38777->38778 38779 6c65aa5 38778->38779 38781 6c65c10 38778->38781 38779->38774 38782 6c65c1d 38781->38782 38783 6c65c56 38782->38783 38785 6c6495c 38782->38785 38783->38779 38786 6c64967 38785->38786 38788 6c65cc8 38786->38788 38789 6c64990 38786->38789 38788->38788 38790 6c6499b 38789->38790 38796 6c649a0 38790->38796 38792 6c65d37 38800 6c6af48 38792->38800 38808 6c6af60 38792->38808 38793 6c65d71 38793->38788 38799 6c649ab 38796->38799 38797 6c66ed8 38797->38792 38798 6c65a60 3 API calls 38798->38797 38799->38797 38799->38798 38802 6c6af61 38800->38802 38801 6c6af9d 38801->38793 38802->38801 38817 6c6b1d7 38802->38817 38821 6c6b1d8 38802->38821 38803 6c6afdd 38824 6c6c4d8 38803->38824 38828 6c6c4c9 38803->38828 38810 6c6b091 38808->38810 38811 6c6af91 38808->38811 38809 6c6af9d 38809->38793 38810->38793 38811->38809 38813 6c6b1d7 2 API calls 38811->38813 38814 6c6b1d8 2 API calls 38811->38814 38812 6c6afdd 38815 6c6c4d8 CreateWindowExW 38812->38815 38816 6c6c4c9 CreateWindowExW 38812->38816 38813->38812 38814->38812 38815->38810 38816->38810 38818 6c6b1d8 38817->38818 38832 6c6b218 38818->38832 38819 6c6b1e2 38819->38803 38823 6c6b218 2 API calls 38821->38823 38822 6c6b1e2 38822->38803 38823->38822 38825 6c6c503 38824->38825 38826 6c6c5b2 38825->38826 38840 6c6d7c5 38825->38840 38829 6c6c4d8 38828->38829 38830 6c6c5b2 38829->38830 38831 6c6d7c5 CreateWindowExW 38829->38831 38831->38830 38833 6c6b214 38832->38833 38833->38832 38834 6c6b25c 38833->38834 38838 6c6b4c0 LoadLibraryExW 38833->38838 38839 6c6b4bd LoadLibraryExW 38833->38839 38834->38819 38835 6c6b460 GetModuleHandleW 38837 6c6b48d 38835->38837 38836 6c6b254 38836->38834 38836->38835 38837->38819 38838->38836 38839->38836 38841 6c6d7c9 38840->38841 38842 6c6d7fd CreateWindowExW 38840->38842 38841->38826 38844 6c6d934 38842->38844 38844->38844 38663 6c62e08 38664 6c62e4e GetCurrentProcess 38663->38664 38666 6c62ea0 GetCurrentThread 38664->38666 38669 6c62e99 38664->38669 38667 6c62ed6 38666->38667 38668 6c62edd GetCurrentProcess 38666->38668 38667->38668 38672 6c62f13 38668->38672 38669->38666 38670 6c62f3b GetCurrentThreadId 38671 6c62f6c 38670->38671 38672->38670 38673 16bd044 38674 16bd05c 38673->38674 38677 16bd0b6 38674->38677 38680 6c6d9b7 38674->38680 38684 6c6d9c8 38674->38684 38688 6c6e718 38674->38688 38697 6c6cc44 38674->38697 38681 6c6d9c5 38680->38681 38682 6c6cc44 CallWindowProcW 38681->38682 38683 6c6da0f 38682->38683 38683->38677 38685 6c6d9ee 38684->38685 38686 6c6cc44 CallWindowProcW 38685->38686 38687 6c6da0f 38686->38687 38687->38677 38689 6c6e728 38688->38689 38690 6c6e789 38689->38690 38692 6c6e779 38689->38692 38722 6c6cd6c 38690->38722 38706 6c6e8a0 38692->38706 38711 6c6e97c 38692->38711 38717 6c6e8b0 38692->38717 38693 6c6e787 38693->38693 38698 6c6cc4f 38697->38698 38699 6c6e789 38698->38699 38701 6c6e779 38698->38701 38700 6c6cd6c CallWindowProcW 38699->38700 38702 6c6e787 38700->38702 38703 6c6e8a0 CallWindowProcW 38701->38703 38704 6c6e8b0 CallWindowProcW 38701->38704 38705 6c6e97c CallWindowProcW 38701->38705 38702->38702 38703->38702 38704->38702 38705->38702 38707 6c6e8ae 38706->38707 38726 6c6e958 38707->38726 38730 6c6e968 38707->38730 38708 6c6e950 38708->38693 38712 6c6e93a 38711->38712 38713 6c6e98a 38711->38713 38715 6c6e958 CallWindowProcW 38712->38715 38716 6c6e968 CallWindowProcW 38712->38716 38714 6c6e950 38714->38693 38715->38714 38716->38714 38719 6c6e8b2 38717->38719 38718 6c6e950 38718->38693 38720 6c6e958 CallWindowProcW 38719->38720 38721 6c6e968 CallWindowProcW 38719->38721 38720->38718 38721->38718 38723 6c6cd77 38722->38723 38724 6c6fe6a CallWindowProcW 38723->38724 38725 6c6fe19 38723->38725 38724->38725 38725->38693 38727 6c6e968 38726->38727 38728 6c6e979 38727->38728 38733 6c6fda0 38727->38733 38728->38708 38731 6c6e979 38730->38731 38732 6c6fda0 CallWindowProcW 38730->38732 38731->38708 38732->38731 38734 6c6cd6c CallWindowProcW 38733->38734 38735 6c6fdba 38734->38735 38735->38728

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 652 6c83028-6c83049 653 6c8304b-6c8304e 652->653 654 6c837ef-6c837f2 653->654 655 6c83054-6c83073 653->655 656 6c83818-6c8381a 654->656 657 6c837f4-6c83813 654->657 664 6c8308c-6c83096 655->664 665 6c83075-6c83078 655->665 658 6c8381c 656->658 659 6c83821-6c83824 656->659 657->656 658->659 659->653 662 6c8382a-6c83833 659->662 670 6c8309c-6c830ab 664->670 665->664 667 6c8307a-6c8308a 665->667 667->670 778 6c830ad call 6c83848 670->778 779 6c830ad call 6c83840 670->779 671 6c830b2-6c830b7 672 6c830b9-6c830bf 671->672 673 6c830c4-6c833a1 671->673 672->662 694 6c837e1-6c837ee 673->694 695 6c833a7-6c83456 673->695 704 6c83458-6c8347d 695->704 705 6c8347f 695->705 707 6c83488-6c8349b 704->707 705->707 709 6c837c8-6c837d4 707->709 710 6c834a1-6c834c3 707->710 709->695 711 6c837da 709->711 710->709 713 6c834c9-6c834d3 710->713 711->694 713->709 714 6c834d9-6c834e4 713->714 714->709 715 6c834ea-6c835c0 714->715 727 6c835ce-6c835fe 715->727 728 6c835c2-6c835c4 715->728 732 6c8360c-6c83618 727->732 733 6c83600-6c83602 727->733 728->727 734 6c83678-6c8367c 732->734 735 6c8361a-6c8361e 732->735 733->732 737 6c837b9-6c837c2 734->737 738 6c83682-6c836be 734->738 735->734 736 6c83620-6c8364a 735->736 745 6c83658-6c83675 736->745 746 6c8364c-6c8364e 736->746 737->709 737->715 749 6c836cc-6c836da 738->749 750 6c836c0-6c836c2 738->750 745->734 746->745 752 6c836dc-6c836e7 749->752 753 6c836f1-6c836fc 749->753 750->749 752->753 758 6c836e9 752->758 756 6c836fe-6c83704 753->756 757 6c83714-6c83725 753->757 759 6c83708-6c8370a 756->759 760 6c83706 756->760 762 6c8373d-6c83749 757->762 763 6c83727-6c8372d 757->763 758->753 759->757 760->757 767 6c8374b-6c83751 762->767 768 6c83761-6c837b2 762->768 764 6c8372f 763->764 765 6c83731-6c83733 763->765 764->762 765->762 769 6c83753 767->769 770 6c83755-6c83757 767->770 768->737 769->768 770->768 778->671 779->671
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                                    • API String ID: 0-3723351465
                                                    • Opcode ID: d530c3346f290915d2b381f4db9234c11168a345f801174a1773c01435a0da8a
                                                    • Instruction ID: d1ba33311263b6f993550f64b97ecc0a7e90212fdc42f7af2aa229f9971d7e55
                                                    • Opcode Fuzzy Hash: d530c3346f290915d2b381f4db9234c11168a345f801174a1773c01435a0da8a
                                                    • Instruction Fuzzy Hash: 01325E30E1075ACFCB55EFA5C99459DB3B6FF89304F10966AD409A7264EB30EE85CB80
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1365 6c87d40-6c87d5e 1366 6c87d60-6c87d63 1365->1366 1367 6c87d70-6c87d73 1366->1367 1368 6c87d65-6c87d6f 1366->1368 1369 6c87d8a-6c87d8d 1367->1369 1370 6c87d75-6c87d83 1367->1370 1371 6c87d8f-6c87dab 1369->1371 1372 6c87db0-6c87db3 1369->1372 1378 6c87d85 1370->1378 1379 6c87de6-6c87dfc 1370->1379 1371->1372 1373 6c87dd4-6c87dd6 1372->1373 1374 6c87db5-6c87dcf 1372->1374 1376 6c87dd8 1373->1376 1377 6c87ddd-6c87de0 1373->1377 1374->1373 1376->1377 1377->1366 1377->1379 1378->1369 1385 6c87e02-6c87e0b 1379->1385 1386 6c88017-6c88021 1379->1386 1387 6c87e11-6c87e2e 1385->1387 1388 6c88022-6c88057 1385->1388 1395 6c88004-6c88011 1387->1395 1396 6c87e34-6c87e5c 1387->1396 1391 6c88059-6c8805c 1388->1391 1393 6c8805e-6c8807a 1391->1393 1394 6c8807f-6c88082 1391->1394 1393->1394 1397 6c88088-6c88094 1394->1397 1398 6c8812f-6c88132 1394->1398 1395->1385 1395->1386 1396->1395 1419 6c87e62-6c87e6b 1396->1419 1405 6c8809f-6c880a1 1397->1405 1399 6c88138-6c88147 1398->1399 1400 6c88367-6c88369 1398->1400 1415 6c88149-6c88164 1399->1415 1416 6c88166-6c881aa 1399->1416 1402 6c8836b 1400->1402 1403 6c88370-6c88373 1400->1403 1402->1403 1403->1391 1408 6c88379-6c88382 1403->1408 1406 6c880b9-6c880bd 1405->1406 1407 6c880a3-6c880a9 1405->1407 1413 6c880cb 1406->1413 1414 6c880bf-6c880c9 1406->1414 1411 6c880ab 1407->1411 1412 6c880ad-6c880af 1407->1412 1411->1406 1412->1406 1418 6c880d0-6c880d2 1413->1418 1414->1418 1415->1416 1425 6c8833b-6c88351 1416->1425 1426 6c881b0-6c881c1 1416->1426 1420 6c880e9-6c88122 1418->1420 1421 6c880d4-6c880d7 1418->1421 1419->1388 1423 6c87e71-6c87e8d 1419->1423 1420->1399 1445 6c88124-6c8812e 1420->1445 1421->1408 1432 6c87ff2-6c87ffe 1423->1432 1433 6c87e93-6c87ebd 1423->1433 1425->1400 1435 6c88326-6c88335 1426->1435 1436 6c881c7-6c881e4 1426->1436 1432->1395 1432->1419 1448 6c87fe8-6c87fed 1433->1448 1449 6c87ec3-6c87eeb 1433->1449 1435->1425 1435->1426 1436->1435 1447 6c881ea-6c882e0 call 6c86568 1436->1447 1498 6c882ee 1447->1498 1499 6c882e2-6c882ec 1447->1499 1448->1432 1449->1448 1455 6c87ef1-6c87f1f 1449->1455 1455->1448 1461 6c87f25-6c87f2e 1455->1461 1461->1448 1463 6c87f34-6c87f66 1461->1463 1470 6c87f68-6c87f6c 1463->1470 1471 6c87f71-6c87f8d 1463->1471 1470->1448 1472 6c87f6e 1470->1472 1471->1432 1473 6c87f8f-6c87fe6 call 6c86568 1471->1473 1472->1471 1473->1432 1500 6c882f3-6c882f5 1498->1500 1499->1500 1500->1435 1501 6c882f7-6c882fc 1500->1501 1502 6c8830a 1501->1502 1503 6c882fe-6c88308 1501->1503 1504 6c8830f-6c88311 1502->1504 1503->1504 1504->1435 1505 6c88313-6c8831f 1504->1505 1505->1435
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $]q$$]q
                                                    • API String ID: 0-127220927
                                                    • Opcode ID: 698b99fd36584f255755ee5bd567e0c5a31d16c9d8aece1d18343a509b4e6f5b
                                                    • Instruction ID: fa90b654a25e6d61c218501f64b2c22a8c4c2f103f11eef059b2eac1e86f062a
                                                    • Opcode Fuzzy Hash: 698b99fd36584f255755ee5bd567e0c5a31d16c9d8aece1d18343a509b4e6f5b
                                                    • Instruction Fuzzy Hash: A302D230B002058FDB64EF69D490AAEB7E6FF84308F648529D405DB791EB35ED42CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $
                                                    • API String ID: 0-3993045852
                                                    • Opcode ID: 96e593dbcc828a429c74cfedd38edc76d6e087b94e2e0c51f53d8cca90fed58f
                                                    • Instruction ID: 22258aa4c5ad9febc25415c1054bfb02ba813cfcf18df6e058256dd399370540
                                                    • Opcode Fuzzy Hash: 96e593dbcc828a429c74cfedd38edc76d6e087b94e2e0c51f53d8cca90fed58f
                                                    • Instruction Fuzzy Hash: 9822D335E002158FDFA4EFA4C4906AEBBB2EF84318F64846AD405EB351DB75DD42CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d168a4f40642bfb0deb66be208b07a7e5d0ff558120bb0412fa328b3a644af6f
                                                    • Instruction ID: 4aaf0a2710630f859bccbb6aeef9cc3b634f5f91b61d64251defdecb977ce0bc
                                                    • Opcode Fuzzy Hash: d168a4f40642bfb0deb66be208b07a7e5d0ff558120bb0412fa328b3a644af6f
                                                    • Instruction Fuzzy Hash: 5D329134B00209CFDB64EF69D890AAEB7B6FB84314F108529D405E7395DB39ED46CBA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5348ff6dd712b490e0a257549fc5ee36918d3fd173e21761a68223fbad17a6c9
                                                    • Instruction ID: ca9ee9b2d4ce4f2595e6a0ccf8348fcdb8c37fdd66689bc8c1687a83df9b405f
                                                    • Opcode Fuzzy Hash: 5348ff6dd712b490e0a257549fc5ee36918d3fd173e21761a68223fbad17a6c9
                                                    • Instruction Fuzzy Hash: A7226270E002098FDF74EF69D5907ADB7B6EB89314F24892AE405DB391DA38DD81CB51
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 526 6c8ac90-6c8acae 528 6c8acb0-6c8acb3 526->528 529 6c8acbd-6c8acc0 528->529 530 6c8acb5-6c8acba 528->530 531 6c8acd1-6c8acd4 529->531 532 6c8acc2-6c8acc6 529->532 530->529 535 6c8ace4-6c8ace7 531->535 536 6c8acd6-6c8acdf 531->536 533 6c8aebc-6c8aec6 532->533 534 6c8accc 532->534 534->531 537 6c8ace9-6c8acfc 535->537 538 6c8ad01-6c8ad04 535->538 536->535 537->538 539 6c8ad1e-6c8ad21 538->539 540 6c8ad06-6c8ad0f 538->540 543 6c8aead-6c8aeb6 539->543 544 6c8ad27-6c8ad2a 539->544 541 6c8ad15-6c8ad19 540->541 542 6c8aec7-6c8aed5 540->542 541->539 551 6c8ae97-6c8aea3 542->551 552 6c8aed7-6c8aefe 542->552 543->533 543->540 546 6c8ad2c-6c8ad48 544->546 547 6c8ad4d-6c8ad50 544->547 546->547 549 6c8ad52-6c8ad5f 547->549 550 6c8ad64-6c8ad66 547->550 549->550 554 6c8ad68 550->554 555 6c8ad6d-6c8ad70 550->555 566 6c8aeaa 551->566 557 6c8af00-6c8af03 552->557 554->555 555->528 556 6c8ad76-6c8ad9a 555->556 556->566 576 6c8ada0-6c8adaf 556->576 559 6c8af05-6c8af21 557->559 560 6c8af26-6c8af29 557->560 559->560 564 6c8af2b-6c8af35 560->564 565 6c8af36-6c8af39 560->565 568 6c8af48-6c8af4b 565->568 569 6c8af3b call 6c8b1e8 565->569 566->543 570 6c8af58-6c8af5b 568->570 571 6c8af4d-6c8af51 568->571 578 6c8af41-6c8af43 569->578 573 6c8af61-6c8af9c 570->573 575 6c8b1c4-6c8b1c6 570->575 571->573 574 6c8af53 571->574 584 6c8b18f-6c8b1a2 573->584 585 6c8afa2-6c8afae 573->585 574->570 579 6c8b1c8 575->579 580 6c8b1cd-6c8b1d0 575->580 586 6c8adb1-6c8adb7 576->586 587 6c8adc7-6c8ae02 call 6c86568 576->587 578->568 579->580 580->557 583 6c8b1d6-6c8b1e0 580->583 590 6c8b1a4 584->590 593 6c8afce-6c8b012 585->593 594 6c8afb0-6c8afc9 585->594 588 6c8adb9 586->588 589 6c8adbb-6c8adbd 586->589 604 6c8ae1a-6c8ae31 587->604 605 6c8ae04-6c8ae0a 587->605 588->587 589->587 590->575 610 6c8b02e-6c8b06d 593->610 611 6c8b014-6c8b026 593->611 594->590 614 6c8ae49-6c8ae5a 604->614 615 6c8ae33-6c8ae39 604->615 606 6c8ae0c 605->606 607 6c8ae0e-6c8ae10 605->607 606->604 607->604 619 6c8b073-6c8b14e call 6c86568 610->619 620 6c8b154-6c8b169 610->620 611->610 624 6c8ae5c-6c8ae62 614->624 625 6c8ae72-6c8ae8f 614->625 617 6c8ae3b 615->617 618 6c8ae3d-6c8ae3f 615->618 617->614 618->614 619->620 620->584 627 6c8ae64 624->627 628 6c8ae66-6c8ae68 624->628 625->551 627->625 628->625
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                    • API String ID: 0-1273862796
                                                    • Opcode ID: eec1404bfdce9d80b4464b08c417edd4b8262353b98529fffc2a70cdf5e5ca32
                                                    • Instruction ID: 974f34455a95d93ab667167b9d3beaad0f7441fecf158b59d7ec47f8e4b6133d
                                                    • Opcode Fuzzy Hash: eec1404bfdce9d80b4464b08c417edd4b8262353b98529fffc2a70cdf5e5ca32
                                                    • Instruction Fuzzy Hash: F7E16030E0020A8FDB65EFA9D8906AEB7B6FF85304F10892AD405EB355DB35DD46CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 780 6c8b618-6c8b63a 781 6c8b63c-6c8b63f 780->781 782 6c8b64f-6c8b652 781->782 783 6c8b641-6c8b64a 781->783 784 6c8b669-6c8b66c 782->784 785 6c8b654-6c8b658 782->785 783->782 788 6c8b66e-6c8b672 784->788 789 6c8b683-6c8b686 784->789 786 6c8b65e-6c8b664 785->786 787 6c8b9af-6c8b9e6 785->787 786->784 799 6c8b9e8-6c8b9eb 787->799 788->787 790 6c8b678-6c8b67e 788->790 791 6c8b688-6c8b6e5 call 6c86568 789->791 792 6c8b6ea-6c8b6ed 789->792 790->789 791->792 793 6c8b71e-6c8b727 792->793 794 6c8b6ef-6c8b6f2 792->794 800 6c8b83b-6c8b844 793->800 801 6c8b72d 793->801 796 6c8b719-6c8b71c 794->796 797 6c8b6f4-6c8b6f8 794->797 796->793 807 6c8b732-6c8b735 796->807 797->787 803 6c8b6fe-6c8b70e 797->803 805 6c8b9ed-6c8ba09 799->805 806 6c8ba0e-6c8ba11 799->806 800->787 802 6c8b84a-6c8b851 800->802 801->807 812 6c8b856-6c8b859 802->812 828 6c8b88a-6c8b88e 803->828 829 6c8b714 803->829 805->806 808 6c8bc7d-6c8bc7f 806->808 809 6c8ba17-6c8ba3f 806->809 810 6c8b774-6c8b777 807->810 811 6c8b737-6c8b74c 807->811 820 6c8bc81 808->820 821 6c8bc86-6c8bc89 808->821 863 6c8ba49-6c8ba8d 809->863 864 6c8ba41-6c8ba44 809->864 816 6c8b779-6c8b77d 810->816 817 6c8b79a-6c8b79d 810->817 811->787 833 6c8b752-6c8b76f 811->833 814 6c8b86b-6c8b86e 812->814 815 6c8b85b 812->815 826 6c8b870-6c8b873 814->826 827 6c8b885-6c8b888 814->827 834 6c8b863-6c8b866 815->834 816->787 825 6c8b783-6c8b793 816->825 831 6c8b79f-6c8b7a2 817->831 832 6c8b7a7-6c8b7aa 817->832 820->821 821->799 822 6c8bc8f-6c8bc98 821->822 825->831 849 6c8b795 825->849 826->787 835 6c8b879-6c8b880 826->835 827->828 836 6c8b8af-6c8b8b2 827->836 828->787 837 6c8b894-6c8b8a4 828->837 829->796 831->832 838 6c8b7ac-6c8b7b0 832->838 839 6c8b7c1-6c8b7c4 832->839 833->810 834->814 835->827 836->831 844 6c8b8b8-6c8b8bb 836->844 837->816 856 6c8b8aa 837->856 838->787 841 6c8b7b6-6c8b7bc 838->841 842 6c8b7ce-6c8b7d1 839->842 843 6c8b7c6-6c8b7c9 839->843 841->839 851 6c8b7db-6c8b7de 842->851 852 6c8b7d3-6c8b7d8 842->852 843->842 853 6c8b8bd-6c8b8c0 844->853 854 6c8b8c7-6c8b8ca 844->854 849->817 859 6c8b7eb-6c8b7ee 851->859 860 6c8b7e0-6c8b7e6 851->860 852->851 853->826 857 6c8b8c2 853->857 861 6c8b8cc-6c8b8ce 854->861 862 6c8b8d1-6c8b8d4 854->862 856->836 857->854 865 6c8b7fe-6c8b801 859->865 866 6c8b7f0-6c8b7f7 859->866 860->859 861->862 862->831 867 6c8b8da-6c8b8dd 862->867 894 6c8bc72-6c8bc7c 863->894 895 6c8ba93-6c8ba9c 863->895 864->822 873 6c8b823-6c8b826 865->873 874 6c8b803-6c8b81e 865->874 869 6c8b828-6c8b831 866->869 870 6c8b7f9 866->870 871 6c8b8df-6c8b8eb 867->871 872 6c8b8f0-6c8b8f3 867->872 875 6c8b836-6c8b839 869->875 870->865 871->872 877 6c8b903-6c8b906 872->877 878 6c8b8f5-6c8b8fe 872->878 873->869 873->875 874->873 875->800 875->812 877->853 879 6c8b908-6c8b90b 877->879 878->877 883 6c8b90d-6c8b929 879->883 884 6c8b92e-6c8b931 879->884 883->884 886 6c8b941-6c8b944 884->886 887 6c8b933-6c8b93c 884->887 886->831 890 6c8b94a-6c8b94d 886->890 887->886 892 6c8b94f-6c8b964 890->892 893 6c8b987-6c8b98a 890->893 892->787 905 6c8b966-6c8b982 892->905 899 6c8b98c-6c8b98d 893->899 900 6c8b992-6c8b994 893->900 897 6c8bc68-6c8bc6d 895->897 898 6c8baa2-6c8bb0e call 6c86568 895->898 897->894 914 6c8bc08-6c8bc1d 898->914 915 6c8bb14-6c8bb19 898->915 899->900 901 6c8b99b-6c8b99e 900->901 902 6c8b996 900->902 901->781 907 6c8b9a4-6c8b9ae 901->907 902->901 905->893 914->897 917 6c8bb1b-6c8bb21 915->917 918 6c8bb35 915->918 920 6c8bb23-6c8bb25 917->920 921 6c8bb27-6c8bb29 917->921 919 6c8bb37-6c8bb3d 918->919 922 6c8bb3f-6c8bb45 919->922 923 6c8bb52-6c8bb5f 919->923 924 6c8bb33 920->924 921->924 925 6c8bb4b 922->925 926 6c8bbf3-6c8bc02 922->926 931 6c8bb61-6c8bb67 923->931 932 6c8bb77-6c8bb84 923->932 924->919 925->923 927 6c8bbba-6c8bbc7 925->927 928 6c8bb86-6c8bb93 925->928 926->914 926->915 939 6c8bbc9-6c8bbcf 927->939 940 6c8bbdf-6c8bbec 927->940 937 6c8bbab-6c8bbb8 928->937 938 6c8bb95-6c8bb9b 928->938 933 6c8bb69 931->933 934 6c8bb6b-6c8bb6d 931->934 932->926 933->932 934->932 937->926 942 6c8bb9d 938->942 943 6c8bb9f-6c8bba1 938->943 944 6c8bbd1 939->944 945 6c8bbd3-6c8bbd5 939->945 940->926 942->937 943->937 944->940 945->940
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                                    • API String ID: 0-3723351465
                                                    • Opcode ID: ff4ad411d00b9c797eb14c5ca6b95a25728a9da21e3add95ff7423a9c1906672
                                                    • Instruction ID: 76b7cad4d60e70b9d584d998cd3e61ac8a8ec1a780307664fa65144556d0a0ba
                                                    • Opcode Fuzzy Hash: ff4ad411d00b9c797eb14c5ca6b95a25728a9da21e3add95ff7423a9c1906672
                                                    • Instruction Fuzzy Hash: 0F026B30E002098FDBB4EF69D480AADB7B6FF85318F24856AD405EB255DB34ED85CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 948 6c62e03-6c62e97 GetCurrentProcess 952 6c62ea0-6c62ed4 GetCurrentThread 948->952 953 6c62e99-6c62e9f 948->953 954 6c62ed6-6c62edc 952->954 955 6c62edd-6c62f11 GetCurrentProcess 952->955 953->952 954->955 957 6c62f13-6c62f19 955->957 958 6c62f1a-6c62f35 call 6c62fe1 955->958 957->958 961 6c62f3b-6c62f6a GetCurrentThreadId 958->961 962 6c62f73-6c62fd5 961->962 963 6c62f6c-6c62f72 961->963 963->962
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 06C62E86
                                                    • GetCurrentThread.KERNEL32 ref: 06C62EC3
                                                    • GetCurrentProcess.KERNEL32 ref: 06C62F00
                                                    • GetCurrentThreadId.KERNEL32 ref: 06C62F59
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260055473.0000000006C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c60000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID:
                                                    • API String ID: 2063062207-0
                                                    • Opcode ID: ade759414034dac8d90c013a06201b4f421fc5a20a5819d9c2c417412b0ce3ea
                                                    • Instruction ID: 774810ee48bbe7620f0b5096549224f2048be532bb5a38088aa23fdb4dc6d349
                                                    • Opcode Fuzzy Hash: ade759414034dac8d90c013a06201b4f421fc5a20a5819d9c2c417412b0ce3ea
                                                    • Instruction Fuzzy Hash: 655149B09002498FDB54DFAAD948BEEBBF5FF48304F208459E419A7350D7385944CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 970 6c62e08-6c62e97 GetCurrentProcess 974 6c62ea0-6c62ed4 GetCurrentThread 970->974 975 6c62e99-6c62e9f 970->975 976 6c62ed6-6c62edc 974->976 977 6c62edd-6c62f11 GetCurrentProcess 974->977 975->974 976->977 979 6c62f13-6c62f19 977->979 980 6c62f1a-6c62f35 call 6c62fe1 977->980 979->980 983 6c62f3b-6c62f6a GetCurrentThreadId 980->983 984 6c62f73-6c62fd5 983->984 985 6c62f6c-6c62f72 983->985 985->984
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 06C62E86
                                                    • GetCurrentThread.KERNEL32 ref: 06C62EC3
                                                    • GetCurrentProcess.KERNEL32 ref: 06C62F00
                                                    • GetCurrentThreadId.KERNEL32 ref: 06C62F59
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260055473.0000000006C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c60000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID:
                                                    • API String ID: 2063062207-0
                                                    • Opcode ID: f3f16d24515934958053d7536081b08320e61f99c804863f0a6231a41841f7e6
                                                    • Instruction ID: 8f72aabf65e3dfcec287cbebf47df2b28102f1965925560d40615cea9f141b00
                                                    • Opcode Fuzzy Hash: f3f16d24515934958053d7536081b08320e61f99c804863f0a6231a41841f7e6
                                                    • Instruction Fuzzy Hash: 175148B09002098FDB54DFAAD948BDEBBF5FF48304F208459E419A7350D7386944CF65
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 992 6c89110-6c89135 993 6c89137-6c8913a 992->993 994 6c899f8-6c899fb 993->994 995 6c89140-6c89155 993->995 996 6c899fd-6c89a1c 994->996 997 6c89a21-6c89a23 994->997 1002 6c8916d-6c89183 995->1002 1003 6c89157-6c8915d 995->1003 996->997 999 6c89a2a-6c89a2d 997->999 1000 6c89a25 997->1000 999->993 1004 6c89a33-6c89a3d 999->1004 1000->999 1009 6c8918e-6c89190 1002->1009 1005 6c8915f 1003->1005 1006 6c89161-6c89163 1003->1006 1005->1002 1006->1002 1010 6c891a8-6c89219 1009->1010 1011 6c89192-6c89198 1009->1011 1022 6c8921b-6c8923e 1010->1022 1023 6c89245-6c89261 1010->1023 1012 6c8919a 1011->1012 1013 6c8919c-6c8919e 1011->1013 1012->1010 1013->1010 1022->1023 1028 6c8928d-6c892a8 1023->1028 1029 6c89263-6c89286 1023->1029 1034 6c892aa-6c892cc 1028->1034 1035 6c892d3-6c892ee 1028->1035 1029->1028 1034->1035 1040 6c892f0-6c8930c 1035->1040 1041 6c89313-6c89321 1035->1041 1040->1041 1042 6c89331-6c893ab 1041->1042 1043 6c89323-6c8932c 1041->1043 1049 6c893f8-6c8940d 1042->1049 1050 6c893ad-6c893cb 1042->1050 1043->1004 1049->994 1054 6c893cd-6c893dc 1050->1054 1055 6c893e7-6c893f6 1050->1055 1054->1055 1055->1049 1055->1050
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $]q$$]q$$]q$$]q
                                                    • API String ID: 0-858218434
                                                    • Opcode ID: 1f6437dc18af5fa0a5e637fbec2ec1b74cc39720ec26e5fa18656c18805df851
                                                    • Instruction ID: 272cf826d74e3ee55ea08aeb9b538a88405a35609a06d3d02c9076603dfae283
                                                    • Opcode Fuzzy Hash: 1f6437dc18af5fa0a5e637fbec2ec1b74cc39720ec26e5fa18656c18805df851
                                                    • Instruction Fuzzy Hash: B1914F30F1020A9FDBA5EF69D850BAEB7F6FF85204F108569C409EB344EA349D46CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1058 6c8cf00-6c8cf1b 1059 6c8cf1d-6c8cf20 1058->1059 1060 6c8cf69-6c8cf6c 1059->1060 1061 6c8cf22-6c8cf64 1059->1061 1062 6c8cf7b-6c8cf7e 1060->1062 1063 6c8cf6e-6c8cf70 1060->1063 1061->1060 1067 6c8d3ec-6c8d3f8 1062->1067 1068 6c8cf84-6c8cf87 1062->1068 1065 6c8d3e9 1063->1065 1066 6c8cf76 1063->1066 1065->1067 1066->1062 1069 6c8d3fe-6c8d6eb 1067->1069 1070 6c8d021-6c8d030 1067->1070 1071 6c8cf89-6c8cfcb 1068->1071 1072 6c8cfd0-6c8cfd3 1068->1072 1270 6c8d6f1-6c8d6f7 1069->1270 1271 6c8d912-6c8d91c 1069->1271 1074 6c8d03f-6c8d04b 1070->1074 1075 6c8d032-6c8d037 1070->1075 1071->1072 1076 6c8d01c-6c8d01f 1072->1076 1077 6c8cfd5-6c8cfe4 1072->1077 1081 6c8d91d-6c8d956 1074->1081 1082 6c8d051-6c8d063 1074->1082 1075->1074 1076->1070 1080 6c8d068-6c8d06b 1076->1080 1083 6c8cff3-6c8cfff 1077->1083 1084 6c8cfe6-6c8cfeb 1077->1084 1086 6c8d06d-6c8d0af 1080->1086 1087 6c8d0b4-6c8d0b7 1080->1087 1098 6c8d958-6c8d95b 1081->1098 1082->1080 1083->1081 1088 6c8d005-6c8d017 1083->1088 1084->1083 1086->1087 1092 6c8d0b9-6c8d0fb 1087->1092 1093 6c8d100-6c8d103 1087->1093 1088->1076 1092->1093 1096 6c8d10d-6c8d110 1093->1096 1097 6c8d105-6c8d10a 1093->1097 1101 6c8d159-6c8d15c 1096->1101 1102 6c8d112-6c8d154 1096->1102 1097->1096 1104 6c8d95d-6c8d979 1098->1104 1105 6c8d97e-6c8d981 1098->1105 1108 6c8d15e-6c8d17a 1101->1108 1109 6c8d17f-6c8d182 1101->1109 1102->1101 1104->1105 1111 6c8d983-6c8d9af 1105->1111 1112 6c8d9b4-6c8d9b7 1105->1112 1108->1109 1114 6c8d191-6c8d194 1109->1114 1115 6c8d184-6c8d186 1109->1115 1111->1112 1121 6c8d9b9 call 6c8da75 1112->1121 1122 6c8d9c6-6c8d9c8 1112->1122 1129 6c8d1dd-6c8d1e0 1114->1129 1130 6c8d196-6c8d1d8 1114->1130 1127 6c8d18c 1115->1127 1128 6c8d2a7-6c8d2b0 1115->1128 1141 6c8d9bf-6c8d9c1 1121->1141 1124 6c8d9ca 1122->1124 1125 6c8d9cf-6c8d9d2 1122->1125 1124->1125 1125->1098 1131 6c8d9d4-6c8d9e3 1125->1131 1127->1114 1137 6c8d2bf-6c8d2cb 1128->1137 1138 6c8d2b2-6c8d2b7 1128->1138 1135 6c8d229-6c8d22c 1129->1135 1136 6c8d1e2-6c8d224 1129->1136 1130->1129 1158 6c8da4a-6c8da5f 1131->1158 1159 6c8d9e5-6c8da48 call 6c86568 1131->1159 1142 6c8d22e-6c8d270 1135->1142 1143 6c8d275-6c8d278 1135->1143 1136->1135 1147 6c8d3dc-6c8d3e1 1137->1147 1148 6c8d2d1-6c8d2e5 1137->1148 1138->1137 1141->1122 1142->1143 1151 6c8d27a-6c8d290 1143->1151 1152 6c8d295-6c8d297 1143->1152 1147->1065 1148->1065 1170 6c8d2eb-6c8d2fd 1148->1170 1151->1152 1161 6c8d299 1152->1161 1162 6c8d29e-6c8d2a1 1152->1162 1159->1158 1161->1162 1162->1059 1162->1128 1184 6c8d2ff-6c8d305 1170->1184 1185 6c8d321-6c8d323 1170->1185 1186 6c8d309-6c8d315 1184->1186 1187 6c8d307 1184->1187 1189 6c8d32d-6c8d339 1185->1189 1191 6c8d317-6c8d31f 1186->1191 1187->1191 1200 6c8d33b-6c8d345 1189->1200 1201 6c8d347 1189->1201 1191->1189 1204 6c8d34c-6c8d34e 1200->1204 1201->1204 1204->1065 1206 6c8d354-6c8d370 call 6c86568 1204->1206 1215 6c8d37f-6c8d38b 1206->1215 1216 6c8d372-6c8d377 1206->1216 1215->1147 1218 6c8d38d-6c8d3da 1215->1218 1216->1215 1218->1065 1272 6c8d6f9-6c8d6fe 1270->1272 1273 6c8d706-6c8d70f 1270->1273 1272->1273 1273->1081 1274 6c8d715-6c8d728 1273->1274 1276 6c8d72e-6c8d734 1274->1276 1277 6c8d902-6c8d90c 1274->1277 1278 6c8d743-6c8d74c 1276->1278 1279 6c8d736-6c8d73b 1276->1279 1277->1270 1277->1271 1278->1081 1280 6c8d752-6c8d773 1278->1280 1279->1278 1283 6c8d782-6c8d78b 1280->1283 1284 6c8d775-6c8d77a 1280->1284 1283->1081 1285 6c8d791-6c8d7ae 1283->1285 1284->1283 1285->1277 1288 6c8d7b4-6c8d7ba 1285->1288 1288->1081 1289 6c8d7c0-6c8d7d9 1288->1289 1291 6c8d7df-6c8d806 1289->1291 1292 6c8d8f5-6c8d8fc 1289->1292 1291->1081 1295 6c8d80c-6c8d816 1291->1295 1292->1277 1292->1288 1295->1081 1296 6c8d81c-6c8d833 1295->1296 1298 6c8d842-6c8d85d 1296->1298 1299 6c8d835-6c8d840 1296->1299 1298->1292 1304 6c8d863-6c8d87c call 6c86568 1298->1304 1299->1298 1308 6c8d88b-6c8d894 1304->1308 1309 6c8d87e-6c8d883 1304->1309 1308->1081 1310 6c8d89a-6c8d8ee 1308->1310 1309->1308 1310->1292
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $]q$$]q$$]q
                                                    • API String ID: 0-182748909
                                                    • Opcode ID: ea53a55d69083453a23c8000b1e4e6e57fa5fdf8b21c02207b801a011b6403cc
                                                    • Instruction ID: d453f9977fc9c578c297f610688a871da628db6721035193fda0f8c8f273afb7
                                                    • Opcode Fuzzy Hash: ea53a55d69083453a23c8000b1e4e6e57fa5fdf8b21c02207b801a011b6403cc
                                                    • Instruction Fuzzy Hash: 57624F3060020A8FCB55EF68E590A5EB7B6FF84704B108A79D0069F769DB79FD46CB81
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1318 6c84b38-6c84b5c 1319 6c84b5e-6c84b61 1318->1319 1320 6c84b82-6c84b85 1319->1320 1321 6c84b63-6c84b7d 1319->1321 1322 6c84b8b-6c84c83 1320->1322 1323 6c85264-6c85266 1320->1323 1321->1320 1341 6c84c89-6c84cd6 call 6c853e8 1322->1341 1342 6c84d06-6c84d0d 1322->1342 1325 6c85268 1323->1325 1326 6c8526d-6c85270 1323->1326 1325->1326 1326->1319 1327 6c85276-6c85283 1326->1327 1355 6c84cdc-6c84cf8 1341->1355 1343 6c84d91-6c84d9a 1342->1343 1344 6c84d13-6c84d83 1342->1344 1343->1327 1361 6c84d8e 1344->1361 1362 6c84d85 1344->1362 1358 6c84cfa 1355->1358 1359 6c84d03-6c84d04 1355->1359 1358->1359 1359->1342 1361->1343 1362->1361
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: fbq$XPbq$\Obq
                                                    • API String ID: 0-4057264190
                                                    • Opcode ID: 8d835df0757b0e9b247b230236224be2b056cf2a50457d2ff9c7b1c0dfb20335
                                                    • Instruction ID: 5ea42e4442467916d324043568d09d2b42b2c3e860c420cfb180ea118e866e6a
                                                    • Opcode Fuzzy Hash: 8d835df0757b0e9b247b230236224be2b056cf2a50457d2ff9c7b1c0dfb20335
                                                    • Instruction Fuzzy Hash: D6618130F002199FEB649FA5C8547AEBAF6FF88704F20842AD506AB395DB758C45CF91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2271 6c89105-6c89135 2273 6c89137-6c8913a 2271->2273 2274 6c899f8-6c899fb 2273->2274 2275 6c89140-6c89155 2273->2275 2276 6c899fd-6c89a1c 2274->2276 2277 6c89a21-6c89a23 2274->2277 2282 6c8916d-6c89183 2275->2282 2283 6c89157-6c8915d 2275->2283 2276->2277 2279 6c89a2a-6c89a2d 2277->2279 2280 6c89a25 2277->2280 2279->2273 2284 6c89a33-6c89a3d 2279->2284 2280->2279 2289 6c8918e-6c89190 2282->2289 2285 6c8915f 2283->2285 2286 6c89161-6c89163 2283->2286 2285->2282 2286->2282 2290 6c891a8-6c89219 2289->2290 2291 6c89192-6c89198 2289->2291 2302 6c8921b-6c8923e 2290->2302 2303 6c89245-6c89261 2290->2303 2292 6c8919a 2291->2292 2293 6c8919c-6c8919e 2291->2293 2292->2290 2293->2290 2302->2303 2308 6c8928d-6c892a8 2303->2308 2309 6c89263-6c89286 2303->2309 2314 6c892aa-6c892cc 2308->2314 2315 6c892d3-6c892ee 2308->2315 2309->2308 2314->2315 2320 6c892f0-6c8930c 2315->2320 2321 6c89313-6c89321 2315->2321 2320->2321 2322 6c89331-6c893ab 2321->2322 2323 6c89323-6c8932c 2321->2323 2329 6c893f8-6c8940d 2322->2329 2330 6c893ad-6c893cb 2322->2330 2323->2284 2329->2274 2334 6c893cd-6c893dc 2330->2334 2335 6c893e7-6c893f6 2330->2335 2334->2335 2335->2329 2335->2330
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $]q$$]q
                                                    • API String ID: 0-127220927
                                                    • Opcode ID: a5e12205a4c16ab94aefb5ab7b3b104a9c2979182b46597d2b4d68518be465b9
                                                    • Instruction ID: 93f18b50a817ddc4bef9182b5b7028ac787431afa7d3b1bb2e4bf5e69174052c
                                                    • Opcode Fuzzy Hash: a5e12205a4c16ab94aefb5ab7b3b104a9c2979182b46597d2b4d68518be465b9
                                                    • Instruction Fuzzy Hash: B4517130B102069FDB95EB79D850BAEB7FAFB88644F148469C409DB384EA34DC46CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2338 6c84b28-6c84b5c 2339 6c84b5e-6c84b61 2338->2339 2340 6c84b82-6c84b85 2339->2340 2341 6c84b63-6c84b7d 2339->2341 2342 6c84b8b-6c84c83 2340->2342 2343 6c85264-6c85266 2340->2343 2341->2340 2361 6c84c89-6c84cd6 call 6c853e8 2342->2361 2362 6c84d06-6c84d0d 2342->2362 2345 6c85268 2343->2345 2346 6c8526d-6c85270 2343->2346 2345->2346 2346->2339 2347 6c85276-6c85283 2346->2347 2375 6c84cdc-6c84cf8 2361->2375 2363 6c84d91-6c84d9a 2362->2363 2364 6c84d13-6c84d83 2362->2364 2363->2347 2381 6c84d8e 2364->2381 2382 6c84d85 2364->2382 2378 6c84cfa 2375->2378 2379 6c84d03-6c84d04 2375->2379 2378->2379 2379->2362 2381->2363 2382->2381
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: fbq$XPbq
                                                    • API String ID: 0-2292610095
                                                    • Opcode ID: b06ed730c6496cf2ef3b7a2bd7c18dad72764f4fd3e3d7befddec46f8e1d21d7
                                                    • Instruction ID: 5b2b39ceada1012ffeca7aa0f9ff6753b565e1dc2abcebc716e672288d0bda58
                                                    • Opcode Fuzzy Hash: b06ed730c6496cf2ef3b7a2bd7c18dad72764f4fd3e3d7befddec46f8e1d21d7
                                                    • Instruction Fuzzy Hash: 3E518E70F002099FEB549FA5C854BAEBAF7FF88700F20852AD506AB395DA749C41CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260055473.0000000006C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c60000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a6708ca2da36c088bdde7ebd946b3a4788da154b58ad6330e15c37b25db38982
                                                    • Instruction ID: 1e822001cab4485e1c6411f16efd43f354a4eba3a4d12b03a903cfe6747e6fac
                                                    • Opcode Fuzzy Hash: a6708ca2da36c088bdde7ebd946b3a4788da154b58ad6330e15c37b25db38982
                                                    • Instruction Fuzzy Hash: 61814570A00B458FD7A4DF2AD48479ABBF1FF88300F00892EE49AD7A50DB74E955CB94
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06C6D922
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260055473.0000000006C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c60000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: a43d9c8445d2c99d87703bb29bd0beecda59b877dc2e3eab5685a8e0fc571800
                                                    • Instruction ID: 413cf1bb4f9a0f0463b01ee0e62790649e58919c276bf74a82f46fb0b36cbd94
                                                    • Opcode Fuzzy Hash: a43d9c8445d2c99d87703bb29bd0beecda59b877dc2e3eab5685a8e0fc571800
                                                    • Instruction Fuzzy Hash: DE51E1B1D00249AFDF15CF9AC884ADDBFB6BF48314F14816AF819AB220D775A941CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3254471224.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_1700000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0b0398d7f0d1f4ed7953b3b5450eed6675bae059b0c7ff3d9a32e1c4b8763565
                                                    • Instruction ID: bb2b9ad300643abfa84b91097d5de8f04f4adf807d128d21a5c6419f13e913b8
                                                    • Opcode Fuzzy Hash: 0b0398d7f0d1f4ed7953b3b5450eed6675bae059b0c7ff3d9a32e1c4b8763565
                                                    • Instruction Fuzzy Hash: 4F415372D043458FCB15DFA9C8042AEBFF2AF89310F15896AD509A7391EB789845CBE0
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06C6D922
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260055473.0000000006C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c60000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 22575608827a5deae1a66adde2ab2de9482721df19b126efe2015f85e2f668d8
                                                    • Instruction ID: 825e9a9664e80fceef29894305e2a509c18c74c5b57823d2d9cee1908c4d91c4
                                                    • Opcode Fuzzy Hash: 22575608827a5deae1a66adde2ab2de9482721df19b126efe2015f85e2f668d8
                                                    • Instruction Fuzzy Hash: 0751D2B1D00349AFDB14CF9AC884ADEFFB5BF48314F64852AE419AB210D775A941CF94
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06C6D922
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260055473.0000000006C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c60000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: a61ccfd4569954ec267f51a56343cb75505c2e359dcdca8764d725156ba60b5a
                                                    • Instruction ID: eb98f41f2ebd63759d65aaa947adf5304552ea0865b4c32cc06183a3ae259208
                                                    • Opcode Fuzzy Hash: a61ccfd4569954ec267f51a56343cb75505c2e359dcdca8764d725156ba60b5a
                                                    • Instruction Fuzzy Hash: 1C41C2B1D00349AFDF14CF9AC884ADEBBB5BF48314F24852AE419AB210D775A985CF94
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 06C6FE91
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260055473.0000000006C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c60000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: CallProcWindow
                                                    • String ID:
                                                    • API String ID: 2714655100-0
                                                    • Opcode ID: 3ac71a59cce6845f036d71e0f0bfd35f78ad9c41adfa53bae410b793ad587905
                                                    • Instruction ID: d6247521295a564277884b9b9ef07926df378cc074f2199ea8a9ef2500990009
                                                    • Opcode Fuzzy Hash: 3ac71a59cce6845f036d71e0f0bfd35f78ad9c41adfa53bae410b793ad587905
                                                    • Instruction Fuzzy Hash: BA4128B49003099FCB54CF9AC488AAABBF6FF88314F24C45DE519A7321D374A940CFA4
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06C630D7
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260055473.0000000006C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c60000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 02ea0618817cf3cff53acdd49faed578e00a3be4d1fe41a98aaf396ef94d87e9
                                                    • Instruction ID: b86891ab87bbed9b1c35b9e63094ee5f923ea766338db53c2e39e4a8307354d8
                                                    • Opcode Fuzzy Hash: 02ea0618817cf3cff53acdd49faed578e00a3be4d1fe41a98aaf396ef94d87e9
                                                    • Instruction Fuzzy Hash: 3521E5B5D002489FDB10CFAAD584ADEBBF5FF48310F14841AE958A3250D3799944CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06C630D7
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260055473.0000000006C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c60000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 61eca0062984eb141210e3f456b96215beeade773c01582f60c849689b42c956
                                                    • Instruction ID: e121580b3d2ba6253308a3555ff65ce0a8e55d2ac3a6c16e6756e43797a06d5d
                                                    • Opcode Fuzzy Hash: 61eca0062984eb141210e3f456b96215beeade773c01582f60c849689b42c956
                                                    • Instruction Fuzzy Hash: D521C6B5D00248AFDB10CF9AD584ADEFBF5FB48310F14841AE918A3350D379A944CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,06C6B4F9,00000800,00000000,00000000), ref: 06C6B6EA
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260055473.0000000006C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c60000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 054b86223e6dc0bc53830a454e5b17ef46bd05ab645ab475d087a902198c307a
                                                    • Instruction ID: 29463ec9b8bfbf42b65357638dd992d92f3ab702082e1292205f85b93f71f31d
                                                    • Opcode Fuzzy Hash: 054b86223e6dc0bc53830a454e5b17ef46bd05ab645ab475d087a902198c307a
                                                    • Instruction Fuzzy Hash: 031117B6C002099FDB14CF9AD884ADEFBF4FB88310F10841AE419A7210C379A545CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,06C6B4F9,00000800,00000000,00000000), ref: 06C6B6EA
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260055473.0000000006C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c60000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 8d60faae3d045286149ca92e7fc4b637b7fa8d3fba53f711aeeef5f1a4520aa3
                                                    • Instruction ID: 36c48e88460f6920306b50f44102460e65782e6e2a49b0e44c584c84c56e318c
                                                    • Opcode Fuzzy Hash: 8d60faae3d045286149ca92e7fc4b637b7fa8d3fba53f711aeeef5f1a4520aa3
                                                    • Instruction Fuzzy Hash: E811E4B6D042099FDB14DF9AD884ADEFBF4FB48310F10842EE519A7210C379A945CFA9
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GlobalMemoryStatusEx.KERNELBASE ref: 0170ECB7
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3254471224.0000000001700000.00000040.00000800.00020000.00000000.sdmp, Offset: 01700000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_1700000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: GlobalMemoryStatus
                                                    • String ID:
                                                    • API String ID: 1890195054-0
                                                    • Opcode ID: 0e304b387c18d0da4119f8a5abc23a197fd8258e97c234ba9c6e66857dbdb311
                                                    • Instruction ID: c9f94101cb13e705d41e1e11be4499b38da1bc41ca6622baf1feb3e17b3affb4
                                                    • Opcode Fuzzy Hash: 0e304b387c18d0da4119f8a5abc23a197fd8258e97c234ba9c6e66857dbdb311
                                                    • Instruction Fuzzy Hash: D211EFB1C006599BCB10DFAAC544BDEFBF4BF48320F14856AE918A7240D779A944CFE5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 06C6B47E
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260055473.0000000006C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c60000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 720081758fed5a30fb10765524eabb826cde808982e39da4337e4089c6f98749
                                                    • Instruction ID: f4c712237004d2df6c61fb15159d96f4f42d5599264fe545e0bb7d3e916bdc79
                                                    • Opcode Fuzzy Hash: 720081758fed5a30fb10765524eabb826cde808982e39da4337e4089c6f98749
                                                    • Instruction Fuzzy Hash: 3911E0B5C003499FCB10DF9AC484ADEFBF4EF88324F10841AD429A7210D3B9A645CFA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: PH]q
                                                    • API String ID: 0-3168235125
                                                    • Opcode ID: 50ee67f2dc0b6a803bb903ae7919f72a1a546c20e406202d0b734e1a7e149073
                                                    • Instruction ID: 6f036dd0af4df7066dc7fb82e7275f1064e5b88fb43e876dd09e4c04813b11d5
                                                    • Opcode Fuzzy Hash: 50ee67f2dc0b6a803bb903ae7919f72a1a546c20e406202d0b734e1a7e149073
                                                    • Instruction Fuzzy Hash: EC418130E0030ADFDB64AF65D8506AEBBB6FF85344F204529E406EB285DB74E946CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: PH]q
                                                    • API String ID: 0-3168235125
                                                    • Opcode ID: c8d447c1df5edea500ea3d991de77f688f9448f55d1a9849712a1f62863fc07e
                                                    • Instruction ID: 2868af4be6c12894f474b8f33ea5a1844a57972dec78cdabb53ae47c30c11f77
                                                    • Opcode Fuzzy Hash: c8d447c1df5edea500ea3d991de77f688f9448f55d1a9849712a1f62863fc07e
                                                    • Instruction Fuzzy Hash: 0531F130B102019FCBA9AB7489686AE3BE6EF85214F10457CD002DB345DE39DE46CBD5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: PH]q
                                                    • API String ID: 0-3168235125
                                                    • Opcode ID: a33cbf9c002a8e9268e98953fa96903ef8241dc7c868d68a7d1974224d8edf9c
                                                    • Instruction ID: 6d0bcfdaf6a80226a08bb32249633c9122cbb55ba827d865f34de6b072bcf84d
                                                    • Opcode Fuzzy Hash: a33cbf9c002a8e9268e98953fa96903ef8241dc7c868d68a7d1974224d8edf9c
                                                    • Instruction Fuzzy Hash: 0531C330B102018FDBA8AB74D95866E76E7EF89214F10453CD406DB354DE39DE45CBD5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2cdfa37aa29f3f7b90085bb211c1e69ddadf19f252ba7592da5541db1a5dc9db
                                                    • Instruction ID: 37bdf62bb3a411f2f602147e913e15e0aadb0e2851a08ce73f55d149563a988b
                                                    • Opcode Fuzzy Hash: 2cdfa37aa29f3f7b90085bb211c1e69ddadf19f252ba7592da5541db1a5dc9db
                                                    • Instruction Fuzzy Hash: EA028B30B002048FDB64EB69D944BAEB7F2EF84318F148569E41ADB391DB35ED46CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e4193002581ed6d32eee214c585d914fd75ef2fc0a96450163590767f629155e
                                                    • Instruction ID: 3e3f3c50b99612db0bc28231d79ccca8d787a90842d69e250e0feb51948399db
                                                    • Opcode Fuzzy Hash: e4193002581ed6d32eee214c585d914fd75ef2fc0a96450163590767f629155e
                                                    • Instruction Fuzzy Hash: 2961BF71F000214FDB64AA6ED884A6FBADBAF94224F154479D80EDB360DE79DD02C7D2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6689c55a92c5e261ce2f03d75535b5511118104f831e2d31abfea5ca7eb34281
                                                    • Instruction ID: ef976dd3e6dd15e43a22859662234610089c0cfa7c34e851fc3a5d765eecd5a5
                                                    • Opcode Fuzzy Hash: 6689c55a92c5e261ce2f03d75535b5511118104f831e2d31abfea5ca7eb34281
                                                    • Instruction Fuzzy Hash: 7C814D30B0020A9FDB58EF69D45479EB7F3AB89304F108529D40AEB395EB34DD46CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 49414fffc1529733fac342fad5bae33cb0208515e26d0efcba1b3e92ee163d41
                                                    • Instruction ID: 7638c02b6ef3c03e05b085b4995aaf188386e4a4411a51494d2f4c15f14be902
                                                    • Opcode Fuzzy Hash: 49414fffc1529733fac342fad5bae33cb0208515e26d0efcba1b3e92ee163d41
                                                    • Instruction Fuzzy Hash: 29912C30E1021A8FDF64DF68C890B9DB7B1FF89304F208599D549EB295DB70AA85CF91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b6869d053de76b777e62b4540a2ba728b60af313a191b65b5e8390b3389a5d1e
                                                    • Instruction ID: e5fe1517d4dcb2a638ff23f0840e9c1009a8219ce43e5b8abac3735357fbb4ed
                                                    • Opcode Fuzzy Hash: b6869d053de76b777e62b4540a2ba728b60af313a191b65b5e8390b3389a5d1e
                                                    • Instruction Fuzzy Hash: 76913A30E1021A8FDF64DF68C890B9DB7B1FF89304F20C699D549AB255DB70AA85CF91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2990c5bef7d6372cea10f1a632a30bbbb619f42251806ab86349122d838296e1
                                                    • Instruction ID: 0b932d6ace5c175113c822fe13a7e7c3dec286d9e2e71f31b24d1125d2dcf7bb
                                                    • Opcode Fuzzy Hash: 2990c5bef7d6372cea10f1a632a30bbbb619f42251806ab86349122d838296e1
                                                    • Instruction Fuzzy Hash: C5713B70A002099FCB64EFA9D990AAEBBF6FF88304F148529D415EB355DB34ED46CB50
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bc95f3fae737ae5387e05744bb488ef770fd282ba8bc06482320bf7a261a2cff
                                                    • Instruction ID: da0fc573abc268f17fce4feb11c15eccfca707418dbce96fdb2055db308a1920
                                                    • Opcode Fuzzy Hash: bc95f3fae737ae5387e05744bb488ef770fd282ba8bc06482320bf7a261a2cff
                                                    • Instruction Fuzzy Hash: 55712970A002099FDB54EFA9D990AAEBBF6FF88304F148429D405EB355DB34ED46CB50
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3b1aa9fff3624f3fd003b7ce8977442b623297da09183b32d4cf66457af89d66
                                                    • Instruction ID: ccb2e152dfa0dac11d68a9e574542cdb6b0e69cd4d33d02bc6bb4c39086cd3cb
                                                    • Opcode Fuzzy Hash: 3b1aa9fff3624f3fd003b7ce8977442b623297da09183b32d4cf66457af89d66
                                                    • Instruction Fuzzy Hash: 0151C131E00105CFCB64BF78E8546ADB7B2FB84359F20887DE12AD7251DB359A55CB81
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0204d6a6469d6a2b7ce645c90471c0c863e0b6f530795df1b3708943c688c85b
                                                    • Instruction ID: de39b2dec38441ff5881bbca28a0bc3445e242f5882d19c997bda007b0e9e024
                                                    • Opcode Fuzzy Hash: 0204d6a6469d6a2b7ce645c90471c0c863e0b6f530795df1b3708943c688c85b
                                                    • Instruction Fuzzy Hash: 3651B5B0B102048FEF746A78E95476F265EDB89394F20483EE80AD7795CA6CCD45C792
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 34a2a895f064009bcc5dade95e3b53b4e5a4bf6d0998c5bb2d7f5e17726357cc
                                                    • Instruction ID: a5c0d816ef83c4433546bb949ccba8cc427719641f0aa1a4d466befaf38f60da
                                                    • Opcode Fuzzy Hash: 34a2a895f064009bcc5dade95e3b53b4e5a4bf6d0998c5bb2d7f5e17726357cc
                                                    • Instruction Fuzzy Hash: 2451B4B0B102049FEF746A6CE95476F265EDB89394F20483EE40AD7795C96CCD45C3A2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ceacea21dcebb2cfc2d9ebf9cad404aacf136df487ee314730267192db72fc0b
                                                    • Instruction ID: e2360bb21b48278b86e6cff1ab28e28ce001f0a33c96cff45517aad446ad68de
                                                    • Opcode Fuzzy Hash: ceacea21dcebb2cfc2d9ebf9cad404aacf136df487ee314730267192db72fc0b
                                                    • Instruction Fuzzy Hash: 2641D575E101059FDFB0AE68C48077EBBB2EB45318FA0892DD51ADB791C671EE41CB81
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a654515343f4aa7623d0ce19099cf2c4ef4228770f79cac8bfee6bbd2d98238b
                                                    • Instruction ID: 2c0ce37b340383f855129edd4b34f58c03ed41bd11d11415fc2a834f41368c79
                                                    • Opcode Fuzzy Hash: a654515343f4aa7623d0ce19099cf2c4ef4228770f79cac8bfee6bbd2d98238b
                                                    • Instruction Fuzzy Hash: 1541AF71E002098FDFB0DFA9D880AAFFBB2EB85314F50492AE11AD7650D370E955CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b2843be56d1674d339199a3655cb25f6c7120bb46cd59de52f7d32f95f8b96a0
                                                    • Instruction ID: 7ae136f9c11823f6e3feaf9623be7750b78eeb5dcc343b0fafd88f4fae86e383
                                                    • Opcode Fuzzy Hash: b2843be56d1674d339199a3655cb25f6c7120bb46cd59de52f7d32f95f8b96a0
                                                    • Instruction Fuzzy Hash: 7331AF30E102069FCB59DFA4D85869EB7B2EF89304F10852DE906E7750DB75EE46CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5742db4b4f3e8022e4b0e0e52cb7c1bc63d1dd9f5dec16fcbbdcb43a779207dd
                                                    • Instruction ID: d8bf528c89dee71da1649993e20ea51052182735772eb36b80c7399864b63fd2
                                                    • Opcode Fuzzy Hash: 5742db4b4f3e8022e4b0e0e52cb7c1bc63d1dd9f5dec16fcbbdcb43a779207dd
                                                    • Instruction Fuzzy Hash: 4B319E30E102059FCB59DFA4D85869EB7B2EF89304F208529E906E7350DB75EE42CB80
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4ab5a94ffdfea664bcfbc653bac34094c280d2a7f44bd9e3bc54af870e3aa333
                                                    • Instruction ID: c7c02ed5b0aaab940a6cb22aed7aa5828131627d86eabcbf33a9c61f06a5a454
                                                    • Opcode Fuzzy Hash: 4ab5a94ffdfea664bcfbc653bac34094c280d2a7f44bd9e3bc54af870e3aa333
                                                    • Instruction Fuzzy Hash: 86216871E00255DFDB50DFA9D840BEEBBF5AB48614F108029E909EB380E734D942CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b3632e09033ef27340c044119cc998f499258fabdb06517ee3596ff8c2310580
                                                    • Instruction ID: 91cdc38523e687db846c8bb1f8fceb4fb2771bd4e67fb68c7f448484ccf7c39b
                                                    • Opcode Fuzzy Hash: b3632e09033ef27340c044119cc998f499258fabdb06517ee3596ff8c2310580
                                                    • Instruction Fuzzy Hash: FF215AB5E00255DFDB50EFA9D880AEEB7F5EB48614F108029E919EB280E735DD42CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3254176361.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_16bd000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6b92b52fbab5710962a10dc58e2a9a0a1fa71b338081025b0a943264c5dd9e9c
                                                    • Instruction ID: bef03c6aa682306a74ccd2ee1baaf206ef7de4cdb3536fee8bd8f8fa72b94260
                                                    • Opcode Fuzzy Hash: 6b92b52fbab5710962a10dc58e2a9a0a1fa71b338081025b0a943264c5dd9e9c
                                                    • Instruction Fuzzy Hash: 9631297150E3C09FD7038B64D9A4651BF71AB47214F2985DBD8898F2A7C23A984ACB62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3254176361.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_16bd000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7b3e3d5b4d09d697e82e2ad9b6f1ccb51c25f8801f5a04a526a3b0f8ab949e4d
                                                    • Instruction ID: 9471d31db37f763110d11c7573a0b8e86643fc86c6d2c28c3dc464252d313687
                                                    • Opcode Fuzzy Hash: 7b3e3d5b4d09d697e82e2ad9b6f1ccb51c25f8801f5a04a526a3b0f8ab949e4d
                                                    • Instruction Fuzzy Hash: F8210071504204AFCB15CF68C9C0B26BB65FB84318F20C569E9490F352C73AD487CB62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ec47bc042b29c289bd3711d09d9d94e7d301e14a45e054010f8eb7ddaf73dfa2
                                                    • Instruction ID: 3f8cf4a78c931bc1b5e5cdb2c768a555171ee3a741e4bb935e9b64b35e20f156
                                                    • Opcode Fuzzy Hash: ec47bc042b29c289bd3711d09d9d94e7d301e14a45e054010f8eb7ddaf73dfa2
                                                    • Instruction Fuzzy Hash: 88219330B101089FDF94EA6AE95469EB7B6EB84314F248439D405E7341E735ED41CB95
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 63acad40109e66de54135dd7407171063564f5804550373e231fe40f53da538c
                                                    • Instruction ID: 7aa331941cdb80fe8a2acdca70e642d76910d997c47111e41473b204d18ed6ff
                                                    • Opcode Fuzzy Hash: 63acad40109e66de54135dd7407171063564f5804550373e231fe40f53da538c
                                                    • Instruction Fuzzy Hash: 6811A132B105288FDBA4EAB9CC146AE73AAEBC8714F008139C40AE7354DE75DC028BD1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0089635e2277aba6cbf15be7419d311388cd50676e4c6ae07dc6e396550d526e
                                                    • Instruction ID: 666237d9851e8eb0278ea0cf29a2b44d83f084f553a65b830412bb95e72676b2
                                                    • Opcode Fuzzy Hash: 0089635e2277aba6cbf15be7419d311388cd50676e4c6ae07dc6e396550d526e
                                                    • Instruction Fuzzy Hash: E511A571E002A48FCB68DBB5D8405DEF7B5EF88714F10956AD50AE7240DA31DA46CBD1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1eb6876fe9a33bc2fd69cf23e71a77ec870036d980b321d7c260040cdd4eb896
                                                    • Instruction ID: a86f3c82257c99a2354dfd095de4d0dc1e4b9d9921c7b01a9238801e871a7856
                                                    • Opcode Fuzzy Hash: 1eb6876fe9a33bc2fd69cf23e71a77ec870036d980b321d7c260040cdd4eb896
                                                    • Instruction Fuzzy Hash: B601F772B000110FDB65AA7CD854B6B67D6DBCA614F10493FE10AC7351DE64DE0683D1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5ca754f4e701b4bde1590285f27a26ad65a5ab1d73f3a55da4c40ca9e00eaaad
                                                    • Instruction ID: b13054cf8cbeaf8318dd69242539728c5edc701497d0fbaf28f079b40c2eff65
                                                    • Opcode Fuzzy Hash: 5ca754f4e701b4bde1590285f27a26ad65a5ab1d73f3a55da4c40ca9e00eaaad
                                                    • Instruction Fuzzy Hash: 48012831B041224FDBB596BDA808B1BB7D6EBC6318F10893EE10EC7395D959DD02C381
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ccf404c21f2f374e0e813f333ab588bfb2f740f3de03cd1b942fa03547f2933e
                                                    • Instruction ID: 6c55c4a859ec47abb1771faaf72c70bae17623f57ee9d8665e891f32f7765973
                                                    • Opcode Fuzzy Hash: ccf404c21f2f374e0e813f333ab588bfb2f740f3de03cd1b942fa03547f2933e
                                                    • Instruction Fuzzy Hash: 7411D3B5D01259AFCB10DF9AD884ADEFBB4FB48314F10812AE518A7200C378A544CFE5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: addcf3fe67cdb8df0d5b4939b3e2f666275192bb333fbd76b49068f8dcb7a43a
                                                    • Instruction ID: a31ba280e65925c7d28bd7c400800f6496303d96808cc812356765e851585a38
                                                    • Opcode Fuzzy Hash: addcf3fe67cdb8df0d5b4939b3e2f666275192bb333fbd76b49068f8dcb7a43a
                                                    • Instruction Fuzzy Hash: 7421C2B5D01259AFCB10DF9AD984ADEFBB4FB48314F10852AE918A7200C378A554CBA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d11134d9c93c620d420ad95715c8e98046138bc5be5d2252265a18f3ebda6428
                                                    • Instruction ID: 97a3e21f829fd2cd4cda412a0a17eba104b659839ce8d88d6a1a3126ebb93f60
                                                    • Opcode Fuzzy Hash: d11134d9c93c620d420ad95715c8e98046138bc5be5d2252265a18f3ebda6428
                                                    • Instruction Fuzzy Hash: E2012830B001518FD7B1ABADD804B5B77D1EB86714F10492EE04EC7791EA29DE41C740
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3948cd4bcdb148d8a12de018c76d7c9570cdd9c9b8a2150a89c6f0edf391e34a
                                                    • Instruction ID: c62ef2e763768e16ed106b53ba935e80d68e6ec277540000b6d3cdf96f265bdb
                                                    • Opcode Fuzzy Hash: 3948cd4bcdb148d8a12de018c76d7c9570cdd9c9b8a2150a89c6f0edf391e34a
                                                    • Instruction Fuzzy Hash: 9101D436B104558BEB65AA69CC107FF76AB9BC8714F00413DC40AE3390DA64CC078792
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 00a4dd02f44b4ef790d160e8af2dc1a7a885484d34db51d59323bb7c320e562e
                                                    • Instruction ID: d31406f38bc02873dc535c87ec00730312410373b2f0f2010749c32a06963def
                                                    • Opcode Fuzzy Hash: 00a4dd02f44b4ef790d160e8af2dc1a7a885484d34db51d59323bb7c320e562e
                                                    • Instruction Fuzzy Hash: E5016235B000214FDBA9A6AEA85871BB6DAEBC5615F10C83EE50EC7354D969DE028391
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 06fc0b41689929b213fa8ab4862d2a68249bf72ddd379b9ff96e7896420fedb1
                                                    • Instruction ID: 79a5747be74b9524211615fe38b8ef5bc659259a4897f12d5f6e74c83249a9ca
                                                    • Opcode Fuzzy Hash: 06fc0b41689929b213fa8ab4862d2a68249bf72ddd379b9ff96e7896420fedb1
                                                    • Instruction Fuzzy Hash: E301A471B000100FDBB5AA7DD85472F66DBDBC9615F10883EE10AC7350DE65DD0683D1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 058e697b9858aee15f499909f9f57c413b9d71f8dce9f9ac025f93c4d3ba3fd4
                                                    • Instruction ID: b5b4ef283b5b57f09e5c9fb3195c3e5c0d64951295e4ccdbdf76f0c0ae85fac1
                                                    • Opcode Fuzzy Hash: 058e697b9858aee15f499909f9f57c413b9d71f8dce9f9ac025f93c4d3ba3fd4
                                                    • Instruction Fuzzy Hash: 9E018630B001144FCB71AAADE854B5B73D6EB89615F10493DE10EC7350D915DE418781
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 19aa07ae2317092e2ae4d1bfe0d08dffbbce74e63a91273b9dc2f865cb023603
                                                    • Instruction ID: a0d4080f1133ff0ec3755314fe6dfb46d4826997a7169c92a3f2031668b46240
                                                    • Opcode Fuzzy Hash: 19aa07ae2317092e2ae4d1bfe0d08dffbbce74e63a91273b9dc2f865cb023603
                                                    • Instruction Fuzzy Hash: 7301A431E102249FCB64AF69EC40A9EB77AFB85354F00453DE905EB384DB36AD05C790
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7a851cd0d3d0900c0a48878cb58c3ee4ea1918fc63e64d4970f0434851d92d4e
                                                    • Instruction ID: 48d17c86ffba1f4f27650e61cb60965b4d69ce0cc39e65e0b03aa31cf2a8234e
                                                    • Opcode Fuzzy Hash: 7a851cd0d3d0900c0a48878cb58c3ee4ea1918fc63e64d4970f0434851d92d4e
                                                    • Instruction Fuzzy Hash: 53E04F72E251449FEF60DEB1DA1975E766A9BC121CF21C8AAD409DB242E136CE06C340
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                    • API String ID: 0-2843079600
                                                    • Opcode ID: 2eccffc23fe8f8eaba75305b57e04d2a64a61c05158811e20e124278d1158cd1
                                                    • Instruction ID: 5ae5189cc3e3bb0dc72f75c27b54af94c1a84c69586056fdf4166ba166f09987
                                                    • Opcode Fuzzy Hash: 2eccffc23fe8f8eaba75305b57e04d2a64a61c05158811e20e124278d1158cd1
                                                    • Instruction Fuzzy Hash: 43122C30E00219CFDB69EF69C994A9DB7F6FF84308F208569D409AB355EB349D85CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                    • API String ID: 0-1273862796
                                                    • Opcode ID: 4a4b52b03fdc36838a6eec5df99ac9540766d6a2beb3d76d685d3d159c969ce3
                                                    • Instruction ID: d0aa423630a8d0e9cdcf5a7245243dbac6baefbf5087bb4333aa7ce35e7826fc
                                                    • Opcode Fuzzy Hash: 4a4b52b03fdc36838a6eec5df99ac9540766d6a2beb3d76d685d3d159c969ce3
                                                    • Instruction Fuzzy Hash: 82916030A00209DFDB68EFA9D994BAEB7F6FF44308F10852AD40297295DB799D45CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                                    • API String ID: 0-981061697
                                                    • Opcode ID: ec99255ae2079ee77934848d65ca5e80562a61350bc871aca271a69b2c451f92
                                                    • Instruction ID: ac118537b937355c99cb1cd75a42ac0ac292dc43bfaf3532f904d2bdb4d8b0d4
                                                    • Opcode Fuzzy Hash: ec99255ae2079ee77934848d65ca5e80562a61350bc871aca271a69b2c451f92
                                                    • Instruction Fuzzy Hash: 86F13C30A00305CFDB69EFA5D594A6EB7B6FF84344F208568D8059B3A9DB39DC82CB51
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $]q$$]q$$]q$$]q
                                                    • API String ID: 0-858218434
                                                    • Opcode ID: 42de278d99261c2cdb8e20be4c64896868205b24db6a407b46a4d3f806edf873
                                                    • Instruction ID: 8d3b366b5ec696898cdcc802473080c416f9834fa570289e3c996057571cc4db
                                                    • Opcode Fuzzy Hash: 42de278d99261c2cdb8e20be4c64896868205b24db6a407b46a4d3f806edf873
                                                    • Instruction Fuzzy Hash: 7CB15B30A11209CFDB64EFA9C99469EB7B6FF84304F648829D406DB795DB34DD82CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: LR]q$LR]q$$]q$$]q
                                                    • API String ID: 0-3527005858
                                                    • Opcode ID: 84f4a3774dacae8907f5ac9ff8e65804d5d49c1d4f20a9615db7fd5c419940fb
                                                    • Instruction ID: cecf79b05898424f89521007197cb45d09f4b542cbce596f4ad97c28a0790bd7
                                                    • Opcode Fuzzy Hash: 84f4a3774dacae8907f5ac9ff8e65804d5d49c1d4f20a9615db7fd5c419940fb
                                                    • Instruction Fuzzy Hash: 9251D330B012019FDB68EF69D880A6AB7F6FF88708F50856DE4069B795DB35EC41CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000003.00000002.3260270086.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_3_2_6c80000_ORDER SPECIFICATION.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $]q$$]q$$]q$$]q
                                                    • API String ID: 0-858218434
                                                    • Opcode ID: 8ec29317af4f0692a68306b56fabea51c9ce72947c2c6ae2bc6349c70b5ebc79
                                                    • Instruction ID: 636f32c262da94a63b12866f2e86b030757bfff52faeb7f0e058e65d1e7922b0
                                                    • Opcode Fuzzy Hash: 8ec29317af4f0692a68306b56fabea51c9ce72947c2c6ae2bc6349c70b5ebc79
                                                    • Instruction Fuzzy Hash: AA518F30A10205DFCBB5EBA8D580AAEB3B6FB85315F14892BD805EB355DB35ED41CB90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%