Loading ...

Play interactive tourEdit tour

Windows Analysis Report order - 922 - LongWay..exe

Overview

General Information

Sample Name:order - 922 - LongWay..exe
Analysis ID:553165
MD5:b94edbaae4beeb37eaeaf525c8790cc9
SHA1:6cf025acfd20344db3fdbb718ea2e9cfcce0285a
SHA256:3cbf94c22af49ad9be152750428263c826c9b020036a0321f10f9fe2eed6ae52
Tags:agentteslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Modifies the hosts file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • order - 922 - LongWay..exe (PID: 7140 cmdline: "C:\Users\user\Desktop\order - 922 - LongWay..exe" MD5: B94EDBAAE4BEEB37EAEAF525C8790CC9)
    • order - 922 - LongWay..exe (PID: 4864 cmdline: C:\Users\user\Desktop\order - 922 - LongWay..exe MD5: B94EDBAAE4BEEB37EAEAF525C8790CC9)
    • order - 922 - LongWay..exe (PID: 6580 cmdline: C:\Users\user\Desktop\order - 922 - LongWay..exe MD5: B94EDBAAE4BEEB37EAEAF525C8790CC9)
  • tKZVPq.exe (PID: 6964 cmdline: "C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe" MD5: B94EDBAAE4BEEB37EAEAF525C8790CC9)
    • tKZVPq.exe (PID: 6872 cmdline: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe MD5: B94EDBAAE4BEEB37EAEAF525C8790CC9)
    • tKZVPq.exe (PID: 6156 cmdline: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe MD5: B94EDBAAE4BEEB37EAEAF525C8790CC9)
  • tKZVPq.exe (PID: 6172 cmdline: "C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe" MD5: B94EDBAAE4BEEB37EAEAF525C8790CC9)
    • tKZVPq.exe (PID: 6040 cmdline: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe MD5: B94EDBAAE4BEEB37EAEAF525C8790CC9)
    • tKZVPq.exe (PID: 2832 cmdline: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe MD5: B94EDBAAE4BEEB37EAEAF525C8790CC9)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "Username": "finance@demo.jeninfo.com", "Password": "%e&qapQ3oNkx", "Host": "mail.demo.jeninfo.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000A.00000002.799658380.0000000002E51000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000010.00000000.791237614.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000010.00000000.791237614.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        0000000A.00000002.799756430.0000000002E99000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          00000005.00000002.940918607.00000000029B1000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 40 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            10.2.tKZVPq.exe.3ee9a10.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              10.2.tKZVPq.exe.3ee9a10.4.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.order - 922 - LongWay..exe.2fc78a8.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                  5.0.order - 922 - LongWay..exe.400000.8.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    5.0.order - 922 - LongWay..exe.400000.8.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                      Click to see the 51 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 5.0.order - 922 - LongWay..exe.400000.4.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "finance@demo.jeninfo.com", "Password": "%e&qapQ3oNkx", "Host": "mail.demo.jeninfo.com"}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: order - 922 - LongWay..exeReversingLabs: Detection: 18%
                      Multi AV Scanner detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeReversingLabs: Detection: 18%
                      Machine Learning detection for sampleShow sources
                      Source: order - 922 - LongWay..exeJoe Sandbox ML: detected
                      Machine Learning detection for dropped fileShow sources
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeJoe Sandbox ML: detected
                      Source: 5.0.order - 922 - LongWay..exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                      Source: 5.0.order - 922 - LongWay..exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                      Source: 16.0.tKZVPq.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                      Source: 16.0.tKZVPq.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                      Source: 5.0.order - 922 - LongWay..exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                      Source: 16.2.tKZVPq.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 16.0.tKZVPq.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                      Source: 5.0.order - 922 - LongWay..exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                      Source: 16.0.tKZVPq.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                      Source: 5.0.order - 922 - LongWay..exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                      Source: 16.0.tKZVPq.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                      Source: 5.2.order - 922 - LongWay..exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: order - 922 - LongWay..exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: order - 922 - LongWay..exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: IAssemblyEn.pdb source: tKZVPq.exe, tKZVPq.exe, 0000000B.00000000.778393250.00000000001F0000.00000002.00020000.sdmp, tKZVPq.exe, 0000000F.00000000.784812010.0000000000250000.00000002.00020000.sdmp, tKZVPq.exe, 00000010.00000002.938319196.0000000000670000.00000002.00020000.sdmp, tKZVPq.exe, 00000011.00000000.796641075.0000000000230000.00000002.00020000.sdmp, tKZVPq.exe, 00000012.00000000.801051583.00000000001B0000.00000002.00020000.sdmp, order - 922 - LongWay..exe, tKZVPq.exe.5.dr

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49836 -> 103.195.185.115:587
                      Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                      Source: Joe Sandbox ViewIP Address: 103.195.185.115 103.195.185.115
                      Source: Joe Sandbox ViewIP Address: 103.195.185.115 103.195.185.115
                      Source: global trafficTCP traffic: 192.168.2.4:49836 -> 103.195.185.115:587
                      Source: global trafficTCP traffic: 192.168.2.4:49836 -> 103.195.185.115:587
                      Source: order - 922 - LongWay..exe, 00000005.00000002.940918607.00000000029B1000.00000004.00000001.sdmp, tKZVPq.exe, 00000010.00000002.940497927.0000000002BC1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: tKZVPq.exe, 00000010.00000002.940497927.0000000002BC1000.00000004.00000001.sdmpString found in binary or memory: http://BmacPT.com
                      Source: tKZVPq.exe, 00000010.00000002.940497927.0000000002BC1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: order - 922 - LongWay..exe, 00000005.00000002.942341689.0000000002D19000.00000004.00000001.sdmpString found in binary or memory: http://demo.jeninfo.com
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
                      Source: order - 922 - LongWay..exe, 00000005.00000002.942341689.0000000002D19000.00000004.00000001.sdmpString found in binary or memory: http://mail.demo.jeninfo.com
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                      Source: order - 922 - LongWay..exe, 00000005.00000002.942341689.0000000002D19000.00000004.00000001.sdmp, order - 922 - LongWay..exe, 00000005.00000003.900788964.0000000000B04000.00000004.00000001.sdmpString found in binary or memory: http://zBBI0wGzrhieBOwCO9P.net
                      Source: order - 922 - LongWay..exe, 00000000.00000002.694349037.0000000003F99000.00000004.00000001.sdmp, order - 922 - LongWay..exe, 00000005.00000000.691336460.0000000000402000.00000040.00000001.sdmp, order - 922 - LongWay..exe, 00000005.00000000.689627196.0000000000402000.00000040.00000001.sdmp, tKZVPq.exe, 0000000A.00000002.800614481.0000000003E59000.00000004.00000001.sdmp, tKZVPq.exe, 0000000F.00000002.804574549.0000000003609000.00000004.00000001.sdmp, tKZVPq.exe, 00000010.00000000.791237614.0000000000402000.00000040.00000001.sdmp, tKZVPq.exe, 00000010.00000002.937803830.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: order - 922 - LongWay..exe, 00000005.00000002.940918607.00000000029B1000.00000004.00000001.sdmp, tKZVPq.exe, 00000010.00000002.940497927.0000000002BC1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: unknownDNS traffic detected: queries for: mail.demo.jeninfo.com

                      Spam, unwanted Advertisements and Ransom Demands:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      System Summary:

                      barindex
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: order - 922 - LongWay..exe
                      .NET source code contains very large array initializationsShow sources
                      Source: 5.0.order - 922 - LongWay..exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007bC54C654Du002d1F0Bu002d446Bu002dAC5Du002d65F74970AA45u007d/B2F568B2u002d973Eu002d45AEu002dA54Fu002d2E80459E8E64.csLarge array initialization: .cctor: array initializer size 11940
                      Source: 5.0.order - 922 - LongWay..exe.400000.8.unpack, u003cPrivateImplementationDetailsu003eu007bC54C654Du002d1F0Bu002d446Bu002dAC5Du002d65F74970AA45u007d/B2F568B2u002d973Eu002d45AEu002dA54Fu002d2E80459E8E64.csLarge array initialization: .cctor: array initializer size 11940
                      Source: order - 922 - LongWay..exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 0_2_0154C9740_2_0154C974
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 0_2_0154EDB80_2_0154EDB8
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 0_2_0154EDA80_2_0154EDA8
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 0_2_075E2A980_2_075E2A98
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 0_2_075EC0780_2_075EC078
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00BA11E25_2_00BA11E2
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00BA11405_2_00BA1140
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00BA9BF05_2_00BA9BF0
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00BA5D385_2_00BA5D38
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00BA64795_2_00BA6479
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00BA65785_2_00BA6578
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00C071005_2_00C07100
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00C059E05_2_00C059E0
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00C0BC685_2_00C0BC68
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00C847A05_2_00C847A0
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00C83CCC5_2_00C83CCC
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00C847905_2_00C84790
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00C847725_2_00C84772
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00C854905_2_00C85490
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_0140C97410_2_0140C974
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_0140EDB310_2_0140EDB3
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_0140EDB810_2_0140EDB8
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_08A72A9810_2_08A72A98
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_08A7BEFC10_2_08A7BEFC
                      Source: order - 922 - LongWay..exeBinary or memory string: OriginalFilename vs order - 922 - LongWay..exe
                      Source: order - 922 - LongWay..exe, 00000000.00000002.694349037.0000000003F99000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFyKnTqyFcfLHrgHTrTGrmHWnBuhJPDMQ.exe4 vs order - 922 - LongWay..exe
                      Source: order - 922 - LongWay..exe, 00000000.00000002.694349037.0000000003F99000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dllF vs order - 922 - LongWay..exe
                      Source: order - 922 - LongWay..exe, 00000000.00000002.692736168.0000000000B60000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIAssemblyEn.exe0 vs order - 922 - LongWay..exe
                      Source: order - 922 - LongWay..exe, 00000000.00000002.693824370.0000000002F91000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameFyKnTqyFcfLHrgHTrTGrmHWnBuhJPDMQ.exe4 vs order - 922 - LongWay..exe
                      Source: order - 922 - LongWay..exe, 00000000.00000002.697257201.0000000007460000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs order - 922 - LongWay..exe
                      Source: order - 922 - LongWay..exeBinary or memory string: OriginalFilename vs order - 922 - LongWay..exe
                      Source: order - 922 - LongWay..exe, 00000004.00000000.684955126.0000000000130000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIAssemblyEn.exe0 vs order - 922 - LongWay..exe
                      Source: order - 922 - LongWay..exeBinary or memory string: OriginalFilename vs order - 922 - LongWay..exe
                      Source: order - 922 - LongWay..exe, 00000005.00000000.687068836.00000000004E0000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIAssemblyEn.exe0 vs order - 922 - LongWay..exe
                      Source: order - 922 - LongWay..exe, 00000005.00000000.691336460.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameFyKnTqyFcfLHrgHTrTGrmHWnBuhJPDMQ.exe4 vs order - 922 - LongWay..exe
                      Source: order - 922 - LongWay..exe, 00000005.00000002.938235618.00000000008F8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs order - 922 - LongWay..exe
                      Source: order - 922 - LongWay..exe, 00000005.00000002.939413626.0000000000CAA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs order - 922 - LongWay..exe
                      Source: order - 922 - LongWay..exeBinary or memory string: OriginalFilenameIAssemblyEn.exe0 vs order - 922 - LongWay..exe
                      Source: order - 922 - LongWay..exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: tKZVPq.exe.5.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: order - 922 - LongWay..exeReversingLabs: Detection: 18%
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile read: C:\Users\user\Desktop\order - 922 - LongWay..exeJump to behavior
                      Source: order - 922 - LongWay..exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\order - 922 - LongWay..exe "C:\Users\user\Desktop\order - 922 - LongWay..exe"
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess created: C:\Users\user\Desktop\order - 922 - LongWay..exe C:\Users\user\Desktop\order - 922 - LongWay..exe
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess created: C:\Users\user\Desktop\order - 922 - LongWay..exe C:\Users\user\Desktop\order - 922 - LongWay..exe
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe "C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe"
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe "C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe"
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess created: C:\Users\user\Desktop\order - 922 - LongWay..exe C:\Users\user\Desktop\order - 922 - LongWay..exeJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess created: C:\Users\user\Desktop\order - 922 - LongWay..exe C:\Users\user\Desktop\order - 922 - LongWay..exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\order - 922 - LongWay..exe.logJump to behavior
                      Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@15/5@2/1
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: 5.0.order - 922 - LongWay..exe.400000.4.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 5.0.order - 922 - LongWay..exe.400000.4.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 5.0.order - 922 - LongWay..exe.400000.8.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 5.0.order - 922 - LongWay..exe.400000.8.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: order - 922 - LongWay..exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: order - 922 - LongWay..exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: order - 922 - LongWay..exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: IAssemblyEn.pdb source: tKZVPq.exe, tKZVPq.exe, 0000000B.00000000.778393250.00000000001F0000.00000002.00020000.sdmp, tKZVPq.exe, 0000000F.00000000.784812010.0000000000250000.00000002.00020000.sdmp, tKZVPq.exe, 00000010.00000002.938319196.0000000000670000.00000002.00020000.sdmp, tKZVPq.exe, 00000011.00000000.796641075.0000000000230000.00000002.00020000.sdmp, tKZVPq.exe, 00000012.00000000.801051583.00000000001B0000.00000002.00020000.sdmp, order - 922 - LongWay..exe, tKZVPq.exe.5.dr

                      Data Obfuscation:

                      barindex
                      .NET source code contains potential unpackerShow sources
                      Source: order - 922 - LongWay..exe, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 0.0.order - 922 - LongWay..exe.b50000.0.unpack, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 0.2.order - 922 - LongWay..exe.b50000.0.unpack, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 4.2.order - 922 - LongWay..exe.120000.0.unpack, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 4.0.order - 922 - LongWay..exe.120000.1.unpack, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 4.0.order - 922 - LongWay..exe.120000.3.unpack, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 4.0.order - 922 - LongWay..exe.120000.0.unpack, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 4.0.order - 922 - LongWay..exe.120000.2.unpack, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: tKZVPq.exe.5.dr, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 5.2.order - 922 - LongWay..exe.4d0000.1.unpack, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 5.0.order - 922 - LongWay..exe.4d0000.11.unpack, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 5.0.order - 922 - LongWay..exe.4d0000.3.unpack, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 5.0.order - 922 - LongWay..exe.4d0000.5.unpack, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 5.0.order - 922 - LongWay..exe.4d0000.0.unpack, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 5.0.order - 922 - LongWay..exe.4d0000.7.unpack, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 5.0.order - 922 - LongWay..exe.4d0000.2.unpack, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 5.0.order - 922 - LongWay..exe.4d0000.1.unpack, aL/Jj.cs.Net Code: GR System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      .NET source code contains method to dynamically call methods (often used by packers)Show sources
                      Source: order - 922 - LongWay..exe, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: 0.0.order - 922 - LongWay..exe.b50000.0.unpack, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: 0.2.order - 922 - LongWay..exe.b50000.0.unpack, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: 4.2.order - 922 - LongWay..exe.120000.0.unpack, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: 4.0.order - 922 - LongWay..exe.120000.1.unpack, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: 4.0.order - 922 - LongWay..exe.120000.3.unpack, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: 4.0.order - 922 - LongWay..exe.120000.0.unpack, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: 4.0.order - 922 - LongWay..exe.120000.2.unpack, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: tKZVPq.exe.5.dr, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: 5.2.order - 922 - LongWay..exe.4d0000.1.unpack, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: 5.0.order - 922 - LongWay..exe.4d0000.11.unpack, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: 5.0.order - 922 - LongWay..exe.4d0000.3.unpack, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: 5.0.order - 922 - LongWay..exe.4d0000.5.unpack, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: 5.0.order - 922 - LongWay..exe.4d0000.0.unpack, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: 5.0.order - 922 - LongWay..exe.4d0000.7.unpack, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: 5.0.order - 922 - LongWay..exe.4d0000.2.unpack, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: 5.0.order - 922 - LongWay..exe.4d0000.1.unpack, aL/Jj.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", stackVariable470, null, null)
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00C86B2F push ebx; retn 0000h5_2_00C86B3A
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_0140400B push edi; iretd 10_2_01404012
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_01409268 pushfd ; iretd 10_2_014094BA
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_014094BB pushfd ; iretd 10_2_014094C2
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeCode function: 10_2_01403F11 push ebx; iretd 10_2_01403F12
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.23077923156
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.23077923156
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeJump to dropped file
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run tKZVPqJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run tKZVPqJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile opened: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 0.2.order - 922 - LongWay..exe.2fc78a8.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.2e878a4.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.2e7f898.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.tKZVPq.exe.26378a4.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.order - 922 - LongWay..exe.2fbf89c.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.order - 922 - LongWay..exe.3006700.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.tKZVPq.exe.262f898.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.2ec66f0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000002.799658380.0000000002E51000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.799756430.0000000002E99000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.693824370.0000000002F91000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.693874329.0000000002FD9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.803757871.0000000002601000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: order - 922 - LongWay..exe PID: 7140, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6964, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6172, type: MEMORYSTR
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: order - 922 - LongWay..exe, 00000000.00000002.693874329.0000000002FD9000.00000004.00000001.sdmp, order - 922 - LongWay..exe, 00000000.00000002.693824370.0000000002F91000.00000004.00000001.sdmp, tKZVPq.exe, 0000000A.00000002.799658380.0000000002E51000.00000004.00000001.sdmp, tKZVPq.exe, 0000000A.00000002.799756430.0000000002E99000.00000004.00000001.sdmp, tKZVPq.exe, 0000000F.00000002.803757871.0000000002601000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: order - 922 - LongWay..exe, 00000000.00000002.693874329.0000000002FD9000.00000004.00000001.sdmp, order - 922 - LongWay..exe, 00000000.00000002.693824370.0000000002F91000.00000004.00000001.sdmp, tKZVPq.exe, 0000000A.00000002.799658380.0000000002E51000.00000004.00000001.sdmp, tKZVPq.exe, 0000000A.00000002.799756430.0000000002E99000.00000004.00000001.sdmp, tKZVPq.exe, 0000000F.00000002.803757871.0000000002601000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exe TID: 7144Thread sleep time: -37263s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exe TID: 2224Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exe TID: 4344Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exe TID: 6664Thread sleep count: 1671 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exe TID: 6664Thread sleep count: 8176 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 6848Thread sleep time: -33761s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 7012Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 6164Thread sleep time: -39612s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 5468Thread sleep time: -17524406870024063s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 5332Thread sleep count: 7200 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe TID: 5332Thread sleep count: 2650 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeWindow / User API: threadDelayed 1671Jump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeWindow / User API: threadDelayed 8176Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWindow / User API: threadDelayed 7200Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWindow / User API: threadDelayed 2650Jump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeThread delayed: delay time: 37263Jump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 33761Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 39612Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: tKZVPq.exe, 0000000F.00000002.803757871.0000000002601000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
                      Source: tKZVPq.exe, 0000000F.00000002.803757871.0000000002601000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: tKZVPq.exe, 0000000F.00000002.803757871.0000000002601000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: order - 922 - LongWay..exe, 00000005.00000002.939551842.0000000000D1D000.00000004.00000020.sdmp, order - 922 - LongWay..exe, 00000005.00000003.930537502.0000000000D65000.00000004.00000001.sdmp, order - 922 - LongWay..exe, 00000005.00000003.930391489.0000000000D65000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: tKZVPq.exe, 0000000F.00000002.803757871.0000000002601000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeCode function: 5_2_00BAB158 LdrInitializeThunk,5_2_00BAB158
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeMemory written: C:\Users\user\Desktop\order - 922 - LongWay..exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeMemory written: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess created: C:\Users\user\Desktop\order - 922 - LongWay..exe C:\Users\user\Desktop\order - 922 - LongWay..exeJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeProcess created: C:\Users\user\Desktop\order - 922 - LongWay..exe C:\Users\user\Desktop\order - 922 - LongWay..exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeProcess created: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeJump to behavior
                      Source: order - 922 - LongWay..exe, 00000005.00000002.940159154.0000000001300000.00000002.00020000.sdmp, tKZVPq.exe, 00000010.00000002.939940128.00000000015D0000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: order - 922 - LongWay..exe, 00000005.00000002.940159154.0000000001300000.00000002.00020000.sdmp, tKZVPq.exe, 00000010.00000002.939940128.00000000015D0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: order - 922 - LongWay..exe, 00000005.00000002.940159154.0000000001300000.00000002.00020000.sdmp, tKZVPq.exe, 00000010.00000002.939940128.00000000015D0000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: order - 922 - LongWay..exe, 00000005.00000002.940159154.0000000001300000.00000002.00020000.sdmp, tKZVPq.exe, 00000010.00000002.939940128.00000000015D0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Users\user\Desktop\order - 922 - LongWay..exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Users\user\Desktop\order - 922 - LongWay..exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Lowering of HIPS / PFW / Operating System Security Settings:

                      barindex
                      Modifies the hosts fileShow sources
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.3ee9a10.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.order - 922 - LongWay..exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.order - 922 - LongWay..exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.0.tKZVPq.exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.tKZVPq.exe.36637f0.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.0.tKZVPq.exe.400000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.order - 922 - LongWay..exe.3ff37f0.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.order - 922 - LongWay..exe.4029a10.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.tKZVPq.exe.3699a10.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.3eb37f0.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.tKZVPq.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.0.tKZVPq.exe.400000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.order - 922 - LongWay..exe.400000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.order - 922 - LongWay..exe.400000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.0.tKZVPq.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.order - 922 - LongWay..exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.0.tKZVPq.exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.order - 922 - LongWay..exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.3ee9a10.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.tKZVPq.exe.3699a10.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.tKZVPq.exe.36637f0.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.order - 922 - LongWay..exe.3ff37f0.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.3eb37f0.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.order - 922 - LongWay..exe.4029a10.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000010.00000000.791237614.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.691336460.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.937803830.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000000.792245858.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.690833307.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.694349037.0000000003F99000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000000.794380276.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.937763339.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000000.793098302.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.690098955.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.800614481.0000000003E59000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.689627196.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.804574549.0000000003609000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.940918607.00000000029B1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.940497927.0000000002BC1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: order - 922 - LongWay..exe PID: 7140, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: order - 922 - LongWay..exe PID: 6580, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6964, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6172, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6156, type: MEMORYSTR
                      Tries to steal Mail credentials (via file / registry access)Show sources
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\order - 922 - LongWay..exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: Yara matchFile source: 00000005.00000002.940918607.00000000029B1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.940497927.0000000002BC1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: order - 922 - LongWay..exe PID: 6580, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6156, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.3ee9a10.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.order - 922 - LongWay..exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.order - 922 - LongWay..exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.0.tKZVPq.exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.tKZVPq.exe.36637f0.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.0.tKZVPq.exe.400000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.order - 922 - LongWay..exe.3ff37f0.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.order - 922 - LongWay..exe.4029a10.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.tKZVPq.exe.3699a10.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.3eb37f0.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.2.tKZVPq.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.0.tKZVPq.exe.400000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.order - 922 - LongWay..exe.400000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.order - 922 - LongWay..exe.400000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.0.tKZVPq.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.order - 922 - LongWay..exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 16.0.tKZVPq.exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.order - 922 - LongWay..exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.3ee9a10.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.tKZVPq.exe.3699a10.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.tKZVPq.exe.36637f0.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.order - 922 - LongWay..exe.3ff37f0.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.tKZVPq.exe.3eb37f0.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.order - 922 - LongWay..exe.4029a10.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000010.00000000.791237614.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.691336460.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.937803830.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000000.792245858.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.690833307.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.694349037.0000000003F99000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000000.794380276.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.937763339.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000000.793098302.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.690098955.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.800614481.0000000003E59000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.689627196.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.804574549.0000000003609000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.940918607.00000000029B1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.940497927.0000000002BC1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: order - 922 - LongWay..exe PID: 7140, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: order - 922 - LongWay..exe PID: 6580, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6964, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6172, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: tKZVPq.exe PID: 6156, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Registry Run Keys / Startup Folder1Process Injection112File and Directory Permissions Modification1OS Credential Dumping2System Information Discovery114Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Disable or Modify Tools1Credentials in Registry1Query Registry1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Deobfuscate/Decode Files or Information1Security Account ManagerSecurity Software Discovery311SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing23LSA SecretsVirtualization/Sandbox Evasion131SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading1Cached Domain CredentialsApplication Window Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion131DCSyncRemote System Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection112Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 553165 Sample: order - 922 - LongWay..exe Startdate: 14/01/2022 Architecture: WINDOWS Score: 100 49 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->49 51 Found malware configuration 2->51 53 Multi AV Scanner detection for submitted file 2->53 55 10 other signatures 2->55 6 order - 922 - LongWay..exe 3 2->6         started        10 tKZVPq.exe 3 2->10         started        12 tKZVPq.exe 2 2->12         started        process3 file4 29 C:\Users\...\order - 922 - LongWay..exe.log, ASCII 6->29 dropped 57 Injects a PE file into a foreign processes 6->57 14 order - 922 - LongWay..exe 2 5 6->14         started        19 order - 922 - LongWay..exe 6->19         started        59 Multi AV Scanner detection for dropped file 10->59 61 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 10->61 63 Machine Learning detection for dropped file 10->63 65 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 10->65 21 tKZVPq.exe 2 10->21         started        23 tKZVPq.exe 10->23         started        25 tKZVPq.exe 12->25         started        27 tKZVPq.exe 12->27         started        signatures5 process6 dnsIp7 37 demo.jeninfo.com 103.195.185.115, 49836, 587 PUBLIC-DOMAIN-REGISTRYUS India 14->37 39 mail.demo.jeninfo.com 14->39 31 C:\Users\user\AppData\Roaming\...\tKZVPq.exe, PE32 14->31 dropped 33 C:\Windows\System32\drivers\etc\hosts, ASCII 14->33 dropped 35 C:\Users\user\...\tKZVPq.exe:Zone.Identifier, ASCII 14->35 dropped 41 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->41 43 Tries to steal Mail credentials (via file / registry access) 14->43 45 Tries to harvest and steal ftp login credentials 14->45 47 3 other signatures 14->47 file8 signatures9

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      order - 922 - LongWay..exe19%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      order - 922 - LongWay..exe100%Joe Sandbox ML

                      Dropped Files

                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe19%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      5.0.order - 922 - LongWay..exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                      5.0.order - 922 - LongWay..exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                      16.0.tKZVPq.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                      16.0.tKZVPq.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                      5.0.order - 922 - LongWay..exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                      16.2.tKZVPq.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      16.0.tKZVPq.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                      5.0.order - 922 - LongWay..exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                      16.0.tKZVPq.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                      5.0.order - 922 - LongWay..exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                      16.0.tKZVPq.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                      5.2.order - 922 - LongWay..exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://BmacPT.com0%Avira URL Cloudsafe
                      http://www.tiro.com0%URL Reputationsafe
                      http://www.goodfont.co.kr0%URL Reputationsafe
                      http://demo.jeninfo.com0%Avira URL Cloudsafe
                      http://www.carterandcone.coml0%URL Reputationsafe
                      http://www.sajatypeworks.com0%URL Reputationsafe
                      http://www.typography.netD0%URL Reputationsafe
                      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                      http://fontfabrik.com0%URL Reputationsafe
                      http://www.founder.com.cn/cn0%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                      http://mail.demo.jeninfo.com0%Avira URL Cloudsafe
                      http://www.sandoll.co.kr0%URL Reputationsafe
                      http://www.urwpp.deDPlease0%URL Reputationsafe
                      http://www.zhongyicts.com.cn0%URL Reputationsafe
                      http://www.sakkal.com0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://zBBI0wGzrhieBOwCO9P.net0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      demo.jeninfo.com
                      103.195.185.115
                      truetrue
                        unknown
                        mail.demo.jeninfo.com
                        unknown
                        unknowntrue
                          unknown

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://127.0.0.1:HTTP/1.1order - 922 - LongWay..exe, 00000005.00000002.940918607.00000000029B1000.00000004.00000001.sdmp, tKZVPq.exe, 00000010.00000002.940497927.0000000002BC1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://www.apache.org/licenses/LICENSE-2.0order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                            high
                            http://www.fontbureau.comorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                              high
                              http://www.fontbureau.com/designersGorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                high
                                http://DynDns.comDynDNStKZVPq.exe, 00000010.00000002.940497927.0000000002BC1000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/?order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/bTheorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haorder - 922 - LongWay..exe, 00000005.00000002.940918607.00000000029B1000.00000004.00000001.sdmp, tKZVPq.exe, 00000010.00000002.940497927.0000000002BC1000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://BmacPT.comtKZVPq.exe, 00000010.00000002.940497927.0000000002BC1000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.com/designers?order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.tiro.comorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designersorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.goodfont.co.krorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://demo.jeninfo.comorder - 922 - LongWay..exe, 00000005.00000002.942341689.0000000002D19000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.carterandcone.comlorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sajatypeworks.comorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.typography.netDorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/cabarga.htmlNorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.founder.com.cn/cn/cTheorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.galapagosdesign.com/staff/dennis.htmorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://fontfabrik.comorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cnorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/frere-user.htmlorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.jiyu-kobo.co.jp/order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.galapagosdesign.com/DPleaseorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers8order - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                            high
                                            http://mail.demo.jeninfo.comorder - 922 - LongWay..exe, 00000005.00000002.942341689.0000000002D19000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fonts.comorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.sandoll.co.krorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.urwpp.deDPleaseorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.zhongyicts.com.cnorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.sakkal.comorder - 922 - LongWay..exe, 00000000.00000002.697060424.0000000007082000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziporder - 922 - LongWay..exe, 00000000.00000002.694349037.0000000003F99000.00000004.00000001.sdmp, order - 922 - LongWay..exe, 00000005.00000000.691336460.0000000000402000.00000040.00000001.sdmp, order - 922 - LongWay..exe, 00000005.00000000.689627196.0000000000402000.00000040.00000001.sdmp, tKZVPq.exe, 0000000A.00000002.800614481.0000000003E59000.00000004.00000001.sdmp, tKZVPq.exe, 0000000F.00000002.804574549.0000000003609000.00000004.00000001.sdmp, tKZVPq.exe, 00000010.00000000.791237614.0000000000402000.00000040.00000001.sdmp, tKZVPq.exe, 00000010.00000002.937803830.0000000000402000.00000040.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://zBBI0wGzrhieBOwCO9P.netorder - 922 - LongWay..exe, 00000005.00000002.942341689.0000000002D19000.00000004.00000001.sdmp, order - 922 - LongWay..exe, 00000005.00000003.900788964.0000000000B04000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown

                                              Contacted IPs

                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs

                                              Public

                                              IPDomainCountryFlagASNASN NameMalicious
                                              103.195.185.115
                                              demo.jeninfo.comIndia
                                              394695PUBLIC-DOMAIN-REGISTRYUStrue

                                              General Information

                                              Joe Sandbox Version:34.0.0 Boulder Opal
                                              Analysis ID:553165
                                              Start date:14.01.2022
                                              Start time:12:20:20
                                              Joe Sandbox Product:CloudBasic
                                              Overall analysis duration:0h 12m 36s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Sample file name:order - 922 - LongWay..exe
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                              Number of analysed new started processes analysed:23
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • HDC enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Detection:MAL
                                              Classification:mal100.troj.adwa.spyw.evad.winEXE@15/5@2/1
                                              EGA Information:
                                              • Successful, ratio: 60%
                                              HDC Information:Failed
                                              HCA Information:
                                              • Successful, ratio: 99%
                                              • Number of executed functions: 86
                                              • Number of non-executed functions: 5
                                              Cookbook Comments:
                                              • Adjust boot time
                                              • Enable AMSI
                                              • Found application associated with file extension: .exe
                                              Warnings:
                                              Show All
                                              • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                              • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, store-images.s-microsoft.com, s-ring.msedge.net, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, teams-ring.msedge.net, arc.msn.com, t-ring.msedge.net
                                              • Execution Graph export aborted for target order - 922 - LongWay..exe, PID 4864 because there are no executed function
                                              • Execution Graph export aborted for target tKZVPq.exe, PID 6872 because there are no executed function
                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • VT rate limit hit for: order - 922 - LongWay..exe

                                              Simulations

                                              Behavior and APIs

                                              TimeTypeDescription
                                              12:21:26API Interceptor721x Sleep call for process: order - 922 - LongWay..exe modified
                                              12:21:57AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run tKZVPq C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                              12:22:05AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run tKZVPq C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                              12:22:08API Interceptor365x Sleep call for process: tKZVPq.exe modified

                                              Joe Sandbox View / Context

                                              IPs

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              103.195.185.115http://pimpackaging.com/js/505.htmGet hashmaliciousBrowse
                                              • pimpackaging.com/js/favicon.ico
                                              14_output76EEB60.exeGet hashmaliciousBrowse
                                              • tikonainternetservices.co.in/assets/img/png/evif/fre.php
                                              56_outputFAF073F.exeGet hashmaliciousBrowse
                                              • tikonainternetservices.co.in/assets/img/png/evif/fre.php
                                              1jjjjjj_output513A770.exeGet hashmaliciousBrowse
                                              • tikonainternetservices.co.in/assets/img/png/evif/fre.php
                                              15rm_outputA1B309F.exeGet hashmaliciousBrowse
                                              • tikonainternetservices.co.in/assets/img/png/evif/fre.php
                                              http://www.wahathalwancontracting.com/Rechnungen/012019Get hashmaliciousBrowse
                                              • www.wahathalwancontracting.com/Rechnungen/012019/

                                              Domains

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                                              ASN

                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              PUBLIC-DOMAIN-REGISTRYUS14073.pdf.exeGet hashmaliciousBrowse
                                              • 208.91.199.224
                                              MSC INVOICE.exeGet hashmaliciousBrowse
                                              • 208.91.199.225
                                              Purchase order. pdf...............exeGet hashmaliciousBrowse
                                              • 204.11.58.87
                                              ihJ4eSV1of.exeGet hashmaliciousBrowse
                                              • 199.79.62.173
                                              2m8MSMXDrk.exeGet hashmaliciousBrowse
                                              • 208.91.199.223
                                              5ran1YfzyG.exeGet hashmaliciousBrowse
                                              • 208.91.198.143
                                              Order.exeGet hashmaliciousBrowse
                                              • 208.91.198.143
                                              MSC INVOICE.xlsxGet hashmaliciousBrowse
                                              • 208.91.198.143
                                              PAYMENT.exeGet hashmaliciousBrowse
                                              • 208.91.199.233
                                              epda.exeGet hashmaliciousBrowse
                                              • 162.251.85.134
                                              Inquiry No- SEUAD31501TE9.xlsxGet hashmaliciousBrowse
                                              • 208.91.199.224
                                              Bank Copy.exeGet hashmaliciousBrowse
                                              • 208.91.199.223
                                              DHL 7538822557.exeGet hashmaliciousBrowse
                                              • 208.91.199.224
                                              DHL 7594848433.exeGet hashmaliciousBrowse
                                              • 208.91.199.223
                                              EPDA.exeGet hashmaliciousBrowse
                                              • 162.251.85.134
                                              PO#1100010378.exeGet hashmaliciousBrowse
                                              • 208.91.198.143
                                              DEBIT NOTE.exeGet hashmaliciousBrowse
                                              • 162.251.85.134
                                              SWIFT COPY.exeGet hashmaliciousBrowse
                                              • 208.91.199.233
                                              val-1340258608.xlsbGet hashmaliciousBrowse
                                              • 119.18.58.80
                                              val-1340258608.xlsbGet hashmaliciousBrowse
                                              • 119.18.58.80

                                              JA3 Fingerprints

                                              No context

                                              Dropped Files

                                              No context

                                              Created / dropped Files

                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\order - 922 - LongWay..exe.log
                                              Process:C:\Users\user\Desktop\order - 922 - LongWay..exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1310
                                              Entropy (8bit):5.345651901398759
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x847mE4P:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzQ
                                              MD5:A9EFF9253CAF99EC8665E41D736DDAED
                                              SHA1:D95BB4ABC856D774DA4602A59DE252B4BF560530
                                              SHA-256:DBC637B33F1F3CD1AB40AFED23F94C4571CA43621EBB52C5DC267DBDC52D4783
                                              SHA-512:96B67A84B750589BDB758224641065919F34BBF02BB286B9F5D566B48965A0E38FB88308B61351A6E11C46B76BFEC370FBC8B978A9F0F07A847567172D5CA5F3
                                              Malicious:true
                                              Reputation:moderate, very likely benign file
                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tKZVPq.exe.log
                                              Process:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1310
                                              Entropy (8bit):5.345651901398759
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x847mE4P:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzQ
                                              MD5:A9EFF9253CAF99EC8665E41D736DDAED
                                              SHA1:D95BB4ABC856D774DA4602A59DE252B4BF560530
                                              SHA-256:DBC637B33F1F3CD1AB40AFED23F94C4571CA43621EBB52C5DC267DBDC52D4783
                                              SHA-512:96B67A84B750589BDB758224641065919F34BBF02BB286B9F5D566B48965A0E38FB88308B61351A6E11C46B76BFEC370FBC8B978A9F0F07A847567172D5CA5F3
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                              C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                              Process:C:\Users\user\Desktop\order - 922 - LongWay..exe
                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):588800
                                              Entropy (8bit):7.220864968798315
                                              Encrypted:false
                                              SSDEEP:12288:cK777777777777N7WPHwXeuJov4caKgoYI2sGWJgzQ+5zFinIuv0gq:cK777777777777lWNqovPaKgoYOfe95E
                                              MD5:B94EDBAAE4BEEB37EAEAF525C8790CC9
                                              SHA1:6CF025ACFD20344DB3FDBB718EA2E9CFCCE0285A
                                              SHA-256:3CBF94C22AF49AD9BE152750428263C826C9B020036A0321F10F9FE2EED6AE52
                                              SHA-512:DBADA1291A160B5A74ABD861E422FC247A5641139E639F4BF25269785EF09DDA03B6DFF0DE673078E1B8856474E7F8363964F83F05E0B9DA443BE2E516348D45
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 19%
                                              Reputation:low
                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.a................................. ... ....@.. .......................`............@.................................p...K.... .......................@......'................................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H.......\f..........E.......+{............................................{....*"..}....*.....{....*"..}....*.....{....*"..}....*.....{....*"..}....*.....{....*"..}....*....0.......... ........8.....9.... ....(....:....8....8....r...p.. ....8......(..... ........8.....(..... ........8....8....r...p.(...... ........8a.....(....9.... ........8G...8U...rC..p.(...... ........8'...85...rw..p.(...... ........8.....(.......(....:.... ........8....r...p.(.......(....:....~....8.....(
                                              C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe:Zone.Identifier
                                              Process:C:\Users\user\Desktop\order - 922 - LongWay..exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):26
                                              Entropy (8bit):3.95006375643621
                                              Encrypted:false
                                              SSDEEP:3:ggPYV:rPYV
                                              MD5:187F488E27DB4AF347237FE461A079AD
                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview: [ZoneTransfer]....ZoneId=0
                                              C:\Windows\System32\drivers\etc\hosts
                                              Process:C:\Users\user\Desktop\order - 922 - LongWay..exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):846
                                              Entropy (8bit):4.712383132025728
                                              Encrypted:false
                                              SSDEEP:24:QWDZh+ragzMZfuMMs1L/JU5fFCkK8T1rTt8:vDZhyoZWM9rU5fFcB
                                              MD5:5B2D17233558878A82EE464D04F58B59
                                              SHA1:47EBFFCAD0B4C358DF0D6A06EF335CB6AAB0AB20
                                              SHA-256:5B036588BB4CAD3DE01DD04988AF705DA135D9F394755080CF9941444C09A542
                                              SHA-512:D2AEC9779EB8803514213A8E396B2F7C0B4A6F57DE1EE84E9DB0343EE5FF093E26BB70E0737A6681E21E88898EF5139969FF0B4B700CB6727979BD898FDBC85B
                                              Malicious:true
                                              Reputation:moderate, very likely benign file
                                              Preview: # Copyright (c) 1993-2009 Microsoft Corp...#..# This is a sample HOSTS file used by Microsoft TCP/IP for Windows...#..# This file contains the mappings of IP addresses to host names. Each..# entry should be kept on an individual line. The IP address should..# be placed in the first column followed by the corresponding host name...# The IP address and the host name should be separated by at least one..# space...#..# Additionally, comments (such as these) may be inserted on individual..# lines or following the machine name denoted by a '#' symbol...#..# For example:..#..# 102.54.94.97 rhino.acme.com # source server..# 38.25.63.10 x.acme.com # x client host....# localhost name resolution is handled within DNS itself...#.127.0.0.1 localhost..#.::1 localhost....127.0.0.1..127.0.0.1

                                              Static File Info

                                              General

                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):7.220864968798315
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              • DOS Executable Generic (2002/1) 0.01%
                                              File name:order - 922 - LongWay..exe
                                              File size:588800
                                              MD5:b94edbaae4beeb37eaeaf525c8790cc9
                                              SHA1:6cf025acfd20344db3fdbb718ea2e9cfcce0285a
                                              SHA256:3cbf94c22af49ad9be152750428263c826c9b020036a0321f10f9fe2eed6ae52
                                              SHA512:dbada1291a160b5a74abd861e422fc247a5641139e639f4bf25269785ef09dda03b6dff0de673078e1b8856474e7f8363964f83f05e0b9da443be2e516348d45
                                              SSDEEP:12288:cK777777777777N7WPHwXeuJov4caKgoYI2sGWJgzQ+5zFinIuv0gq:cK777777777777lWNqovPaKgoYOfe95E
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.a................................. ... ....@.. .......................`............@................................

                                              File Icon

                                              Icon Hash:00828e8e8686b000

                                              Static PE Info

                                              General

                                              Entrypoint:0x4910be
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                              Time Stamp:0x61E136E4 [Fri Jan 14 08:40:04 2022 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:v4.0.30319
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                              Entrypoint Preview

                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al

                                              Data Directories

                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x910700x4b.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x920000x5d4.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x940000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x910270x1c.text
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                              Sections

                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000x8f0c40x8f200False0.754344637009data7.23077923156IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                              .rsrc0x920000x5d40x600False0.432291666667data4.15450499836IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x940000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                              Resources

                                              NameRVASizeTypeLanguageCountry
                                              RT_VERSION0x920a00x346data
                                              RT_MANIFEST0x923e80x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                              Imports

                                              DLLImport
                                              mscoree.dll_CorExeMain

                                              Version Infos

                                              DescriptionData
                                              Translation0x0000 0x04b0
                                              LegalCopyright2022 Tradewell
                                              Assembly Version22.0.0.0
                                              InternalNameIAssemblyEn.exe
                                              FileVersion1.1.0.0
                                              CompanyNameTradewell ltd
                                              LegalTrademarks
                                              CommentsPurple Org
                                              ProductNameBlaster
                                              ProductVersion1.1.0.0
                                              FileDescriptionBlaster
                                              OriginalFilenameIAssemblyEn.exe

                                              Network Behavior

                                              Snort IDS Alerts

                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                              01/14/22-12:23:21.061423TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49836587192.168.2.4103.195.185.115

                                              Network Port Distribution

                                              TCP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 14, 2022 12:23:17.543920994 CET49836587192.168.2.4103.195.185.115
                                              Jan 14, 2022 12:23:17.686952114 CET58749836103.195.185.115192.168.2.4
                                              Jan 14, 2022 12:23:17.687144041 CET49836587192.168.2.4103.195.185.115
                                              Jan 14, 2022 12:23:19.413824081 CET58749836103.195.185.115192.168.2.4
                                              Jan 14, 2022 12:23:19.414210081 CET49836587192.168.2.4103.195.185.115
                                              Jan 14, 2022 12:23:19.559987068 CET58749836103.195.185.115192.168.2.4
                                              Jan 14, 2022 12:23:19.560966015 CET49836587192.168.2.4103.195.185.115
                                              Jan 14, 2022 12:23:19.704035044 CET58749836103.195.185.115192.168.2.4
                                              Jan 14, 2022 12:23:19.704602957 CET49836587192.168.2.4103.195.185.115
                                              Jan 14, 2022 12:23:19.887617111 CET58749836103.195.185.115192.168.2.4
                                              Jan 14, 2022 12:23:20.626800060 CET58749836103.195.185.115192.168.2.4
                                              Jan 14, 2022 12:23:20.627672911 CET49836587192.168.2.4103.195.185.115
                                              Jan 14, 2022 12:23:20.770514965 CET58749836103.195.185.115192.168.2.4
                                              Jan 14, 2022 12:23:20.771007061 CET49836587192.168.2.4103.195.185.115
                                              Jan 14, 2022 12:23:20.915868998 CET58749836103.195.185.115192.168.2.4
                                              Jan 14, 2022 12:23:20.917112112 CET49836587192.168.2.4103.195.185.115
                                              Jan 14, 2022 12:23:21.060069084 CET58749836103.195.185.115192.168.2.4
                                              Jan 14, 2022 12:23:21.060147047 CET58749836103.195.185.115192.168.2.4
                                              Jan 14, 2022 12:23:21.061423063 CET49836587192.168.2.4103.195.185.115
                                              Jan 14, 2022 12:23:21.061635017 CET49836587192.168.2.4103.195.185.115
                                              Jan 14, 2022 12:23:21.062443972 CET49836587192.168.2.4103.195.185.115
                                              Jan 14, 2022 12:23:21.062560081 CET49836587192.168.2.4103.195.185.115
                                              Jan 14, 2022 12:23:21.209837914 CET58749836103.195.185.115192.168.2.4
                                              Jan 14, 2022 12:23:21.211560965 CET58749836103.195.185.115192.168.2.4
                                              Jan 14, 2022 12:23:21.257317066 CET49836587192.168.2.4103.195.185.115

                                              UDP Packets

                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 14, 2022 12:23:16.264816046 CET5653453192.168.2.48.8.8.8
                                              Jan 14, 2022 12:23:16.645492077 CET53565348.8.8.8192.168.2.4
                                              Jan 14, 2022 12:23:17.025857925 CET5662753192.168.2.48.8.8.8
                                              Jan 14, 2022 12:23:17.419145107 CET53566278.8.8.8192.168.2.4

                                              DNS Queries

                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                              Jan 14, 2022 12:23:16.264816046 CET192.168.2.48.8.8.80x1d69Standard query (0)mail.demo.jeninfo.comA (IP address)IN (0x0001)
                                              Jan 14, 2022 12:23:17.025857925 CET192.168.2.48.8.8.80x2c4fStandard query (0)mail.demo.jeninfo.comA (IP address)IN (0x0001)

                                              DNS Answers

                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                              Jan 14, 2022 12:23:16.645492077 CET8.8.8.8192.168.2.40x1d69No error (0)mail.demo.jeninfo.comdemo.jeninfo.comCNAME (Canonical name)IN (0x0001)
                                              Jan 14, 2022 12:23:16.645492077 CET8.8.8.8192.168.2.40x1d69No error (0)demo.jeninfo.com103.195.185.115A (IP address)IN (0x0001)
                                              Jan 14, 2022 12:23:17.419145107 CET8.8.8.8192.168.2.40x2c4fNo error (0)mail.demo.jeninfo.comdemo.jeninfo.comCNAME (Canonical name)IN (0x0001)
                                              Jan 14, 2022 12:23:17.419145107 CET8.8.8.8192.168.2.40x2c4fNo error (0)demo.jeninfo.com103.195.185.115A (IP address)IN (0x0001)

                                              SMTP Packets

                                              TimestampSource PortDest PortSource IPDest IPCommands
                                              Jan 14, 2022 12:23:19.413824081 CET58749836103.195.185.115192.168.2.4220-bh-in-22.webhostbox.net ESMTP Exim 4.94.2 #2 Fri, 14 Jan 2022 11:23:19 +0000
                                              220-We do not authorize the use of this system to transport unsolicited,
                                              220 and/or bulk e-mail.
                                              Jan 14, 2022 12:23:19.414210081 CET49836587192.168.2.4103.195.185.115EHLO 179605
                                              Jan 14, 2022 12:23:19.559987068 CET58749836103.195.185.115192.168.2.4250-bh-in-22.webhostbox.net Hello 179605 [84.17.52.18]
                                              250-SIZE 52428800
                                              250-8BITMIME
                                              250-PIPELINING
                                              250-PIPE_CONNECT
                                              250-AUTH PLAIN LOGIN
                                              250-STARTTLS
                                              250 HELP
                                              Jan 14, 2022 12:23:19.560966015 CET49836587192.168.2.4103.195.185.115AUTH login ZmluYW5jZUBkZW1vLmplbmluZm8uY29t
                                              Jan 14, 2022 12:23:19.704035044 CET58749836103.195.185.115192.168.2.4334 UGFzc3dvcmQ6
                                              Jan 14, 2022 12:23:20.626800060 CET58749836103.195.185.115192.168.2.4235 Authentication succeeded
                                              Jan 14, 2022 12:23:20.627672911 CET49836587192.168.2.4103.195.185.115MAIL FROM:<finance@demo.jeninfo.com>
                                              Jan 14, 2022 12:23:20.770514965 CET58749836103.195.185.115192.168.2.4250 OK
                                              Jan 14, 2022 12:23:20.771007061 CET49836587192.168.2.4103.195.185.115RCPT TO:<finance@demo.jeninfo.com>
                                              Jan 14, 2022 12:23:20.915868998 CET58749836103.195.185.115192.168.2.4250 Accepted
                                              Jan 14, 2022 12:23:20.917112112 CET49836587192.168.2.4103.195.185.115DATA
                                              Jan 14, 2022 12:23:21.060147047 CET58749836103.195.185.115192.168.2.4354 Enter message, ending with "." on a line by itself
                                              Jan 14, 2022 12:23:21.062560081 CET49836587192.168.2.4103.195.185.115.
                                              Jan 14, 2022 12:23:21.211560965 CET58749836103.195.185.115192.168.2.4250 OK id=1n8Kfw-001sYR-W4

                                              Code Manipulations

                                              Statistics

                                              CPU Usage

                                              Click to jump to process

                                              Memory Usage

                                              Click to jump to process

                                              High Level Behavior Distribution

                                              Click to dive into process behavior distribution

                                              Behavior

                                              Click to jump to process

                                              System Behavior

                                              General

                                              Start time:12:21:18
                                              Start date:14/01/2022
                                              Path:C:\Users\user\Desktop\order - 922 - LongWay..exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\order - 922 - LongWay..exe"
                                              Imagebase:0xb50000
                                              File size:588800 bytes
                                              MD5 hash:B94EDBAAE4BEEB37EAEAF525C8790CC9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.694349037.0000000003F99000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.694349037.0000000003F99000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.693824370.0000000002F91000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.693874329.0000000002FD9000.00000004.00000001.sdmp, Author: Joe Security
                                              Reputation:low

                                              General

                                              Start time:12:21:26
                                              Start date:14/01/2022
                                              Path:C:\Users\user\Desktop\order - 922 - LongWay..exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Users\user\Desktop\order - 922 - LongWay..exe
                                              Imagebase:0x120000
                                              File size:588800 bytes
                                              MD5 hash:B94EDBAAE4BEEB37EAEAF525C8790CC9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low

                                              General

                                              Start time:12:21:27
                                              Start date:14/01/2022
                                              Path:C:\Users\user\Desktop\order - 922 - LongWay..exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\Desktop\order - 922 - LongWay..exe
                                              Imagebase:0x4d0000
                                              File size:588800 bytes
                                              MD5 hash:B94EDBAAE4BEEB37EAEAF525C8790CC9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.940918607.00000000029B1000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.940918607.00000000029B1000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.691336460.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.691336460.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.690833307.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.690833307.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.937763339.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000002.937763339.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.690098955.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.690098955.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000000.689627196.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000000.689627196.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              Reputation:low

                                              General

                                              Start time:12:22:05
                                              Start date:14/01/2022
                                              Path:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe"
                                              Imagebase:0xa50000
                                              File size:588800 bytes
                                              MD5 hash:B94EDBAAE4BEEB37EAEAF525C8790CC9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000002.799658380.0000000002E51000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000002.799756430.0000000002E99000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.800614481.0000000003E59000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000A.00000002.800614481.0000000003E59000.00000004.00000001.sdmp, Author: Joe Security
                                              Antivirus matches:
                                              • Detection: 100%, Joe Sandbox ML
                                              • Detection: 19%, ReversingLabs
                                              Reputation:low

                                              General

                                              Start time:12:22:09
                                              Start date:14/01/2022
                                              Path:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                              Imagebase:0x1e0000
                                              File size:588800 bytes
                                              MD5 hash:B94EDBAAE4BEEB37EAEAF525C8790CC9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low

                                              General

                                              Start time:12:22:13
                                              Start date:14/01/2022
                                              Path:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe"
                                              Imagebase:0x240000
                                              File size:588800 bytes
                                              MD5 hash:B94EDBAAE4BEEB37EAEAF525C8790CC9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.804574549.0000000003609000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000F.00000002.804574549.0000000003609000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000F.00000002.803757871.0000000002601000.00000004.00000001.sdmp, Author: Joe Security
                                              Reputation:low

                                              General

                                              Start time:12:22:13
                                              Start date:14/01/2022
                                              Path:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                              Imagebase:0x660000
                                              File size:588800 bytes
                                              MD5 hash:B94EDBAAE4BEEB37EAEAF525C8790CC9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.791237614.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000000.791237614.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.937803830.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000002.937803830.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.792245858.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000000.792245858.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.940497927.0000000002BC1000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.940497927.0000000002BC1000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.794380276.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000000.794380276.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.793098302.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000000.793098302.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                              Reputation:low

                                              General

                                              Start time:12:22:18
                                              Start date:14/01/2022
                                              Path:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                              Imagebase:0x220000
                                              File size:588800 bytes
                                              MD5 hash:B94EDBAAE4BEEB37EAEAF525C8790CC9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low

                                              General

                                              Start time:12:22:21
                                              Start date:14/01/2022
                                              Path:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                              Wow64 process (32bit):
                                              Commandline:C:\Users\user\AppData\Roaming\tKZVPq\tKZVPq.exe
                                              Imagebase:
                                              File size:588800 bytes
                                              MD5 hash:B94EDBAAE4BEEB37EAEAF525C8790CC9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low

                                              Disassembly

                                              Code Analysis

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:12%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:340
                                                Total number of Limit Nodes:32

                                                Graph

                                                execution_graph 22140 1543e50 22142 1543e67 22140->22142 22141 1543eec 22142->22141 22145 1543fd0 22142->22145 22150 15439f0 22142->22150 22146 1543ff5 22145->22146 22154 15440d0 22146->22154 22158 15440c1 22146->22158 22151 15439fb 22150->22151 22152 154720b 22151->22152 22166 1546cd0 22151->22166 22152->22142 22155 15440f7 22154->22155 22156 15441d4 22155->22156 22162 1543e30 22155->22162 22156->22156 22160 15440f7 22158->22160 22159 15441d4 22159->22159 22160->22159 22161 1543e30 CreateActCtxA 22160->22161 22161->22159 22163 1545560 CreateActCtxA 22162->22163 22165 1545623 22163->22165 22167 1546cdb 22166->22167 22170 1546ce0 22167->22170 22169 15472e5 22169->22151 22171 1546ceb 22170->22171 22174 1546d10 22171->22174 22173 15473c2 22173->22169 22175 1546d1b 22174->22175 22178 1546d40 22175->22178 22177 15474c2 22177->22173 22180 1546d4b 22178->22180 22179 1547c1c 22179->22177 22180->22179 22182 154baf1 22180->22182 22183 154bb21 22182->22183 22184 154bb45 22183->22184 22187 154bdb7 22183->22187 22191 154bdb8 22183->22191 22184->22179 22189 154bdc5 22187->22189 22188 154bdff 22188->22184 22189->22188 22195 1549de8 22189->22195 22193 154bdc5 22191->22193 22192 154bdff 22192->22184 22193->22192 22194 1549de8 2 API calls 22193->22194 22194->22192 22196 1549df3 22195->22196 22197 154caf8 22196->22197 22199 154c6b8 22196->22199 22200 154c6c3 22199->22200 22201 1546d40 2 API calls 22200->22201 22202 154cb67 22201->22202 22206 154e8d8 22202->22206 22212 154e8f0 22202->22212 22203 154cba0 22203->22197 22208 154e921 22206->22208 22209 154e96d 22206->22209 22207 154e92d 22207->22203 22208->22207 22210 154ed70 LoadLibraryExW GetModuleHandleW 22208->22210 22211 154ed60 LoadLibraryExW GetModuleHandleW 22208->22211 22209->22203 22210->22209 22211->22209 22214 154e921 22212->22214 22215 154e96d 22212->22215 22213 154e92d 22213->22203 22214->22213 22216 154ed70 LoadLibraryExW GetModuleHandleW 22214->22216 22217 154ed60 LoadLibraryExW GetModuleHandleW 22214->22217 22215->22203 22216->22215 22217->22215 22218 154bed0 GetCurrentProcess 22219 154bf43 22218->22219 22220 154bf4a GetCurrentThread 22218->22220 22219->22220 22221 154bf87 GetCurrentProcess 22220->22221 22222 154bf80 22220->22222 22223 154bfbd 22221->22223 22222->22221 22224 154bfe5 GetCurrentThreadId 22223->22224 22225 154c016 22224->22225 22226 15499d0 22230 1549ed0 22226->22230 22238 1549ec3 22226->22238 22227 15499df 22231 1549ee3 22230->22231 22232 1549efb 22231->22232 22246 154a158 22231->22246 22250 154a148 22231->22250 22232->22227 22233 1549ef3 22233->22232 22234 154a0f8 GetModuleHandleW 22233->22234 22235 154a125 22234->22235 22235->22227 22239 1549ee3 22238->22239 22240 1549efb 22239->22240 22244 154a158 LoadLibraryExW 22239->22244 22245 154a148 LoadLibraryExW 22239->22245 22240->22227 22241 1549ef3 22241->22240 22242 154a0f8 GetModuleHandleW 22241->22242 22243 154a125 22242->22243 22243->22227 22244->22241 22245->22241 22247 154a16c 22246->22247 22248 154a191 22247->22248 22254 1549ae8 22247->22254 22248->22233 22251 154a16c 22250->22251 22252 1549ae8 LoadLibraryExW 22251->22252 22253 154a191 22251->22253 22252->22253 22253->22233 22255 154a338 LoadLibraryExW 22254->22255 22257 154a3b1 22255->22257 22257->22248 22258 75e9b38 22259 75e9cc3 22258->22259 22260 75e9b5e 22258->22260 22260->22259 22263 75e9db8 PostMessageW 22260->22263 22265 75e9db0 PostMessageW 22260->22265 22264 75e9e24 22263->22264 22264->22260 22266 75e9e24 22265->22266 22266->22260 22269 75e7c68 22271 75e7b6d 22269->22271 22270 75e7d09 22271->22270 22275 75e8758 22271->22275 22283 75e86f0 22271->22283 22290 75e86e2 22271->22290 22276 75e8715 22275->22276 22279 75e8766 22275->22279 22277 75e873b 22276->22277 22282 75e8758 12 API calls 22276->22282 22300 75e8b28 22277->22300 22321 75e8b21 22277->22321 22278 75e874d 22278->22271 22279->22271 22282->22277 22284 75e870d 22283->22284 22285 75e873b 22284->22285 22287 75e8758 12 API calls 22284->22287 22288 75e8b28 12 API calls 22285->22288 22289 75e8b21 12 API calls 22285->22289 22286 75e874d 22286->22271 22287->22285 22288->22286 22289->22286 22291 75e8738 22290->22291 22293 75e86eb 22290->22293 22292 75e874d 22291->22292 22295 75e8b28 12 API calls 22291->22295 22296 75e8b21 12 API calls 22291->22296 22292->22271 22294 75e873b 22293->22294 22297 75e8758 12 API calls 22293->22297 22298 75e8b28 12 API calls 22294->22298 22299 75e8b21 12 API calls 22294->22299 22295->22292 22296->22292 22297->22294 22298->22292 22299->22292 22301 75e8b42 22300->22301 22312 75e8b70 22301->22312 22342 75e94b8 22301->22342 22349 75e8db8 22301->22349 22356 75e90ff 22301->22356 22363 75e8c20 22301->22363 22373 75e8d23 22301->22373 22385 75e96a2 22301->22385 22395 75e8dc4 22301->22395 22402 75e8b86 22301->22402 22412 75e8e66 22301->22412 22419 75e8b88 22301->22419 22429 75e91c8 22301->22429 22442 75e8d0c 22301->22442 22449 75e952f 22301->22449 22454 75e984f 22301->22454 22464 75e908e 22301->22464 22474 75e96f1 22301->22474 22481 75e97b2 22301->22481 22492 75e9017 22301->22492 22312->22278 22322 75e8b28 22321->22322 22323 75e8b70 22322->22323 22324 75e90ff 4 API calls 22322->22324 22325 75e8db8 4 API calls 22322->22325 22326 75e94b8 4 API calls 22322->22326 22327 75e9017 6 API calls 22322->22327 22328 75e97b2 6 API calls 22322->22328 22329 75e96f1 4 API calls 22322->22329 22330 75e908e 6 API calls 22322->22330 22331 75e984f 6 API calls 22322->22331 22332 75e952f 2 API calls 22322->22332 22333 75e8d0c 4 API calls 22322->22333 22334 75e91c8 8 API calls 22322->22334 22335 75e8b88 6 API calls 22322->22335 22336 75e8e66 4 API calls 22322->22336 22337 75e8b86 6 API calls 22322->22337 22338 75e8dc4 4 API calls 22322->22338 22339 75e96a2 6 API calls 22322->22339 22340 75e8d23 6 API calls 22322->22340 22341 75e8c20 6 API calls 22322->22341 22323->22278 22324->22323 22325->22323 22326->22323 22327->22323 22328->22323 22329->22323 22330->22323 22331->22323 22332->22323 22333->22323 22334->22323 22335->22323 22336->22323 22337->22323 22338->22323 22339->22323 22340->22323 22341->22323 22344 75e8e0f 22342->22344 22343 75e9748 22343->22312 22344->22343 22502 75e72da 22344->22502 22506 75e72e0 22344->22506 22510 75e7568 22344->22510 22514 75e7560 22344->22514 22350 75e8e0f 22349->22350 22351 75e9748 22350->22351 22352 75e7568 ReadProcessMemory 22350->22352 22353 75e7560 ReadProcessMemory 22350->22353 22354 75e72da GetThreadContext 22350->22354 22355 75e72e0 GetThreadContext 22350->22355 22351->22312 22352->22350 22353->22350 22354->22350 22355->22350 22357 75e8e0f 22356->22357 22358 75e9748 22357->22358 22359 75e72da GetThreadContext 22357->22359 22360 75e72e0 GetThreadContext 22357->22360 22361 75e7568 ReadProcessMemory 22357->22361 22362 75e7560 ReadProcessMemory 22357->22362 22358->22312 22359->22357 22360->22357 22361->22357 22362->22357 22364 75e8c2a 22363->22364 22518 75e76f6 22364->22518 22522 75e7700 22364->22522 22526 75e9ab8 22373->22526 22531 75e9ac8 22373->22531 22374 75e8e0f 22376 75e9748 22374->22376 22379 75e72da GetThreadContext 22374->22379 22380 75e72e0 GetThreadContext 22374->22380 22381 75e7568 ReadProcessMemory 22374->22381 22382 75e7560 ReadProcessMemory 22374->22382 22375 75e8d3b 22375->22374 22536 75e7478 22375->22536 22540 75e7470 22375->22540 22376->22312 22379->22374 22380->22374 22381->22374 22382->22374 22386 75e90b4 22385->22386 22388 75e8e0f 22385->22388 22544 75e7230 22386->22544 22548 75e7228 22386->22548 22387 75e9748 22387->22312 22388->22387 22391 75e72da GetThreadContext 22388->22391 22392 75e72e0 GetThreadContext 22388->22392 22393 75e7568 ReadProcessMemory 22388->22393 22394 75e7560 ReadProcessMemory 22388->22394 22391->22388 22392->22388 22393->22388 22394->22388 22397 75e8dd5 22395->22397 22396 75e9748 22396->22312 22397->22396 22398 75e7568 ReadProcessMemory 22397->22398 22399 75e7560 ReadProcessMemory 22397->22399 22400 75e72da GetThreadContext 22397->22400 22401 75e72e0 GetThreadContext 22397->22401 22398->22397 22399->22397 22400->22397 22401->22397 22403 75e8bbb 22402->22403 22408 75e76f6 CreateProcessA 22403->22408 22409 75e7700 CreateProcessA 22403->22409 22404 75e9748 22404->22312 22405 75e8ce2 22405->22404 22406 75e7568 ReadProcessMemory 22405->22406 22407 75e7560 ReadProcessMemory 22405->22407 22410 75e72da GetThreadContext 22405->22410 22411 75e72e0 GetThreadContext 22405->22411 22406->22405 22407->22405 22408->22405 22409->22405 22410->22405 22411->22405 22414 75e8e0f 22412->22414 22413 75e9748 22413->22312 22414->22412 22414->22413 22415 75e72da GetThreadContext 22414->22415 22416 75e72e0 GetThreadContext 22414->22416 22417 75e7568 ReadProcessMemory 22414->22417 22418 75e7560 ReadProcessMemory 22414->22418 22415->22414 22416->22414 22417->22414 22418->22414 22420 75e8bbb 22419->22420 22425 75e76f6 CreateProcessA 22420->22425 22426 75e7700 CreateProcessA 22420->22426 22421 75e9748 22421->22312 22422 75e8ce2 22422->22421 22423 75e7568 ReadProcessMemory 22422->22423 22424 75e7560 ReadProcessMemory 22422->22424 22427 75e72da GetThreadContext 22422->22427 22428 75e72e0 GetThreadContext 22422->22428 22423->22422 22424->22422 22425->22422 22426->22422 22427->22422 22428->22422 22430 75e91d9 22429->22430 22552 75e73b0 22430->22552 22556 75e73b8 22430->22556 22431 75e920b 22438 75e7478 WriteProcessMemory 22431->22438 22439 75e7470 WriteProcessMemory 22431->22439 22432 75e9748 22432->22312 22433 75e8db7 22433->22432 22434 75e7568 ReadProcessMemory 22433->22434 22435 75e7560 ReadProcessMemory 22433->22435 22440 75e72da GetThreadContext 22433->22440 22441 75e72e0 GetThreadContext 22433->22441 22434->22433 22435->22433 22438->22433 22439->22433 22440->22433 22441->22433 22444 75e8e0f 22442->22444 22443 75e9748 22443->22312 22444->22443 22445 75e72da GetThreadContext 22444->22445 22446 75e72e0 GetThreadContext 22444->22446 22447 75e7568 ReadProcessMemory 22444->22447 22448 75e7560 ReadProcessMemory 22444->22448 22445->22444 22446->22444 22447->22444 22448->22444 22450 75e9537 22449->22450 22452 75e7478 WriteProcessMemory 22450->22452 22453 75e7470 WriteProcessMemory 22450->22453 22451 75e956d 22452->22451 22453->22451 22456 75e8c81 22454->22456 22455 75e9748 22455->22312 22456->22455 22462 75e76f6 CreateProcessA 22456->22462 22463 75e7700 CreateProcessA 22456->22463 22457 75e8ce2 22457->22455 22458 75e7568 ReadProcessMemory 22457->22458 22459 75e7560 ReadProcessMemory 22457->22459 22460 75e72da GetThreadContext 22457->22460 22461 75e72e0 GetThreadContext 22457->22461 22458->22457 22459->22457 22460->22457 22461->22457 22462->22457 22463->22457 22465 75e9098 22464->22465 22468 75e7228 ResumeThread 22465->22468 22469 75e7230 ResumeThread 22465->22469 22466 75e9748 22466->22312 22467 75e8e0f 22467->22466 22470 75e72da GetThreadContext 22467->22470 22471 75e72e0 GetThreadContext 22467->22471 22472 75e7568 ReadProcessMemory 22467->22472 22473 75e7560 ReadProcessMemory 22467->22473 22468->22467 22469->22467 22470->22467 22471->22467 22472->22467 22473->22467 22476 75e8e0f 22474->22476 22475 75e9748 22475->22312 22476->22475 22477 75e72da GetThreadContext 22476->22477 22478 75e72e0 GetThreadContext 22476->22478 22479 75e7568 ReadProcessMemory 22476->22479 22480 75e7560 ReadProcessMemory 22476->22480 22477->22476 22478->22476 22479->22476 22480->22476 22482 75e9793 22481->22482 22483 75e8c81 22481->22483 22482->22312 22488 75e76f6 CreateProcessA 22483->22488 22489 75e7700 CreateProcessA 22483->22489 22484 75e9748 22484->22312 22485 75e8ce2 22485->22484 22486 75e7568 ReadProcessMemory 22485->22486 22487 75e7560 ReadProcessMemory 22485->22487 22490 75e72da GetThreadContext 22485->22490 22491 75e72e0 GetThreadContext 22485->22491 22486->22485 22487->22485 22488->22485 22489->22485 22490->22485 22491->22485 22493 75e9020 22492->22493 22498 75e7228 ResumeThread 22493->22498 22499 75e7230 ResumeThread 22493->22499 22494 75e9748 22494->22312 22495 75e8e0f 22495->22494 22496 75e7568 ReadProcessMemory 22495->22496 22497 75e7560 ReadProcessMemory 22495->22497 22500 75e72da GetThreadContext 22495->22500 22501 75e72e0 GetThreadContext 22495->22501 22496->22495 22497->22495 22498->22495 22499->22495 22500->22495 22501->22495 22503 75e7325 GetThreadContext 22502->22503 22505 75e736d 22503->22505 22505->22344 22507 75e7325 GetThreadContext 22506->22507 22509 75e736d 22507->22509 22509->22344 22511 75e75b3 ReadProcessMemory 22510->22511 22513 75e75f7 22511->22513 22513->22344 22515 75e7557 22514->22515 22515->22514 22516 75e75c6 ReadProcessMemory 22515->22516 22517 75e75f7 22516->22517 22517->22344 22519 75e76fb CreateProcessA 22518->22519 22521 75e794b 22519->22521 22521->22521 22523 75e7748 CreateProcessA 22522->22523 22525 75e794b 22523->22525 22525->22525 22527 75e9ae2 22526->22527 22529 75e72da GetThreadContext 22527->22529 22530 75e72e0 GetThreadContext 22527->22530 22528 75e9b14 22528->22375 22529->22528 22530->22528 22532 75e9ae2 22531->22532 22534 75e72da GetThreadContext 22532->22534 22535 75e72e0 GetThreadContext 22532->22535 22533 75e9b14 22533->22375 22534->22533 22535->22533 22537 75e74c0 WriteProcessMemory 22536->22537 22539 75e7517 22537->22539 22539->22374 22541 75e74c0 WriteProcessMemory 22540->22541 22543 75e7517 22541->22543 22543->22374 22545 75e7270 ResumeThread 22544->22545 22547 75e72a1 22545->22547 22547->22388 22549 75e7270 ResumeThread 22548->22549 22551 75e72a1 22549->22551 22551->22388 22553 75e73f8 VirtualAllocEx 22552->22553 22555 75e7435 22553->22555 22555->22431 22557 75e73f8 VirtualAllocEx 22556->22557 22559 75e7435 22557->22559 22559->22431 22267 154c0f8 DuplicateHandle 22268 154c18e 22267->22268

                                                Executed Functions

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 0154BF30
                                                • GetCurrentThread.KERNEL32 ref: 0154BF6D
                                                • GetCurrentProcess.KERNEL32 ref: 0154BFAA
                                                • GetCurrentThreadId.KERNEL32 ref: 0154C003
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693400952.0000000001540000.00000040.00000001.sdmp, Offset: 01540000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1540000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 655cc30ada641852f6e08a7e8b0df4d03756aafc30dbfa075059f13fe506a0b9
                                                • Instruction ID: 14501eb7e6be139cebb5c7750b27183c94b43c562be1fbd307dd922e9b528bd6
                                                • Opcode Fuzzy Hash: 655cc30ada641852f6e08a7e8b0df4d03756aafc30dbfa075059f13fe506a0b9
                                                • Instruction Fuzzy Hash: 005176B0D006498FDB04CFA9D548BDEBBF5BF48318F24886AE418A7350D7359845CF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 0154BF30
                                                • GetCurrentThread.KERNEL32 ref: 0154BF6D
                                                • GetCurrentProcess.KERNEL32 ref: 0154BFAA
                                                • GetCurrentThreadId.KERNEL32 ref: 0154C003
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693400952.0000000001540000.00000040.00000001.sdmp, Offset: 01540000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1540000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: c8c207bcf67a1437a150459af74e3fe27d723278c64497bafe57aef44ccdf929
                                                • Instruction ID: 8a7f78e5338b9c165755b5fcf9b70c3faef45ed6fd19c7771d9bd972428efe26
                                                • Opcode Fuzzy Hash: c8c207bcf67a1437a150459af74e3fe27d723278c64497bafe57aef44ccdf929
                                                • Instruction Fuzzy Hash: 385142B0D006099FDB14CFAAD548BEEBBF5BB48318F24886AE019A7390D7359844CF65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 38 75e76f6-75e76f9 39 75e76fb-75e7745 38->39 40 75e7748-75e7795 38->40 39->40 42 75e77ce-75e77ee 40->42 43 75e7797-75e77a1 40->43 48 75e7827-75e7856 42->48 49 75e77f0-75e77fa 42->49 43->42 44 75e77a3-75e77a5 43->44 46 75e77c8-75e77cb 44->46 47 75e77a7-75e77b1 44->47 46->42 50 75e77b5-75e77c4 47->50 51 75e77b3 47->51 57 75e788f-75e7949 CreateProcessA 48->57 58 75e7858-75e7862 48->58 49->48 53 75e77fc-75e77fe 49->53 50->50 52 75e77c6 50->52 51->50 52->46 54 75e7800-75e780a 53->54 55 75e7821-75e7824 53->55 59 75e780e-75e781d 54->59 60 75e780c 54->60 55->48 71 75e794b-75e7951 57->71 72 75e7952-75e79d8 57->72 58->57 61 75e7864-75e7866 58->61 59->59 62 75e781f 59->62 60->59 63 75e7868-75e7872 61->63 64 75e7889-75e788c 61->64 62->55 66 75e7876-75e7885 63->66 67 75e7874 63->67 64->57 66->66 68 75e7887 66->68 67->66 68->64 71->72 82 75e79da-75e79de 72->82 83 75e79e8-75e79ec 72->83 82->83 84 75e79e0 82->84 85 75e79ee-75e79f2 83->85 86 75e79fc-75e7a00 83->86 84->83 85->86 87 75e79f4 85->87 88 75e7a02-75e7a06 86->88 89 75e7a10-75e7a14 86->89 87->86 88->89 90 75e7a08 88->90 91 75e7a26-75e7a2d 89->91 92 75e7a16-75e7a1c 89->92 90->89 93 75e7a2f-75e7a3e 91->93 94 75e7a44 91->94 92->91 93->94 96 75e7a45 94->96 96->96
                                                APIs
                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 075E7936
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: 43d03f596758641108509c86601279f066e2f080ac9b3236e8899ddbdc349d98
                                                • Instruction ID: 13b1cfcb70a6d7f10302022667e5e402a6d57dacfbe0a24d3ede05b1e080a000
                                                • Opcode Fuzzy Hash: 43d03f596758641108509c86601279f066e2f080ac9b3236e8899ddbdc349d98
                                                • Instruction Fuzzy Hash: B6915FB1D04219CFEF14CFA8C8417EDBBB6BF48314F1489AAD859A7280DB749985CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 97 75e7700-75e7795 100 75e77ce-75e77ee 97->100 101 75e7797-75e77a1 97->101 106 75e7827-75e7856 100->106 107 75e77f0-75e77fa 100->107 101->100 102 75e77a3-75e77a5 101->102 104 75e77c8-75e77cb 102->104 105 75e77a7-75e77b1 102->105 104->100 108 75e77b5-75e77c4 105->108 109 75e77b3 105->109 115 75e788f-75e7949 CreateProcessA 106->115 116 75e7858-75e7862 106->116 107->106 111 75e77fc-75e77fe 107->111 108->108 110 75e77c6 108->110 109->108 110->104 112 75e7800-75e780a 111->112 113 75e7821-75e7824 111->113 117 75e780e-75e781d 112->117 118 75e780c 112->118 113->106 129 75e794b-75e7951 115->129 130 75e7952-75e79d8 115->130 116->115 119 75e7864-75e7866 116->119 117->117 120 75e781f 117->120 118->117 121 75e7868-75e7872 119->121 122 75e7889-75e788c 119->122 120->113 124 75e7876-75e7885 121->124 125 75e7874 121->125 122->115 124->124 126 75e7887 124->126 125->124 126->122 129->130 140 75e79da-75e79de 130->140 141 75e79e8-75e79ec 130->141 140->141 142 75e79e0 140->142 143 75e79ee-75e79f2 141->143 144 75e79fc-75e7a00 141->144 142->141 143->144 145 75e79f4 143->145 146 75e7a02-75e7a06 144->146 147 75e7a10-75e7a14 144->147 145->144 146->147 148 75e7a08 146->148 149 75e7a26-75e7a2d 147->149 150 75e7a16-75e7a1c 147->150 148->147 151 75e7a2f-75e7a3e 149->151 152 75e7a44 149->152 150->149 151->152 154 75e7a45 152->154 154->154
                                                APIs
                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 075E7936
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: 25b5ebece577d3d2147d6e02f0dd85396f29164f91830cbbc06089224848fdc9
                                                • Instruction ID: 039278d9b01f2952c6f9d05fd4a236e5dfcde7b5ec7101e2213d5d14243a4039
                                                • Opcode Fuzzy Hash: 25b5ebece577d3d2147d6e02f0dd85396f29164f91830cbbc06089224848fdc9
                                                • Instruction Fuzzy Hash: 869161B1D04219CFEF14CFA4C8407EDBBB6BF48314F1489AAD859A7240DB749985CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 155 1549ed0-1549ee5 call 1548a4c 158 1549ee7 155->158 159 1549efb-1549eff 155->159 208 1549eed call 154a158 158->208 209 1549eed call 154a148 158->209 160 1549f01-1549f0b 159->160 161 1549f13-1549f54 159->161 160->161 166 1549f56-1549f5e 161->166 167 1549f61-1549f6f 161->167 162 1549ef3-1549ef5 162->159 163 154a030-154a0f0 162->163 203 154a0f2-154a0f5 163->203 204 154a0f8-154a123 GetModuleHandleW 163->204 166->167 169 1549f71-1549f76 167->169 170 1549f93-1549f95 167->170 172 1549f81 169->172 173 1549f78-1549f7f call 1548a58 169->173 171 1549f98-1549f9f 170->171 176 1549fa1-1549fa9 171->176 177 1549fac-1549fb3 171->177 175 1549f83-1549f91 172->175 173->175 175->171 176->177 180 1549fb5-1549fbd 177->180 181 1549fc0-1549fc9 call 1548a68 177->181 180->181 186 1549fd6-1549fdb 181->186 187 1549fcb-1549fd3 181->187 188 1549fdd-1549fe4 186->188 189 1549ff9-154a006 186->189 187->186 188->189 191 1549fe6-1549ff6 call 1548a78 call 1549abc 188->191 196 154a008-154a026 189->196 197 154a029-154a02f 189->197 191->189 196->197 203->204 205 154a125-154a12b 204->205 206 154a12c-154a140 204->206 205->206 208->162 209->162
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0154A116
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693400952.0000000001540000.00000040.00000001.sdmp, Offset: 01540000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1540000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 0633e865a544aea27f10411e16241671517a8b079d50b453d4f174c9f1b53007
                                                • Instruction ID: 7b1c3390ca4165b5f6a07e9566c738f6c6ddce39317587ee170b831fe78ac79f
                                                • Opcode Fuzzy Hash: 0633e865a544aea27f10411e16241671517a8b079d50b453d4f174c9f1b53007
                                                • Instruction Fuzzy Hash: A0714870A00B069FDB65DF6AC04179BBBF5BF88208F00892ED59ADBA40D775E845CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 227 1545554-1545621 CreateActCtxA 229 1545623-1545629 227->229 230 154562a-1545684 227->230 229->230 237 1545686-1545689 230->237 238 1545693-1545697 230->238 237->238 239 15456a8 238->239 240 1545699-15456a5 238->240 242 15456a9 239->242 240->239 242->242
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 01545611
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693400952.0000000001540000.00000040.00000001.sdmp, Offset: 01540000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1540000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: b0516e9fdb45f117b791c1c09bda97834740937db5416421ec8140b846c09436
                                                • Instruction ID: 2ca1b742a4a57145d72b2987c50607f35bb6aac7459035a2af577d4d8e918143
                                                • Opcode Fuzzy Hash: b0516e9fdb45f117b791c1c09bda97834740937db5416421ec8140b846c09436
                                                • Instruction Fuzzy Hash: A6410FB0D04619CFDB24CFA9C9447CEBBF5BF49308F20846AD408AB251DBB55986CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 210 1543e30-1545621 CreateActCtxA 213 1545623-1545629 210->213 214 154562a-1545684 210->214 213->214 221 1545686-1545689 214->221 222 1545693-1545697 214->222 221->222 223 15456a8 222->223 224 1545699-15456a5 222->224 226 15456a9 223->226 224->223 226->226
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 01545611
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693400952.0000000001540000.00000040.00000001.sdmp, Offset: 01540000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1540000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 442240cb5a1a134b5df33d01ef4fdf4a92a0e83d9c9d9fa196a705d4e62236b8
                                                • Instruction ID: e264575d69f47ba8f92f218b46fb91fda16e4c2bb4bd88916c7d350f29323df3
                                                • Opcode Fuzzy Hash: 442240cb5a1a134b5df33d01ef4fdf4a92a0e83d9c9d9fa196a705d4e62236b8
                                                • Instruction Fuzzy Hash: F341E470D04618CFDB24DFA9C944BDEBBF5BF48308F20846AD409AB251E7755946CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 253 75e7560-75e7561 254 75e7563-75e7564 253->254 255 75e75b0-75e75bf 253->255 256 75e7566-75e75ac 254->256 257 75e7557-75e755f 254->257 258 75e75c6-75e75f5 ReadProcessMemory 255->258 256->255 257->253 259 75e75fe-75e762e 258->259 260 75e75f7-75e75fd 258->260 260->259
                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 075E75E8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: 09f43855bc502b11071e9250865f966d7af219252f8e8755d828055e4c5bde5e
                                                • Instruction ID: fe3f451dc3ce0cf4efd74aa6bc508667392d4067b80a1d54abcdb47de44ccb3c
                                                • Opcode Fuzzy Hash: 09f43855bc502b11071e9250865f966d7af219252f8e8755d828055e4c5bde5e
                                                • Instruction Fuzzy Hash: B3317AB1C043899FCB11CFA9C8847EEBFF9FF49210F54886AE558A7241D7389944CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 243 75e7470-75e74c6 245 75e74c8-75e74d4 243->245 246 75e74d6-75e7515 WriteProcessMemory 243->246 245->246 248 75e751e-75e754e 246->248 249 75e7517-75e751d 246->249 249->248
                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 075E7508
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: 614fef6b6e6f85b68b5835f344719f289a9b0b214987fed952041d94edd48285
                                                • Instruction ID: 18507891773bcc5621d96d60529d25dbe4b497ccbffacdb9a6bf562e4dfd2228
                                                • Opcode Fuzzy Hash: 614fef6b6e6f85b68b5835f344719f289a9b0b214987fed952041d94edd48285
                                                • Instruction Fuzzy Hash: F52146B69003099FCF10CFA9C9847EEBBF5FF48314F50882AE918A7240D7789954CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 264 75e7478-75e74c6 266 75e74c8-75e74d4 264->266 267 75e74d6-75e7515 WriteProcessMemory 264->267 266->267 269 75e751e-75e754e 267->269 270 75e7517-75e751d 267->270 270->269
                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 075E7508
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: 30e7c61c727c1a32a8c06c5751190f7786d72b4ec1509d7f796923a310a56ef2
                                                • Instruction ID: 2f23689f3a7e097e35cc84a804c1095ecfefa9d798b9613718eb78a1b54397fc
                                                • Opcode Fuzzy Hash: 30e7c61c727c1a32a8c06c5751190f7786d72b4ec1509d7f796923a310a56ef2
                                                • Instruction Fuzzy Hash: A8211BB59003599FCF10CFA9C984BDEBBF9FF48314F54882AE919A7240D7789954CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 274 75e72da-75e732b 276 75e732d-75e7339 274->276 277 75e733b-75e736b GetThreadContext 274->277 276->277 279 75e736d-75e7373 277->279 280 75e7374-75e73a4 277->280 279->280
                                                APIs
                                                • GetThreadContext.KERNELBASE(?,00000000), ref: 075E735E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: ContextThread
                                                • String ID:
                                                • API String ID: 1591575202-0
                                                • Opcode ID: 8b97d7ea59482c4d09bdd2a9386a7bf2a2f5514b6152676e6131ecad0fd5dbbd
                                                • Instruction ID: 509e767f6af5c419acb104213d0f34068a283571dc82cd6746c30044597088be
                                                • Opcode Fuzzy Hash: 8b97d7ea59482c4d09bdd2a9386a7bf2a2f5514b6152676e6131ecad0fd5dbbd
                                                • Instruction Fuzzy Hash: 8F213AB19002099FCB10CFA9C4857EEBBF8FF48224F54842AD419A7640DB789945CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 284 154c0f0-154c18c DuplicateHandle 285 154c195-154c1b2 284->285 286 154c18e-154c194 284->286 286->285
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0154C17F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693400952.0000000001540000.00000040.00000001.sdmp, Offset: 01540000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1540000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: a7244a069331b80c3ec5d5a6a432a1b126ee0327f71dbc887abdc5462f0e54bc
                                                • Instruction ID: e1b24a2cfa95f50159f25ebf02005b19905d41fcafe2be8dddec8c059f62d0a1
                                                • Opcode Fuzzy Hash: a7244a069331b80c3ec5d5a6a432a1b126ee0327f71dbc887abdc5462f0e54bc
                                                • Instruction Fuzzy Hash: FD21D2B59002099FDB10CFA9D984ADEBBF8FB48324F14841AE919B7350D378A954CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 299 75e7568-75e75f5 ReadProcessMemory 302 75e75fe-75e762e 299->302 303 75e75f7-75e75fd 299->303 303->302
                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 075E75E8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: d9996624e20e5c93658f41133109c48f13398bc1fd0182e4a8d2a60677c51036
                                                • Instruction ID: 6dad6c6982a1aaa4897ca2846e4e4918cb7bc58e9ccc67e58809f00d1ed63382
                                                • Opcode Fuzzy Hash: d9996624e20e5c93658f41133109c48f13398bc1fd0182e4a8d2a60677c51036
                                                • Instruction Fuzzy Hash: 3B2128B18002199FCB10CFA9C880BEEBBF9FF48314F50882AE519A7240D7399954CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 289 75e72e0-75e732b 291 75e732d-75e7339 289->291 292 75e733b-75e736b GetThreadContext 289->292 291->292 294 75e736d-75e7373 292->294 295 75e7374-75e73a4 292->295 294->295
                                                APIs
                                                • GetThreadContext.KERNELBASE(?,00000000), ref: 075E735E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: ContextThread
                                                • String ID:
                                                • API String ID: 1591575202-0
                                                • Opcode ID: e91be32fbc42d2f7191f6685064aedea897a510c7ca6e88488070286ca145d29
                                                • Instruction ID: 77d723314b9c1f2d660d68c643a5b1f71b6053de82e5ca872e7ef3497036ffed
                                                • Opcode Fuzzy Hash: e91be32fbc42d2f7191f6685064aedea897a510c7ca6e88488070286ca145d29
                                                • Instruction Fuzzy Hash: DB211AB19002099FCB50CFA9C4847EEBBF8FF48254F54842AD419A7240DB789945CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 307 154c0f8-154c18c DuplicateHandle 308 154c195-154c1b2 307->308 309 154c18e-154c194 307->309 309->308
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0154C17F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693400952.0000000001540000.00000040.00000001.sdmp, Offset: 01540000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1540000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 0cd57cb10ad238b88868c712184bc603f83b5ccb51711fc94017977d321c3596
                                                • Instruction ID: f159e17b2e51dfc73e272ee3d43f80eb9de06df3e1e6765b086976e34b5546ce
                                                • Opcode Fuzzy Hash: 0cd57cb10ad238b88868c712184bc603f83b5ccb51711fc94017977d321c3596
                                                • Instruction Fuzzy Hash: 9221C4B5D012099FDB10CFA9D984ADEBFF8FB48324F14842AE915A7350D378A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 075E7426
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 9412a96654c8ebeab7bada98b4181667f712f959c931ad35bff450f89527b032
                                                • Instruction ID: 0288ff447894a430b60e589eb268941f660e21c32cfcf40aa09bb93b0f5d1bb1
                                                • Opcode Fuzzy Hash: 9412a96654c8ebeab7bada98b4181667f712f959c931ad35bff450f89527b032
                                                • Instruction Fuzzy Hash: 711156B69002099FCB10CFE9D8447EEBBF9FF48324F14882AD519A7640C7399954CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0154A191,00000800,00000000,00000000), ref: 0154A3A2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693400952.0000000001540000.00000040.00000001.sdmp, Offset: 01540000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1540000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: c133de3bc41ec823abe7b5206816087f47ae54c0a5a40e7c4d42a791e0f2eb3a
                                                • Instruction ID: f2327086aaa891ad789d60a56753e6020fe89c25f5342e1efe5a677419f9d733
                                                • Opcode Fuzzy Hash: c133de3bc41ec823abe7b5206816087f47ae54c0a5a40e7c4d42a791e0f2eb3a
                                                • Instruction Fuzzy Hash: C01103B69002098FDB10CF9AC444BDEFBF8BB58314F14842AD916AB200D3B9A545CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 075E7426
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 9b59f2bb9417cb0b6d9c82787a346c8235790de777d01ec4ac2061fb130b1f67
                                                • Instruction ID: e94b14731636255ef4b8ad8fc40241682132caf39b244c03ac87384810b8cf71
                                                • Opcode Fuzzy Hash: 9b59f2bb9417cb0b6d9c82787a346c8235790de777d01ec4ac2061fb130b1f67
                                                • Instruction Fuzzy Hash: 4A11F6B59002499FCB10DFA9D844BEEBFF9AF48324F148829D519A7250C7799954CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0154A191,00000800,00000000,00000000), ref: 0154A3A2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693400952.0000000001540000.00000040.00000001.sdmp, Offset: 01540000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1540000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: facbc73303db5bc32c94f5b5eedb9a226498e9422ca14bd8158095991695e84c
                                                • Instruction ID: 12f622e47f11275760931288b1577358c017605207251a8ae12746927c1f6ada
                                                • Opcode Fuzzy Hash: facbc73303db5bc32c94f5b5eedb9a226498e9422ca14bd8158095991695e84c
                                                • Instruction Fuzzy Hash: 7B11F6B69002498FDB10CF9AD444BDEFBF8BF98314F14842ED416A7600C379A545CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: 59b8032aaf0dafbc8674cc2c193969202d71db44fe7be4c78309c2d631681b66
                                                • Instruction ID: 449b44b8931da8fb65d306163aeb70a2578cd86127411748851b9caf75ef1dbe
                                                • Opcode Fuzzy Hash: 59b8032aaf0dafbc8674cc2c193969202d71db44fe7be4c78309c2d631681b66
                                                • Instruction Fuzzy Hash: 0E1166B1D002098FCB10CFE9D5447EEFBF8EF48224F24892AD019A7640DB399944CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: 4a84cd8b8359db263e8045f09bd70b2c3a62a0f8c7ddad678f3b1955b8745521
                                                • Instruction ID: ec555e125e49913a92fe432ce1be05840ba58bf355419f797ab82fd871912e74
                                                • Opcode Fuzzy Hash: 4a84cd8b8359db263e8045f09bd70b2c3a62a0f8c7ddad678f3b1955b8745521
                                                • Instruction Fuzzy Hash: F2113AB1D002498FCB10DFAAC4447EFFBF9EF48224F148829D419A7240D779A944CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0154A116
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693400952.0000000001540000.00000040.00000001.sdmp, Offset: 01540000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1540000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 06694fbd6afad809a57a66a858c100ad8c25919cce4f3f814f610d8d3aec175d
                                                • Instruction ID: dffc1dabc2b29afad2247d4f8ebbee513ddbe00a467f0b690b34388585aa0d69
                                                • Opcode Fuzzy Hash: 06694fbd6afad809a57a66a858c100ad8c25919cce4f3f814f610d8d3aec175d
                                                • Instruction Fuzzy Hash: E911DFB6D006498FDB10CF9AD444BDEFBF8BB89224F14842AD529B7600D379A545CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 075E9E15
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: a689414c4e71b08057332d3a01de1616aea57317290e8ecc39ab294d3267c132
                                                • Instruction ID: 39c571ca5c06cb0a545b944a559b5fc822186fdf87d83158891052e2919618d4
                                                • Opcode Fuzzy Hash: a689414c4e71b08057332d3a01de1616aea57317290e8ecc39ab294d3267c132
                                                • Instruction Fuzzy Hash: BC1103B5800349DFCB10CF99D585BEEBBF8FB08324F14881AD558A7600D379A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 075E9E15
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: cfc3f8af3141ee8b80cf7b0bcf8d8815f3bfb4d98bb5f0db35349ff58502af56
                                                • Instruction ID: 1712bff1eee0073be4cc5b93a25806220d8cfda8f084bdbf81d6a043bcddb28e
                                                • Opcode Fuzzy Hash: cfc3f8af3141ee8b80cf7b0bcf8d8815f3bfb4d98bb5f0db35349ff58502af56
                                                • Instruction Fuzzy Hash: 4611D0B58003499FDB10CF9AD884BDEBBF8FB48324F14881AE519A7600D379A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693238485.000000000118D000.00000040.00000001.sdmp, Offset: 0118D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_118d000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 08ac88e848d58fb2fc9e53723090bb79c3f111f142bb46841affd6c7cc88d6fa
                                                • Instruction ID: 385b2b363348e3d2dc9e82579d646288850ba5d7ba753dd14b0b63f1632ef2c0
                                                • Opcode Fuzzy Hash: 08ac88e848d58fb2fc9e53723090bb79c3f111f142bb46841affd6c7cc88d6fa
                                                • Instruction Fuzzy Hash: DB212B71504304DFDF09EF98E9C0B96BB65FB84324F24C569D9050B686C336E456CBA2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693269662.000000000119D000.00000040.00000001.sdmp, Offset: 0119D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_119d000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: aac139b9eafa1c1e5efe1f953ac0e6e638b719daf0508210de76757c72177d59
                                                • Instruction ID: 83e8527acdbe19e30f2fb6ca37b6b567d8b859d83777cb6916674d188b111acc
                                                • Opcode Fuzzy Hash: aac139b9eafa1c1e5efe1f953ac0e6e638b719daf0508210de76757c72177d59
                                                • Instruction Fuzzy Hash: 6521F575504244DFDF19CFA4E8C4B1ABB65FB84354F28C969D80A4B346C73AD847CA62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693269662.000000000119D000.00000040.00000001.sdmp, Offset: 0119D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_119d000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3f1acfe2a5991ad507c2ec11c716cdcab081d29d568de77ff93ba5dc45f9566d
                                                • Instruction ID: 4307edd52ebbd0ed849444be5e0a0f327144647400ff90af31ec293b8f0605bd
                                                • Opcode Fuzzy Hash: 3f1acfe2a5991ad507c2ec11c716cdcab081d29d568de77ff93ba5dc45f9566d
                                                • Instruction Fuzzy Hash: 73212975504204DFDF09CF94E9C0B26BBA5FB84324F24C9ADE9094B346C736E846CB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693238485.000000000118D000.00000040.00000001.sdmp, Offset: 0118D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_118d000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0b542bd3278c9900dffdafc875f4b96c8e5add24c359be4243397ba3ac3bd772
                                                • Instruction ID: 7f8a7a1030971e5ae534b3f0bdd198c0fcedf42c64255357c7ce8f8493679e82
                                                • Opcode Fuzzy Hash: 0b542bd3278c9900dffdafc875f4b96c8e5add24c359be4243397ba3ac3bd772
                                                • Instruction Fuzzy Hash: 0111CD72404280DFCF06DF58D5C4B56BF61FB84220F24C2A9D8090B656C33AE45ACBA2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693269662.000000000119D000.00000040.00000001.sdmp, Offset: 0119D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_119d000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ad2a8cfca3367af31ed8fccdba65c6857044cb1be902d9aeec9971aaaa20cc2e
                                                • Instruction ID: 82a855833a38d08f30289dec1f908a700771b491fad200e6185a8c468fb12fdd
                                                • Opcode Fuzzy Hash: ad2a8cfca3367af31ed8fccdba65c6857044cb1be902d9aeec9971aaaa20cc2e
                                                • Instruction Fuzzy Hash: 6611BB75504280DFCF06CF54D5C4B15BBA1FB84224F28C6AAD8494B696C33AD44ACB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693269662.000000000119D000.00000040.00000001.sdmp, Offset: 0119D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_119d000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ad2a8cfca3367af31ed8fccdba65c6857044cb1be902d9aeec9971aaaa20cc2e
                                                • Instruction ID: ece36e09a0f9d4bbaccc67ff1749c786b93da28ec72f7378da9d755b33ac8d90
                                                • Opcode Fuzzy Hash: ad2a8cfca3367af31ed8fccdba65c6857044cb1be902d9aeec9971aaaa20cc2e
                                                • Instruction Fuzzy Hash: 6411BE75504280CFDF16CF54E5C4B15BB61FB44314F28C6AAD8094B656C33AD44ACB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693238485.000000000118D000.00000040.00000001.sdmp, Offset: 0118D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_118d000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e377c7f93e23e77256c2712ea00d49810a876bb81a138516aa5576db71d5801b
                                                • Instruction ID: fc773ff12eb7286b39d0f39aa704b0fdc726868935fa897eadeab7325bad7428
                                                • Opcode Fuzzy Hash: e377c7f93e23e77256c2712ea00d49810a876bb81a138516aa5576db71d5801b
                                                • Instruction Fuzzy Hash: 7701D4710087C09AEB197AD5EC84BA6BB9CEF41268F08C55AEA041B282D3799445CEB2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693238485.000000000118D000.00000040.00000001.sdmp, Offset: 0118D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_118d000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0f25b5690198c7e9310ad4c30dbaf16401b3db136a5095853521b134246c8c78
                                                • Instruction ID: 2981b67d5262749353f85ffabbec5dc73e7756ef3b29902a3797e5cdc3b2aaac
                                                • Opcode Fuzzy Hash: 0f25b5690198c7e9310ad4c30dbaf16401b3db136a5095853521b134246c8c78
                                                • Instruction Fuzzy Hash: 8CF0C2714047849EEB159E5ADCC4B62FFA8EB81278F18C45AED081B286C3799844CFB1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Non-executed Functions

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: UUUU
                                                • API String ID: 0-1798160573
                                                • Opcode ID: c016911560f8d6c66c04d5b79bfd5d253b14d58c877d16baf596ee7accd631b2
                                                • Instruction ID: e8d8981fcefb0826887a70c2165862b906dbfb6512f7af43af2fb9064115265d
                                                • Opcode Fuzzy Hash: c016911560f8d6c66c04d5b79bfd5d253b14d58c877d16baf596ee7accd631b2
                                                • Instruction Fuzzy Hash: B9516EB0E146288FDBA4CFA9C984BCDBBF2BB48314F1481A9D118F7215D7349A85CF15
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.697354719.00000000075E0000.00000040.00000001.sdmp, Offset: 075E0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_75e0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e9658e789c67d26f9f715761f2ff934db02ac970f404206ad2ee779c56905b22
                                                • Instruction ID: b1fa0fcdeada9d0c22d85a2427625ef8d6bf2499623176698041f8a7509d784c
                                                • Opcode Fuzzy Hash: e9658e789c67d26f9f715761f2ff934db02ac970f404206ad2ee779c56905b22
                                                • Instruction Fuzzy Hash: 33D19CB1B006069FEB19DBB5C420BAE77FABFC9605F14446ED1498B790CB35E901CB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693400952.0000000001540000.00000040.00000001.sdmp, Offset: 01540000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1540000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d2372446588cedf22a9990115209a0ef68d6dd6cac8cc623a51cddea3aed3625
                                                • Instruction ID: fe6ce3dc02936e8e4542f99d7600259730f60c24a4de120d566b8cbe56393556
                                                • Opcode Fuzzy Hash: d2372446588cedf22a9990115209a0ef68d6dd6cac8cc623a51cddea3aed3625
                                                • Instruction Fuzzy Hash: 0312E7F24917468AD330CF65EC98188BBB1B7C3328B58660BD9635FAD8D7B4116ACF44
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693400952.0000000001540000.00000040.00000001.sdmp, Offset: 01540000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1540000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fa60135759bfc250e15d93728d8beff403d01b0b184729a5d9632a0365c9eb90
                                                • Instruction ID: 59e50d5922ca0f6499dc12cbe438fc5eef627812f15ce4f58fca125e72f68010
                                                • Opcode Fuzzy Hash: fa60135759bfc250e15d93728d8beff403d01b0b184729a5d9632a0365c9eb90
                                                • Instruction Fuzzy Hash: 43A15A32E0021A8FCF19DFB5C8445EEBBB2FFC4304B15856AE915AF221EB75A955CB40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.693400952.0000000001540000.00000040.00000001.sdmp, Offset: 01540000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1540000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c7d4ed637a9aceeef4e5d4b310df591f8c426daaef50b61ae7327cfe9a4980ec
                                                • Instruction ID: 07342367bc3ef0b71c6ceaf7d89e5094660392eca521b9cd69a24114cab93275
                                                • Opcode Fuzzy Hash: c7d4ed637a9aceeef4e5d4b310df591f8c426daaef50b61ae7327cfe9a4980ec
                                                • Instruction Fuzzy Hash: 25C16AB24517868BD320CF65EC98188BBB1BBC7328F58670BD5222B6D8D7B4106ACF44
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Execution Graph

                                                Execution Coverage:9.8%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:206
                                                Total number of Limit Nodes:12

                                                Graph

                                                execution_graph 31743 c88f78 31744 c88f95 31743->31744 31745 c8960a 31744->31745 31749 c01898 31744->31749 31753 c018a8 31744->31753 31750 c018b7 31749->31750 31757 c0128c 31750->31757 31754 c018b7 31753->31754 31755 c0128c 3 API calls 31754->31755 31756 c018d7 31755->31756 31758 c01297 31757->31758 31761 c01334 31758->31761 31760 c019ae 31760->31760 31766 c0133f 31761->31766 31762 c020b5 31763 c020e5 31762->31763 31765 c01dac OleInitialize 31762->31765 31767 c020fd 31763->31767 31780 c01dac 31763->31780 31765->31763 31766->31762 31766->31767 31770 c037c7 31766->31770 31775 c037d8 31766->31775 31767->31760 31771 c037f9 31770->31771 31772 c0381d 31771->31772 31784 c03988 31771->31784 31788 c03978 31771->31788 31772->31762 31776 c037f9 31775->31776 31777 c0381d 31776->31777 31778 c03988 2 API calls 31776->31778 31779 c03978 2 API calls 31776->31779 31777->31762 31778->31777 31779->31777 31781 c01db7 31780->31781 31783 c0b701 31781->31783 31858 c0aae4 31781->31858 31783->31767 31785 c03995 31784->31785 31787 c039ce 31785->31787 31792 c02cc8 31785->31792 31787->31772 31790 c03995 31788->31790 31789 c039ce 31789->31772 31790->31789 31791 c02cc8 2 API calls 31790->31791 31791->31789 31793 c02cd3 31792->31793 31795 c03a40 31793->31795 31796 c02cfc 31793->31796 31795->31795 31797 c02d07 31796->31797 31803 c02d0c 31797->31803 31799 c03aaf 31807 c07c38 31799->31807 31815 c07c20 31799->31815 31800 c03ae8 31800->31795 31806 c02d17 31803->31806 31804 c03de4 31804->31799 31805 c037d8 2 API calls 31805->31804 31806->31804 31806->31805 31809 c07c69 31807->31809 31811 c07d5a 31807->31811 31808 c07c75 31808->31800 31809->31808 31823 c07e90 31809->31823 31828 c07ea0 31809->31828 31810 c07cb5 31832 c83368 31810->31832 31811->31800 31817 c07c69 31815->31817 31819 c07d5a 31815->31819 31816 c07c75 31816->31800 31817->31816 31821 c07e90 2 API calls 31817->31821 31822 c07ea0 2 API calls 31817->31822 31818 c07cb5 31820 c83368 GetModuleHandleW 31818->31820 31819->31800 31820->31819 31821->31818 31822->31818 31824 c07ea0 31823->31824 31838 c07ee0 31824->31838 31846 c07ed2 31824->31846 31825 c07eaa 31825->31810 31830 c07ee0 2 API calls 31828->31830 31831 c07ed2 2 API calls 31828->31831 31829 c07eaa 31829->31810 31830->31829 31831->31829 31833 c83392 31832->31833 31854 c838d0 31833->31854 31835 c82f44 GetModuleHandleW 31836 c83439 31835->31836 31839 c07ef3 31838->31839 31843 c82f44 GetModuleHandleW 31838->31843 31841 c07f0b 31839->31841 31844 c07ee0 LoadLibraryExW GetModuleHandleW 31839->31844 31845 c07ed2 LoadLibraryExW GetModuleHandleW 31839->31845 31840 c07f03 31840->31841 31842 c07264 LoadLibraryExW 31840->31842 31841->31825 31842->31841 31843->31839 31844->31840 31845->31840 31851 c82f44 GetModuleHandleW 31846->31851 31847 c07ef3 31849 c07f0b 31847->31849 31852 c07ee0 LoadLibraryExW GetModuleHandleW 31847->31852 31853 c07ed2 LoadLibraryExW GetModuleHandleW 31847->31853 31848 c07f03 31848->31849 31850 c07264 LoadLibraryExW 31848->31850 31849->31825 31850->31849 31851->31847 31852->31848 31853->31848 31855 c838d3 31854->31855 31856 c83410 31854->31856 31855->31856 31857 c83e58 GetModuleHandleW 31855->31857 31856->31835 31856->31836 31857->31856 31859 c0aaef 31858->31859 31860 c0ba1b 31859->31860 31862 c0ab00 31859->31862 31860->31783 31863 c0ba50 OleInitialize 31862->31863 31864 c0bab4 31863->31864 31864->31860 31865 c86d78 DuplicateHandle 31866 c86e0e 31865->31866 31653 ba0468 31654 ba0487 LdrInitializeThunk 31653->31654 31656 ba04da 31654->31656 31616 c8bc40 31617 c8bc54 31616->31617 31620 c8be8a 31617->31620 31625 c8c06c 31620->31625 31630 c8c086 31620->31630 31635 c8bf70 31620->31635 31626 c8c01f 31625->31626 31626->31625 31627 c8c0ab 31626->31627 31640 c8c368 31626->31640 31644 c8c3b9 31626->31644 31631 c8c099 31630->31631 31632 c8c0ab 31630->31632 31633 c8c368 RtlEncodePointer 31631->31633 31634 c8c3b9 RtlEncodePointer 31631->31634 31633->31632 31634->31632 31636 c8bfb4 31635->31636 31637 c8c0ab 31636->31637 31638 c8c368 RtlEncodePointer 31636->31638 31639 c8c3b9 RtlEncodePointer 31636->31639 31638->31637 31639->31637 31641 c8c386 31640->31641 31649 c8c3c8 31641->31649 31642 c8c396 31642->31627 31645 c8c362 31644->31645 31646 c8c3c2 31644->31646 31648 c8c3c8 RtlEncodePointer 31645->31648 31647 c8c396 31647->31627 31648->31647 31650 c8c402 31649->31650 31651 c8c42c RtlEncodePointer 31650->31651 31652 c8c455 31650->31652 31651->31652 31652->31642 31657 c85190 31658 c851f8 CreateWindowExW 31657->31658 31660 c852b4 31658->31660 31660->31660 31661 c86b50 GetCurrentProcess 31662 c86bca GetCurrentThread 31661->31662 31663 c86bc3 31661->31663 31664 c86c00 31662->31664 31665 c86c07 GetCurrentProcess 31662->31665 31663->31662 31664->31665 31666 c86c3d 31665->31666 31667 c86c65 GetCurrentThreadId 31666->31667 31668 c86c96 31667->31668 31867 c816b0 31868 c816df 31867->31868 31871 c80420 31868->31871 31870 c81804 31872 c8042b 31871->31872 31874 c83368 GetModuleHandleW 31872->31874 31873 c81d4a 31873->31870 31874->31873 31875 bae900 31876 bae94e GlobalMemoryStatusEx 31875->31876 31877 bae97e 31876->31877 31669 c2d01c 31670 c2d034 31669->31670 31671 c2d08e 31670->31671 31676 c85348 31670->31676 31680 c83ca4 31670->31680 31690 c85471 31670->31690 31693 c85338 31670->31693 31677 c8536e 31676->31677 31678 c83ca4 CallWindowProcW 31677->31678 31679 c8538f 31678->31679 31679->31671 31681 c83caf 31680->31681 31682 c879e9 31681->31682 31684 c879d9 31681->31684 31717 c86964 31682->31717 31697 c08744 31684->31697 31703 c08669 31684->31703 31708 c87b10 31684->31708 31712 c08678 31684->31712 31685 c879e7 31731 c83ccc 31690->31731 31692 c85487 31692->31671 31694 c85348 31693->31694 31695 c83ca4 CallWindowProcW 31694->31695 31696 c8538f 31695->31696 31696->31671 31698 c08702 31697->31698 31699 c08752 31697->31699 31721 c08730 31698->31721 31724 c08721 31698->31724 31700 c08718 31700->31685 31704 c0868c 31703->31704 31706 c08730 CallWindowProcW 31704->31706 31707 c08721 CallWindowProcW 31704->31707 31705 c08718 31705->31685 31706->31705 31707->31705 31709 c87b1e 31708->31709 31710 c86964 CallWindowProcW 31709->31710 31711 c87c0b 31709->31711 31710->31709 31711->31685 31713 c0868c 31712->31713 31715 c08730 CallWindowProcW 31713->31715 31716 c08721 CallWindowProcW 31713->31716 31714 c08718 31714->31685 31715->31714 31716->31714 31718 c8696f 31717->31718 31719 c87cda CallWindowProcW 31718->31719 31720 c87c89 31718->31720 31719->31720 31720->31685 31722 c08741 31721->31722 31728 c09bc0 31721->31728 31722->31700 31725 c08730 31724->31725 31726 c08741 31725->31726 31727 c09bc0 CallWindowProcW 31725->31727 31726->31700 31727->31726 31730 c86964 CallWindowProcW 31728->31730 31729 c09bda 31729->31722 31730->31729 31732 c83cd7 31731->31732 31734 c8551b 31732->31734 31735 c82f44 31732->31735 31736 c841b0 GetModuleHandleW 31735->31736 31738 c84225 31736->31738 31738->31734

                                                Executed Functions

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1560 bab158-bab1a4 LdrInitializeThunk 1564 bab1ab-bab1b7 1560->1564 1565 bab1bd-bab1c6 1564->1565 1566 bab3b7-bab3ca 1564->1566 1568 bab3ec 1565->1568 1569 bab1cc-bab1e1 1565->1569 1567 bab3f1-bab3f5 1566->1567 1570 bab400 1567->1570 1571 bab3f7 1567->1571 1568->1567 1573 bab1fb-bab216 1569->1573 1574 bab1e3-bab1f6 1569->1574 1575 bab401 1570->1575 1571->1570 1583 bab218-bab222 1573->1583 1584 bab224 1573->1584 1576 bab38b-bab38f 1574->1576 1575->1575 1577 bab39a-bab39b 1576->1577 1578 bab391 1576->1578 1577->1566 1578->1577 1585 bab229-bab22b 1583->1585 1584->1585 1586 bab22d-bab240 1585->1586 1587 bab245-bab2dd 1585->1587 1586->1576 1605 bab2eb 1587->1605 1606 bab2df-bab2e9 1587->1606 1607 bab2f0-bab2f2 1605->1607 1606->1607 1608 bab2f4-bab2f6 1607->1608 1609 bab335-bab389 1607->1609 1610 bab2f8-bab302 1608->1610 1611 bab304 1608->1611 1609->1576 1613 bab309-bab30b 1610->1613 1611->1613 1613->1609 1614 bab30d-bab333 1613->1614 1614->1609
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938756699.0000000000BA0000.00000040.00000010.sdmp, Offset: 00BA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_ba0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: InitializeThunk
                                                • String ID:
                                                • API String ID: 2994545307-0
                                                • Opcode ID: adb37db76f9b230b2932463444b4f4892848102801dd59f54d899783ec2258fd
                                                • Instruction ID: 792617d03381c856210858e99c093618e4c4d490f6ff2fe7ad9edcb4aafcd57a
                                                • Opcode Fuzzy Hash: adb37db76f9b230b2932463444b4f4892848102801dd59f54d899783ec2258fd
                                                • Instruction Fuzzy Hash: AE617E30A14205DFDB14EFF4D859BAEBBF2AF85304F208429E416AB791DF349846CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 00C86BB0
                                                • GetCurrentThread.KERNEL32 ref: 00C86BED
                                                • GetCurrentProcess.KERNEL32 ref: 00C86C2A
                                                • GetCurrentThreadId.KERNEL32 ref: 00C86C83
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.939299470.0000000000C80000.00000040.00000001.sdmp, Offset: 00C80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c80000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 21fc5e689f5aad382169e53cbcbefbccc7071e0de93fdbac7c5a37953a11cfe5
                                                • Instruction ID: 47a974c5439dfeb6aae098ca91fc83be6ae40c0b0a3b38aba664f624046d648d
                                                • Opcode Fuzzy Hash: 21fc5e689f5aad382169e53cbcbefbccc7071e0de93fdbac7c5a37953a11cfe5
                                                • Instruction Fuzzy Hash: E35165B4900649CFDB54CFAAD688BDEBBF4FF48308F2084A9E019A7390D7746944CB65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 00C86BB0
                                                • GetCurrentThread.KERNEL32 ref: 00C86BED
                                                • GetCurrentProcess.KERNEL32 ref: 00C86C2A
                                                • GetCurrentThreadId.KERNEL32 ref: 00C86C83
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.939299470.0000000000C80000.00000040.00000001.sdmp, Offset: 00C80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c80000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: b11a14a14412e415d66c7a50ec72685ea5ab4671bf376b63fae517235fdbbb9f
                                                • Instruction ID: fc94bb7d9d6f6d450be95f47bc88b3da326b04072ac995f12d0acd2ae2957928
                                                • Opcode Fuzzy Hash: b11a14a14412e415d66c7a50ec72685ea5ab4671bf376b63fae517235fdbbb9f
                                                • Instruction Fuzzy Hash: FE5155B4900649CFDB50CFAAD688BEEBBF4FF48318F208469E419A7390D7746944CB65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 834 c82f44-c841f0 836 c841f8-c84223 GetModuleHandleW 834->836 837 c841f2-c841f5 834->837 838 c8422c-c84240 836->838 839 c84225-c8422b 836->839 837->836 839->838
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 00C84216
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.939299470.0000000000C80000.00000040.00000001.sdmp, Offset: 00C80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c80000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID: X
                                                • API String ID: 4139908857-1677210272
                                                • Opcode ID: c4b157c6e3b91ed1fd69c3c49d04c030f50355c7d68bf255c5a597285cc47651
                                                • Instruction ID: 242542f7f89f9fca9452db659e3234b86f9af1233a08af8e65df5b08c86f06b1
                                                • Opcode Fuzzy Hash: c4b157c6e3b91ed1fd69c3c49d04c030f50355c7d68bf255c5a597285cc47651
                                                • Instruction Fuzzy Hash: A711F3B18046498BCB14DF9AD444BDEFBF4EB48314F14842AD429B7200D374A545CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1624 ba0412-ba0427 1625 ba0429-ba0433 1624->1625 1626 ba044c-ba047d 1624->1626 1627 ba0448-ba044b 1625->1627 1628 ba0435-ba0446 1625->1628 1631 ba0487 1626->1631 1628->1627 1632 ba048f-ba04a1 1631->1632 1635 ba04a9-ba04af 1632->1635 1636 ba04b6 1635->1636 1637 ba04bd-ba04d4 LdrInitializeThunk 1636->1637 1638 ba04da-ba04f4 1637->1638 1639 ba061d-ba063a 1637->1639 1638->1639 1642 ba04fa-ba0514 1638->1642 1651 ba063f-ba0648 1639->1651 1645 ba051a 1642->1645 1646 ba0516-ba0518 1642->1646 1648 ba051d-ba0578 1645->1648 1646->1648 1657 ba057a-ba057c 1648->1657 1658 ba057e 1648->1658 1659 ba0581-ba061b 1657->1659 1658->1659 1659->1651
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938756699.0000000000BA0000.00000040.00000010.sdmp, Offset: 00BA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_ba0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: InitializeThunk
                                                • String ID:
                                                • API String ID: 2994545307-0
                                                • Opcode ID: 61ebb28cc3b720d552eeb93c7b2686e86a37b1ca9e946eeebb52de046bf34f46
                                                • Instruction ID: 5d925058bc71b65db066a5b5b3e2731c08d1dfbae1667b70b0402b95e4928c4b
                                                • Opcode Fuzzy Hash: 61ebb28cc3b720d552eeb93c7b2686e86a37b1ca9e946eeebb52de046bf34f46
                                                • Instruction Fuzzy Hash: A2519230B142059FCB04EBB4D895BEE77F5AF89304F14896AE5069B792EF30D905CB51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1676 ba0468-ba04d4 LdrInitializeThunk 1684 ba04da-ba04f4 1676->1684 1685 ba061d-ba063a 1676->1685 1684->1685 1688 ba04fa-ba0514 1684->1688 1697 ba063f-ba0648 1685->1697 1691 ba051a 1688->1691 1692 ba0516-ba0518 1688->1692 1694 ba051d-ba0578 1691->1694 1692->1694 1703 ba057a-ba057c 1694->1703 1704 ba057e 1694->1704 1705 ba0581-ba061b 1703->1705 1704->1705 1705->1697
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938756699.0000000000BA0000.00000040.00000010.sdmp, Offset: 00BA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_ba0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: InitializeThunk
                                                • String ID:
                                                • API String ID: 2994545307-0
                                                • Opcode ID: 663a9189e90a58d6ca08bf8154ed29a8a09a9b28107e35b7baf081be02d48ca7
                                                • Instruction ID: d474ae6c20708ea520ed8174e9e8f2183ebf2abbb63d566686306ee365d0b31a
                                                • Opcode Fuzzy Hash: 663a9189e90a58d6ca08bf8154ed29a8a09a9b28107e35b7baf081be02d48ca7
                                                • Instruction Fuzzy Hash: 32518030A142059BCB04FBB4D895AEEB7F5FF89304F14896AE4069B791DF30E905CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1722 c85184-c851f6 1723 c851f8-c851fe 1722->1723 1724 c85201-c85208 1722->1724 1723->1724 1725 c8520a-c85210 1724->1725 1726 c85213-c8524b 1724->1726 1725->1726 1727 c85253-c852b2 CreateWindowExW 1726->1727 1728 c852bb-c852f3 1727->1728 1729 c852b4-c852ba 1727->1729 1733 c85300 1728->1733 1734 c852f5-c852f8 1728->1734 1729->1728 1735 c85301 1733->1735 1734->1733 1735->1735
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00C852A2
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.939299470.0000000000C80000.00000040.00000001.sdmp, Offset: 00C80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c80000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: 30177fabf54ac888b7f2bb66e2aa1bb15091b4e7b7e3787f8bf69eecd6ee15b5
                                                • Instruction ID: 17893f52bc1d582305c334f4ec0a3065994690aaea579e94889c6d8800b13809
                                                • Opcode Fuzzy Hash: 30177fabf54ac888b7f2bb66e2aa1bb15091b4e7b7e3787f8bf69eecd6ee15b5
                                                • Instruction Fuzzy Hash: EB51EFB1D00709DFDB14DF99D884ADEBFB5BF48314F24812AE819AB210DBB49985CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1736 c85190-c851f6 1737 c851f8-c851fe 1736->1737 1738 c85201-c85208 1736->1738 1737->1738 1739 c8520a-c85210 1738->1739 1740 c85213-c852b2 CreateWindowExW 1738->1740 1739->1740 1742 c852bb-c852f3 1740->1742 1743 c852b4-c852ba 1740->1743 1747 c85300 1742->1747 1748 c852f5-c852f8 1742->1748 1743->1742 1749 c85301 1747->1749 1748->1747 1749->1749
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00C852A2
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.939299470.0000000000C80000.00000040.00000001.sdmp, Offset: 00C80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c80000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: f06266e9a38d2d7b8f354294350cd47112ea8f91c4d8376d614a49f3db1a3a9b
                                                • Instruction ID: c42655b9abb2e7afa66c6e0e86ca02e87b502dc1ea9bc5e2bcdeee6820e6e2ab
                                                • Opcode Fuzzy Hash: f06266e9a38d2d7b8f354294350cd47112ea8f91c4d8376d614a49f3db1a3a9b
                                                • Instruction Fuzzy Hash: 7241C0B1D00309DFDB14DF99D884ADEBBB5BF48314F64812AE819AB210DBB4A945CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1750 c86964-c87c7c 1753 c87d2c-c87d4c call c83ca4 1750->1753 1754 c87c82-c87c87 1750->1754 1761 c87d4f-c87d5c 1753->1761 1756 c87c89-c87cc0 1754->1756 1757 c87cda-c87d12 CallWindowProcW 1754->1757 1763 c87cc9-c87cd8 1756->1763 1764 c87cc2-c87cc8 1756->1764 1759 c87d1b-c87d2a 1757->1759 1760 c87d14-c87d1a 1757->1760 1759->1761 1760->1759 1763->1761 1764->1763
                                                APIs
                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 00C87D01
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.939299470.0000000000C80000.00000040.00000001.sdmp, Offset: 00C80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c80000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: CallProcWindow
                                                • String ID:
                                                • API String ID: 2714655100-0
                                                • Opcode ID: 42ab371b91d0823b849365e173ea36151354967e8b44571b81fb5258c685114b
                                                • Instruction ID: 6b347842afc1143a13de0770c472ea9b8839a7c1da35633cddde943d603f9ec8
                                                • Opcode Fuzzy Hash: 42ab371b91d0823b849365e173ea36151354967e8b44571b81fb5258c685114b
                                                • Instruction Fuzzy Hash: 3D4129B4A04205CFCB14DF99C488BAABBF5FF88318F248559E419AB321D774E941CBA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1767 bab0f8-bab117 1768 bab119-bab123 1767->1768 1769 bab13c-bab186 1767->1769 1770 bab138-bab13b 1768->1770 1771 bab125-bab136 1768->1771 1776 bab18f-bab1a4 LdrInitializeThunk 1769->1776 1771->1770 1777 bab1ab-bab1b7 1776->1777 1778 bab1bd-bab1c6 1777->1778 1779 bab3b7-bab3ca 1777->1779 1781 bab3ec 1778->1781 1782 bab1cc-bab1e1 1778->1782 1780 bab3f1-bab3f5 1779->1780 1783 bab400 1780->1783 1784 bab3f7 1780->1784 1781->1780 1786 bab1fb-bab216 1782->1786 1787 bab1e3-bab1f6 1782->1787 1788 bab401 1783->1788 1784->1783 1796 bab218-bab222 1786->1796 1797 bab224 1786->1797 1789 bab38b-bab38f 1787->1789 1788->1788 1790 bab39a-bab39b 1789->1790 1791 bab391 1789->1791 1790->1779 1791->1790 1798 bab229-bab22b 1796->1798 1797->1798 1799 bab22d-bab240 1798->1799 1800 bab245-bab2dd 1798->1800 1799->1789 1818 bab2eb 1800->1818 1819 bab2df-bab2e9 1800->1819 1820 bab2f0-bab2f2 1818->1820 1819->1820 1821 bab2f4-bab2f6 1820->1821 1822 bab335-bab389 1820->1822 1823 bab2f8-bab302 1821->1823 1824 bab304 1821->1824 1822->1789 1826 bab309-bab30b 1823->1826 1824->1826 1826->1822 1827 bab30d-bab333 1826->1827 1827->1822
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938756699.0000000000BA0000.00000040.00000010.sdmp, Offset: 00BA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_ba0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: InitializeThunk
                                                • String ID:
                                                • API String ID: 2994545307-0
                                                • Opcode ID: 8d97b410e69d2048bd2284c633c52a448ec5fb70785c348c09a0d0eacda65593
                                                • Instruction ID: e7e7ddc33153dfc6004febe78eb9f93dc32bfa54d3a77de6ff7865f4d7a0aa24
                                                • Opcode Fuzzy Hash: 8d97b410e69d2048bd2284c633c52a448ec5fb70785c348c09a0d0eacda65593
                                                • Instruction Fuzzy Hash: F131A270A19349CFCB05DBB4D894B9DBBF1FF4A304F1584A9D001AB396DB35984ACB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1837 c86d71-c86e0c DuplicateHandle 1838 c86e0e-c86e14 1837->1838 1839 c86e15-c86e32 1837->1839 1838->1839
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C86DFF
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.939299470.0000000000C80000.00000040.00000001.sdmp, Offset: 00C80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c80000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 77f1aae3715dfd80d20aa8c49bda268327f5adc0bb48c51162a3f37439928a65
                                                • Instruction ID: 055bbef4e880afaa6c542a8350a37ff16f7cc7a2f28c0ea1ec2dfd5bca413c2c
                                                • Opcode Fuzzy Hash: 77f1aae3715dfd80d20aa8c49bda268327f5adc0bb48c51162a3f37439928a65
                                                • Instruction Fuzzy Hash: 7621E4B5900249DFDB10CFA9D884AEEBFF8FB48314F14842AE914A7350D378A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1842 c86d78-c86e0c DuplicateHandle 1843 c86e0e-c86e14 1842->1843 1844 c86e15-c86e32 1842->1844 1843->1844
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C86DFF
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.939299470.0000000000C80000.00000040.00000001.sdmp, Offset: 00C80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c80000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 24bf20d0b092cfed266a7910506c03f354cf2456890707a481c6174316fae0f4
                                                • Instruction ID: 10423d6e525f7f174130c628096434c30031d1e9f2208bcfa98b3750b10e04c6
                                                • Opcode Fuzzy Hash: 24bf20d0b092cfed266a7910506c03f354cf2456890707a481c6174316fae0f4
                                                • Instruction Fuzzy Hash: 8A21C4B5900209DFDB10CF99D584ADEFBF8FB48324F14842AE914A7350D778A954CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00C080F9,00000800), ref: 00C0818A
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938835164.0000000000C00000.00000040.00000010.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c00000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: e8ade6aaade1c023c6a30e1e2069c1ba1bd51388f66b2deb89596c077883aee5
                                                • Instruction ID: a5a2b96c5ce96576750b050b8dd924f6927fd77f5062cf832683e40e99c3c303
                                                • Opcode Fuzzy Hash: e8ade6aaade1c023c6a30e1e2069c1ba1bd51388f66b2deb89596c077883aee5
                                                • Instruction Fuzzy Hash: D11103B68002498FDB10CFAAD844BDEFBF4AF48314F14852AD459A7640C778A94ACFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1854 c07264-c08160 1856 c08162-c08165 1854->1856 1857 c08168-c08197 LoadLibraryExW 1854->1857 1856->1857 1858 c081a0-c081bd 1857->1858 1859 c08199-c0819f 1857->1859 1859->1858
                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00C080F9,00000800), ref: 00C0818A
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938835164.0000000000C00000.00000040.00000010.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c00000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: 69ed6ce4789512b4447e2075e4e957a314cca9ea47d49036390086c1e8339abe
                                                • Instruction ID: f59fda56517370e1524be66981551379d8a5f5a6d08896d45296e0061612e47e
                                                • Opcode Fuzzy Hash: 69ed6ce4789512b4447e2075e4e957a314cca9ea47d49036390086c1e8339abe
                                                • Instruction Fuzzy Hash: 9C1103B29002099FCB10CF9AD844BDEFBF8EF48310F14842AE555A7240C778A949CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1847 bac4c0-bae946 1849 bae94e-bae97c GlobalMemoryStatusEx 1847->1849 1850 bae97e-bae984 1849->1850 1851 bae985-bae9ad 1849->1851 1850->1851
                                                APIs
                                                • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,00BAE47A), ref: 00BAE96F
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938756699.0000000000BA0000.00000040.00000010.sdmp, Offset: 00BA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_ba0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: GlobalMemoryStatus
                                                • String ID:
                                                • API String ID: 1890195054-0
                                                • Opcode ID: 00361d77a3338718adbf6482960d6093ce0c15129a76ca8dcbecb6a06b3fa389
                                                • Instruction ID: fa864375c977ff8269386167e707152c6593e03a4f54a67a49590b475699925c
                                                • Opcode Fuzzy Hash: 00361d77a3338718adbf6482960d6093ce0c15129a76ca8dcbecb6a06b3fa389
                                                • Instruction Fuzzy Hash: 1F1103B1C046199BCB10DF9AC4447EEFBF8AB49324F54856AD818B7340D778A954CFE1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RtlEncodePointer.NTDLL(00000000), ref: 00C8C442
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.939299470.0000000000C80000.00000040.00000001.sdmp, Offset: 00C80000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c80000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: EncodePointer
                                                • String ID:
                                                • API String ID: 2118026453-0
                                                • Opcode ID: bde06f088bebbf4b06ea98f77edab2e4059b12f82e11f284d8c009c746a559e3
                                                • Instruction ID: 8f810e1ebf30d92a4f63236022f853c94cd8be2e8ce928ad833a22399076f708
                                                • Opcode Fuzzy Hash: bde06f088bebbf4b06ea98f77edab2e4059b12f82e11f284d8c009c746a559e3
                                                • Instruction Fuzzy Hash: 2511ACB59003058FCB60DFA9D5887EEBBF8FB48318F24882AD445A3681C7786544CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,00BAE47A), ref: 00BAE96F
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938756699.0000000000BA0000.00000040.00000010.sdmp, Offset: 00BA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_ba0000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: GlobalMemoryStatus
                                                • String ID:
                                                • API String ID: 1890195054-0
                                                • Opcode ID: 488fdc4dd5263e2c9b1630a342aec9682ffcdf581515a062087f15e42de593a1
                                                • Instruction ID: 2e86ef1fc0d5145c5dbbd86d500fc641d49a92c923bf735785ee0ba2421108cf
                                                • Opcode Fuzzy Hash: 488fdc4dd5263e2c9b1630a342aec9682ffcdf581515a062087f15e42de593a1
                                                • Instruction Fuzzy Hash: C71103B1C046599FCB10CF9AD444BEEFBF4AF48324F14866AD418B7240D378A945CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • OleInitialize.OLE32(00000000), ref: 00C0BAA5
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938835164.0000000000C00000.00000040.00000010.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c00000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: Initialize
                                                • String ID:
                                                • API String ID: 2538663250-0
                                                • Opcode ID: 35895b3dca21da929811b0dc8f5a405a50fdce1fc046322a7f339c3284b0f017
                                                • Instruction ID: a53c698ddc3eee096d81d93ecedbae0e4122eda88724dedf5f406efc4a8dc239
                                                • Opcode Fuzzy Hash: 35895b3dca21da929811b0dc8f5a405a50fdce1fc046322a7f339c3284b0f017
                                                • Instruction Fuzzy Hash: 821112B1900249CFCB10DF9AD448BDEFBF8EB48324F248529D519A7740C378A945CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • OleInitialize.OLE32(00000000), ref: 00C0BAA5
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938835164.0000000000C00000.00000040.00000010.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c00000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID: Initialize
                                                • String ID:
                                                • API String ID: 2538663250-0
                                                • Opcode ID: 71d87e74ce1126954713d0c663634d58a8af41a9d257ca11efe257822e084cfa
                                                • Instruction ID: 076ca6657cc89332d55c4f95412b3a055981b83b97de8d72a894d2d0c519877e
                                                • Opcode Fuzzy Hash: 71d87e74ce1126954713d0c663634d58a8af41a9d257ca11efe257822e084cfa
                                                • Instruction Fuzzy Hash: 401100B19042498FCB20DF9AD448BDEBBF8EB48324F248829D519B7340D378A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938934941.0000000000C1D000.00000040.00000001.sdmp, Offset: 00C1D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c1d000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b61fd5dbe79b329c4093f84786b99fe4e4accd3e34cd6610a8def5ca7a77d3ad
                                                • Instruction ID: 4a87d88081041c8252849e7450ae52eaf7fb90dfcbc99390d82aea8571ef18ff
                                                • Opcode Fuzzy Hash: b61fd5dbe79b329c4093f84786b99fe4e4accd3e34cd6610a8def5ca7a77d3ad
                                                • Instruction Fuzzy Hash: F62128B1504244DFDB01DF50D8C0BA7BB66FB99324F24C569E8070B246C336E896EBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938934941.0000000000C1D000.00000040.00000001.sdmp, Offset: 00C1D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c1d000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 06d50c2b28394a58f3eda4c7e882dbe8870af9912f29d1db44753222f1f9949e
                                                • Instruction ID: de5e02ee2048d58b5fa9ae40edcf2075a6995d95e3f7e737d81268e4dad5e876
                                                • Opcode Fuzzy Hash: 06d50c2b28394a58f3eda4c7e882dbe8870af9912f29d1db44753222f1f9949e
                                                • Instruction Fuzzy Hash: 13213AB1504244DFCB01DF50D8C0BABBF6AFB95328F248969E8064B246C336D996E7A1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938991757.0000000000C2D000.00000040.00000001.sdmp, Offset: 00C2D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c2d000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ac1a8a201ca35c8c6ffd40d20c12fa1141a4115b13fa6e02beb18a4684da5936
                                                • Instruction ID: 1da02425bea3baebae18e04e13421bb6a0adeb2c6c6040566a710bc770f2101a
                                                • Opcode Fuzzy Hash: ac1a8a201ca35c8c6ffd40d20c12fa1141a4115b13fa6e02beb18a4684da5936
                                                • Instruction Fuzzy Hash: C9210475504344DFCB14CF60E9C4B26BBA5FB98314F24C9A9E80A4BB96C73AD847CB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938991757.0000000000C2D000.00000040.00000001.sdmp, Offset: 00C2D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c2d000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 777d85b6aca02c54efcd83b4329a562be5242d29fadff647ac654af65ae29386
                                                • Instruction ID: 61e8896fc3ca91d41ffbf87f8363a6dd0044ca1bca3762ea032e9ce6dd314b01
                                                • Opcode Fuzzy Hash: 777d85b6aca02c54efcd83b4329a562be5242d29fadff647ac654af65ae29386
                                                • Instruction Fuzzy Hash: A9218E755093C08FCB12CF24D994B15BF71EB56314F28C5EAD8498B6A7C33A984ACB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938934941.0000000000C1D000.00000040.00000001.sdmp, Offset: 00C1D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c1d000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0b542bd3278c9900dffdafc875f4b96c8e5add24c359be4243397ba3ac3bd772
                                                • Instruction ID: eed813e179a5debe6d057cee5b00a31e66a2a4b3cc645d351e30589a1bdf464b
                                                • Opcode Fuzzy Hash: 0b542bd3278c9900dffdafc875f4b96c8e5add24c359be4243397ba3ac3bd772
                                                • Instruction Fuzzy Hash: A811E6B6404280CFCF12CF14D5C4B56BF72FB95324F24C6A9D8064B656C33AD99ADBA2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000002.938934941.0000000000C1D000.00000040.00000001.sdmp, Offset: 00C1D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_c1d000_order - 922 - LongWay.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0b542bd3278c9900dffdafc875f4b96c8e5add24c359be4243397ba3ac3bd772
                                                • Instruction ID: 0f847f1ca7203dc6852701e3aefc8d893e1a0b364d5f09b52ae8d3d22258c462
                                                • Opcode Fuzzy Hash: 0b542bd3278c9900dffdafc875f4b96c8e5add24c359be4243397ba3ac3bd772
                                                • Instruction Fuzzy Hash: 9911D3B6404280CFCB02CF10D5C4B56BF72FB95324F24C6A9D8094B656C33AD99ADBA2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Non-executed Functions

                                                Execution Graph

                                                Execution Coverage:9.6%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:270
                                                Total number of Limit Nodes:17

                                                Graph

                                                execution_graph 21469 1403e50 21471 1403e67 21469->21471 21470 1403eec 21471->21470 21474 1403fd0 21471->21474 21479 14039f0 21471->21479 21475 1403ff5 21474->21475 21483 14040d0 21475->21483 21487 14040cb 21475->21487 21482 14039fb 21479->21482 21480 140720b 21480->21471 21482->21480 21495 1406cd0 21482->21495 21484 14040f7 21483->21484 21486 14041d4 21484->21486 21491 1403e30 21484->21491 21488 14040f7 21487->21488 21489 14041d4 21488->21489 21490 1403e30 CreateActCtxA 21488->21490 21489->21489 21490->21489 21492 1405560 CreateActCtxA 21491->21492 21494 1405623 21492->21494 21496 1406cdb 21495->21496 21499 1406ce0 21496->21499 21498 14072e5 21498->21482 21500 1406ceb 21499->21500 21503 1406d10 21500->21503 21502 14073c2 21502->21498 21504 1406d1b 21503->21504 21507 1406d40 21504->21507 21506 14074c2 21506->21502 21509 1406d4b 21507->21509 21508 1407c1c 21508->21506 21509->21508 21511 140bafb 21509->21511 21512 140bb21 21511->21512 21513 140bb45 21512->21513 21516 140bdb7 21512->21516 21520 140bdb8 21512->21520 21513->21508 21517 140bdc5 21516->21517 21518 140bdff 21517->21518 21524 1409de8 21517->21524 21518->21513 21521 140bdc5 21520->21521 21522 1409de8 2 API calls 21521->21522 21523 140bdff 21521->21523 21522->21523 21523->21513 21525 1409df3 21524->21525 21527 140caf8 21525->21527 21528 140c6b8 21525->21528 21527->21527 21529 140c6c3 21528->21529 21530 1406d40 2 API calls 21529->21530 21531 140cb67 21530->21531 21534 140e91c 21531->21534 21535 140cba0 21534->21535 21536 140e935 21534->21536 21535->21527 21538 140ed70 LoadLibraryExW GetModuleHandleW 21536->21538 21539 140ed63 LoadLibraryExW GetModuleHandleW 21536->21539 21537 140e96d 21538->21537 21539->21537 21540 14099d0 21541 14099df 21540->21541 21544 1409ed0 21540->21544 21552 1409ec3 21540->21552 21545 1409ee3 21544->21545 21546 1409efb 21545->21546 21560 140a148 21545->21560 21564 140a158 21545->21564 21546->21541 21547 1409ef3 21547->21546 21548 140a0f8 GetModuleHandleW 21547->21548 21549 140a125 21548->21549 21549->21541 21553 1409ee3 21552->21553 21554 1409efb 21553->21554 21558 140a148 LoadLibraryExW 21553->21558 21559 140a158 LoadLibraryExW 21553->21559 21554->21541 21555 1409ef3 21555->21554 21556 140a0f8 GetModuleHandleW 21555->21556 21557 140a125 21556->21557 21557->21541 21558->21555 21559->21555 21562 140a158 21560->21562 21561 140a191 21561->21547 21562->21561 21568 1409ae8 21562->21568 21565 140a16c 21564->21565 21566 140a191 21565->21566 21567 1409ae8 LoadLibraryExW 21565->21567 21566->21547 21567->21566 21569 140a338 LoadLibraryExW 21568->21569 21571 140a3b1 21569->21571 21571->21561 21572 140bed0 GetCurrentProcess 21573 140bf43 21572->21573 21574 140bf4a GetCurrentThread 21572->21574 21573->21574 21575 140bf80 21574->21575 21576 140bf87 GetCurrentProcess 21574->21576 21575->21576 21577 140bfbd 21576->21577 21578 140bfe5 GetCurrentThreadId 21577->21578 21579 140c016 21578->21579 21580 140c0f8 DuplicateHandle 21581 140c18e 21580->21581 21250 8a77c68 21251 8a77b6d 21250->21251 21252 8a77d09 21251->21252 21256 8a786e2 21251->21256 21263 8a787bf 21251->21263 21272 8a786f0 21251->21272 21257 8a7870d 21256->21257 21258 8a7873b 21257->21258 21262 8a787bf 12 API calls 21257->21262 21279 8a78b28 21258->21279 21295 8a78b18 21258->21295 21259 8a7874d 21259->21251 21262->21258 21264 8a787c3 21263->21264 21265 8a786f1 21263->21265 21266 8a7875b 21265->21266 21267 8a7873b 21265->21267 21269 8a787bf 12 API calls 21265->21269 21266->21251 21270 8a78b28 12 API calls 21267->21270 21271 8a78b18 12 API calls 21267->21271 21268 8a7874d 21268->21251 21269->21267 21270->21268 21271->21268 21273 8a786f1 21272->21273 21275 8a787bf 12 API calls 21273->21275 21276 8a7873b 21273->21276 21274 8a7874d 21274->21251 21275->21276 21277 8a78b28 12 API calls 21276->21277 21278 8a78b18 12 API calls 21276->21278 21277->21274 21278->21274 21280 8a78b42 21279->21280 21288 8a78b70 21280->21288 21311 8a78e66 21280->21311 21320 8a790ff 21280->21320 21325 8a797b2 21280->21325 21331 8a78b77 21280->21331 21336 8a79017 21280->21336 21348 8a78b88 21280->21348 21353 8a791c8 21280->21353 21364 8a7908e 21280->21364 21376 8a7952f 21280->21376 21381 8a7984f 21280->21381 21387 8a78c20 21280->21387 21392 8a796a2 21280->21392 21404 8a78d23 21280->21404 21288->21259 21296 8a78b42 21295->21296 21297 8a78e66 4 API calls 21296->21297 21298 8a78d23 4 API calls 21296->21298 21299 8a796a2 6 API calls 21296->21299 21300 8a78c20 2 API calls 21296->21300 21301 8a7984f 2 API calls 21296->21301 21302 8a7952f 2 API calls 21296->21302 21303 8a7908e 6 API calls 21296->21303 21304 8a78b70 21296->21304 21305 8a791c8 6 API calls 21296->21305 21306 8a78b88 2 API calls 21296->21306 21307 8a79017 6 API calls 21296->21307 21308 8a78b77 2 API calls 21296->21308 21309 8a797b2 2 API calls 21296->21309 21310 8a790ff 2 API calls 21296->21310 21297->21304 21298->21304 21299->21304 21300->21304 21301->21304 21302->21304 21303->21304 21304->21259 21305->21304 21306->21304 21307->21304 21308->21304 21309->21304 21310->21304 21312 8a78e70 21311->21312 21313 8a78e0f 21312->21313 21314 8a78f54 21312->21314 21315 8a79177 21312->21315 21313->21288 21411 8a772e0 21314->21411 21415 8a772da 21314->21415 21315->21313 21419 8a77560 21315->21419 21423 8a77568 21315->21423 21321 8a79122 21320->21321 21322 8a78e0f 21321->21322 21323 8a77560 ReadProcessMemory 21321->21323 21324 8a77568 ReadProcessMemory 21321->21324 21323->21322 21324->21322 21326 8a78c81 21325->21326 21327 8a79793 21325->21327 21427 8a776f6 21326->21427 21431 8a77700 21326->21431 21327->21288 21332 8a78b88 21331->21332 21334 8a776f6 CreateProcessA 21332->21334 21335 8a77700 CreateProcessA 21332->21335 21333 8a78ce2 21334->21333 21335->21333 21337 8a79020 21336->21337 21435 8a77228 21337->21435 21439 8a77230 21337->21439 21338 8a78e8c 21339 8a78f54 21338->21339 21340 8a79177 21338->21340 21341 8a78e0f 21338->21341 21342 8a772e0 SetThreadContext 21339->21342 21343 8a772da SetThreadContext 21339->21343 21340->21341 21346 8a77560 ReadProcessMemory 21340->21346 21347 8a77568 ReadProcessMemory 21340->21347 21341->21288 21342->21341 21343->21341 21346->21341 21347->21341 21349 8a78bbb 21348->21349 21351 8a776f6 CreateProcessA 21349->21351 21352 8a77700 CreateProcessA 21349->21352 21350 8a78ce2 21351->21350 21352->21350 21354 8a791d9 21353->21354 21443 8a773b0 21354->21443 21447 8a773b8 21354->21447 21355 8a7920b 21451 8a77470 21355->21451 21455 8a77478 21355->21455 21356 8a7927a 21357 8a78db7 21356->21357 21360 8a77560 ReadProcessMemory 21356->21360 21361 8a77568 ReadProcessMemory 21356->21361 21360->21357 21361->21357 21365 8a79098 21364->21365 21372 8a77230 ResumeThread 21365->21372 21373 8a77228 ResumeThread 21365->21373 21366 8a78e8c 21367 8a78f54 21366->21367 21368 8a79177 21366->21368 21369 8a78e0f 21366->21369 21370 8a772e0 SetThreadContext 21367->21370 21371 8a772da SetThreadContext 21367->21371 21368->21369 21374 8a77560 ReadProcessMemory 21368->21374 21375 8a77568 ReadProcessMemory 21368->21375 21369->21288 21370->21369 21371->21369 21372->21366 21373->21366 21374->21369 21375->21369 21377 8a79537 21376->21377 21379 8a77470 WriteProcessMemory 21377->21379 21380 8a77478 WriteProcessMemory 21377->21380 21378 8a7956d 21379->21378 21380->21378 21383 8a78c81 21381->21383 21382 8a79885 21382->21288 21383->21382 21385 8a776f6 CreateProcessA 21383->21385 21386 8a77700 CreateProcessA 21383->21386 21384 8a78ce2 21385->21384 21386->21384 21388 8a78c2a 21387->21388 21390 8a776f6 CreateProcessA 21388->21390 21391 8a77700 CreateProcessA 21388->21391 21389 8a78ce2 21390->21389 21391->21389 21393 8a790b4 21392->21393 21397 8a78e0f 21392->21397 21398 8a77230 ResumeThread 21393->21398 21399 8a77228 ResumeThread 21393->21399 21394 8a78e8c 21395 8a78f54 21394->21395 21396 8a79177 21394->21396 21394->21397 21402 8a772e0 SetThreadContext 21395->21402 21403 8a772da SetThreadContext 21395->21403 21396->21397 21400 8a77560 ReadProcessMemory 21396->21400 21401 8a77568 ReadProcessMemory 21396->21401 21397->21288 21398->21394 21399->21394 21400->21397 21401->21397 21402->21397 21403->21397 21459 8a79ab8 21404->21459 21464 8a79ac8 21404->21464 21405 8a78e0f 21406 8a78d3b 21406->21405 21407 8a77470 WriteProcessMemory 21406->21407 21408 8a77478 WriteProcessMemory 21406->21408 21407->21405 21408->21405 21412 8a77325 SetThreadContext 21411->21412 21414 8a7736d 21412->21414 21414->21313 21416 8a77325 SetThreadContext 21415->21416 21418 8a7736d 21416->21418 21418->21313 21420 8a775b3 ReadProcessMemory 21419->21420 21422 8a775f7 21420->21422 21422->21313 21424 8a775b3 ReadProcessMemory 21423->21424 21426 8a775f7 21424->21426 21426->21313 21428 8a77789 CreateProcessA 21427->21428 21430 8a7794b 21428->21430 21432 8a77789 CreateProcessA 21431->21432 21434 8a7794b 21432->21434 21436 8a77270 ResumeThread 21435->21436 21438 8a772a1 21436->21438 21438->21338 21440 8a77270 ResumeThread 21439->21440 21442 8a772a1 21440->21442 21442->21338 21444 8a773f8 VirtualAllocEx 21443->21444 21446 8a77435 21444->21446 21446->21355 21448 8a773f8 VirtualAllocEx 21447->21448 21450 8a77435 21448->21450 21450->21355 21452 8a774c0 WriteProcessMemory 21451->21452 21454 8a77517 21452->21454 21454->21356 21456 8a774c0 WriteProcessMemory 21455->21456 21458 8a77517 21456->21458 21458->21356 21460 8a79ae2 21459->21460 21462 8a772e0 SetThreadContext 21460->21462 21463 8a772da SetThreadContext 21460->21463 21461 8a79b14 21461->21406 21462->21461 21463->21461 21465 8a79ae2 21464->21465 21467 8a772e0 SetThreadContext 21465->21467 21468 8a772da SetThreadContext 21465->21468 21466 8a79b14 21466->21406 21467->21466 21468->21466 21582 8a79b38 21583 8a79cc3 21582->21583 21584 8a79b5e 21582->21584 21584->21583 21587 8a79db0 PostMessageW 21584->21587 21589 8a79db8 PostMessageW 21584->21589 21588 8a79e24 21587->21588 21588->21584 21590 8a79e24 21589->21590 21590->21584

                                                Executed Functions

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 0140BF30
                                                • GetCurrentThread.KERNEL32 ref: 0140BF6D
                                                • GetCurrentProcess.KERNEL32 ref: 0140BFAA
                                                • GetCurrentThreadId.KERNEL32 ref: 0140C003
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.798747419.0000000001400000.00000040.00000001.sdmp, Offset: 01400000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_1400000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: b5e6ab6332825ded28e1cfd3be910673557783360912abfedc53faa7dde3bfc0
                                                • Instruction ID: b9f588f902d3500fb768df31469b1a9ed737384e67e25afc4e7fa136cebe3e01
                                                • Opcode Fuzzy Hash: b5e6ab6332825ded28e1cfd3be910673557783360912abfedc53faa7dde3bfc0
                                                • Instruction Fuzzy Hash: 945155B4900649CFDB15CFAAD588BDEBBF5AF48304F24846AD418A73A0D7355844CF65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 0140BF30
                                                • GetCurrentThread.KERNEL32 ref: 0140BF6D
                                                • GetCurrentProcess.KERNEL32 ref: 0140BFAA
                                                • GetCurrentThreadId.KERNEL32 ref: 0140C003
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.798747419.0000000001400000.00000040.00000001.sdmp, Offset: 01400000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_1400000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 7fd93360a1d770143b8058b08b7636fc832cbcd41cc957ecfc3d324361e8c78d
                                                • Instruction ID: 93d4404d0636de9d5964322a29694099b79edf8633f002ab02dabf8c684e9a21
                                                • Opcode Fuzzy Hash: 7fd93360a1d770143b8058b08b7636fc832cbcd41cc957ecfc3d324361e8c78d
                                                • Instruction Fuzzy Hash: 8D5133B4900609CFDB14CFAAD588BDEBBF5AB48304F24886AE419A73A0D7359844CF65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 38 8a776f6-8a77795 40 8a77797-8a777a1 38->40 41 8a777ce-8a777ee 38->41 40->41 42 8a777a3-8a777a5 40->42 48 8a77827-8a77856 41->48 49 8a777f0-8a777fa 41->49 43 8a777a7-8a777b1 42->43 44 8a777c8-8a777cb 42->44 46 8a777b5-8a777c4 43->46 47 8a777b3 43->47 44->41 46->46 50 8a777c6 46->50 47->46 55 8a7788f-8a77949 CreateProcessA 48->55 56 8a77858-8a77862 48->56 49->48 51 8a777fc-8a777fe 49->51 50->44 53 8a77821-8a77824 51->53 54 8a77800-8a7780a 51->54 53->48 57 8a7780e-8a7781d 54->57 58 8a7780c 54->58 69 8a77952-8a779d8 55->69 70 8a7794b-8a77951 55->70 56->55 59 8a77864-8a77866 56->59 57->57 60 8a7781f 57->60 58->57 61 8a77889-8a7788c 59->61 62 8a77868-8a77872 59->62 60->53 61->55 64 8a77876-8a77885 62->64 65 8a77874 62->65 64->64 66 8a77887 64->66 65->64 66->61 80 8a779da-8a779de 69->80 81 8a779e8-8a779ec 69->81 70->69 80->81 82 8a779e0 80->82 83 8a779ee-8a779f2 81->83 84 8a779fc-8a77a00 81->84 82->81 83->84 87 8a779f4 83->87 85 8a77a02-8a77a06 84->85 86 8a77a10-8a77a14 84->86 85->86 88 8a77a08 85->88 89 8a77a26-8a77a2d 86->89 90 8a77a16-8a77a1c 86->90 87->84 88->86 91 8a77a44 89->91 92 8a77a2f-8a77a3e 89->92 90->89 94 8a77a45 91->94 92->91 94->94
                                                APIs
                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 08A77936
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.804132090.0000000008A70000.00000040.00000001.sdmp, Offset: 08A70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_8a70000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: 6890a7912b073bfc2b2d7aede8e8a6bc82e7c370fe691d6d8dc0bba8695fbb8b
                                                • Instruction ID: 283a047730184b38f88cb42b8691524498a77a222a54c3f3360acaa3b17fb25d
                                                • Opcode Fuzzy Hash: 6890a7912b073bfc2b2d7aede8e8a6bc82e7c370fe691d6d8dc0bba8695fbb8b
                                                • Instruction Fuzzy Hash: 69916B71D00619CFEB20CFA9CC41BEDBBB2BF48315F1485A9E809A7680DB749985DF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 95 8a77700-8a77795 97 8a77797-8a777a1 95->97 98 8a777ce-8a777ee 95->98 97->98 99 8a777a3-8a777a5 97->99 105 8a77827-8a77856 98->105 106 8a777f0-8a777fa 98->106 100 8a777a7-8a777b1 99->100 101 8a777c8-8a777cb 99->101 103 8a777b5-8a777c4 100->103 104 8a777b3 100->104 101->98 103->103 107 8a777c6 103->107 104->103 112 8a7788f-8a77949 CreateProcessA 105->112 113 8a77858-8a77862 105->113 106->105 108 8a777fc-8a777fe 106->108 107->101 110 8a77821-8a77824 108->110 111 8a77800-8a7780a 108->111 110->105 114 8a7780e-8a7781d 111->114 115 8a7780c 111->115 126 8a77952-8a779d8 112->126 127 8a7794b-8a77951 112->127 113->112 116 8a77864-8a77866 113->116 114->114 117 8a7781f 114->117 115->114 118 8a77889-8a7788c 116->118 119 8a77868-8a77872 116->119 117->110 118->112 121 8a77876-8a77885 119->121 122 8a77874 119->122 121->121 123 8a77887 121->123 122->121 123->118 137 8a779da-8a779de 126->137 138 8a779e8-8a779ec 126->138 127->126 137->138 139 8a779e0 137->139 140 8a779ee-8a779f2 138->140 141 8a779fc-8a77a00 138->141 139->138 140->141 144 8a779f4 140->144 142 8a77a02-8a77a06 141->142 143 8a77a10-8a77a14 141->143 142->143 145 8a77a08 142->145 146 8a77a26-8a77a2d 143->146 147 8a77a16-8a77a1c 143->147 144->141 145->143 148 8a77a44 146->148 149 8a77a2f-8a77a3e 146->149 147->146 151 8a77a45 148->151 149->148 151->151
                                                APIs
                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 08A77936
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.804132090.0000000008A70000.00000040.00000001.sdmp, Offset: 08A70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_8a70000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: 28a31902f36c1f1f8ff75081cd87fc3a9ae8fd9b4a2391f8327e5c6856f655ae
                                                • Instruction ID: 175c0f89f531603b2c292620d82f00c8f83e25dcaf485b2cf8630e29701b5419
                                                • Opcode Fuzzy Hash: 28a31902f36c1f1f8ff75081cd87fc3a9ae8fd9b4a2391f8327e5c6856f655ae
                                                • Instruction Fuzzy Hash: 36914B71D00619CFEB20CFA9CC40BEEBBB2BF48315F1485A9E809A7640DB749985DF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 152 1409ed0-1409ed8 153 1409ee3-1409ee5 152->153 154 1409ede call 1408a4c 152->154 155 1409ee7 153->155 156 1409efb-1409eff 153->156 154->153 205 1409eed call 140a148 155->205 206 1409eed call 140a158 155->206 157 1409f01-1409f0b 156->157 158 1409f13-1409f54 156->158 157->158 163 1409f61-1409f6f 158->163 164 1409f56-1409f5e 158->164 159 1409ef3-1409ef5 159->156 161 140a030-140a0f0 159->161 200 140a0f2-140a0f5 161->200 201 140a0f8-140a123 GetModuleHandleW 161->201 165 1409f71-1409f76 163->165 166 1409f93-1409f95 163->166 164->163 168 1409f81 165->168 169 1409f78-1409f7f call 1408a58 165->169 170 1409f98-1409f9f 166->170 171 1409f83-1409f91 168->171 169->171 173 1409fa1-1409fa9 170->173 174 1409fac-1409fb3 170->174 171->170 173->174 177 1409fc0-1409fc9 call 1408a68 174->177 178 1409fb5-1409fbd 174->178 183 1409fd6-1409fdb 177->183 184 1409fcb-1409fd3 177->184 178->177 185 1409ff9-140a006 183->185 186 1409fdd-1409fe4 183->186 184->183 193 140a008-140a026 185->193 194 140a029-140a02f 185->194 186->185 187 1409fe6-1409ff6 call 1408a78 call 1409abc 186->187 187->185 193->194 200->201 202 140a125-140a12b 201->202 203 140a12c-140a140 201->203 202->203 205->159 206->159
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0140A116
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.798747419.0000000001400000.00000040.00000001.sdmp, Offset: 01400000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_1400000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 580540cb7fbd6841d980e05410389041de61b4cd7895aabf7d89b00eebb057b9
                                                • Instruction ID: d1093a5380d14e2ae545d8b91b1e6c0a872c0fd7ab19f1506ab8212d9f08bb01
                                                • Opcode Fuzzy Hash: 580540cb7fbd6841d980e05410389041de61b4cd7895aabf7d89b00eebb057b9
                                                • Instruction Fuzzy Hash: B37124B0A00B058FDB65DF6AC05079BBBF5BF88204F00892ED59AD7B91DB74E8458F91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 207 8a77640-8a776ba 212 8a776c3-8a776e8 207->212 213 8a776bc-8a776c2 207->213 213->212
                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08A775E8
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.804132090.0000000008A70000.00000040.00000001.sdmp, Offset: 08A70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_8a70000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: 7ce60c12c4ef2a785e97c2b4a65c188cd780c86c90512b1e35f38ae12d0edf78
                                                • Instruction ID: 33db15ff365b1cab64845843a14f1a72e303f04158c429c29a7005366f72360d
                                                • Opcode Fuzzy Hash: 7ce60c12c4ef2a785e97c2b4a65c188cd780c86c90512b1e35f38ae12d0edf78
                                                • Instruction Fuzzy Hash: 864147B5D003498FCF10CFA9C8447EEBBF5AF48324F14882AD559A7640DB799949DFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 217 1403e30-1405621 CreateActCtxA 220 1405623-1405629 217->220 221 140562a-1405684 217->221 220->221 228 1405693-1405697 221->228 229 1405686-1405689 221->229 230 14056a8 228->230 231 1405699-14056a5 228->231 229->228 233 14056a9 230->233 231->230 233->233
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 01405611
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.798747419.0000000001400000.00000040.00000001.sdmp, Offset: 01400000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_1400000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: cc3d363baaa1af79f67a266f63fa379e3123e7f92bbf1396baab7d9296d822c0
                                                • Instruction ID: fb2ef6a00836b7ca5308e058f1aa40af209f9e88efb3675e5abedabcef8178e3
                                                • Opcode Fuzzy Hash: cc3d363baaa1af79f67a266f63fa379e3123e7f92bbf1396baab7d9296d822c0
                                                • Instruction Fuzzy Hash: C341C270D04618CFDB24DFAAC8847DEBBB5FF48304F24846AD409AB295D7B59946CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 234 140555b-140555e 235 1405560-1405621 CreateActCtxA 234->235 237 1405623-1405629 235->237 238 140562a-1405684 235->238 237->238 245 1405693-1405697 238->245 246 1405686-1405689 238->246 247 14056a8 245->247 248 1405699-14056a5 245->248 246->245 250 14056a9 247->250 248->247 250->250
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 01405611
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.798747419.0000000001400000.00000040.00000001.sdmp, Offset: 01400000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_1400000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: bc516a2bab0fd2dabb31f38c09fe13686d8bc52fc91c30cad1ae8991df07bb70
                                                • Instruction ID: 50a9fdd74308f0d8ebb1cdc1d07ca92b67f8c253bfd232ccf57e80b11fb690ab
                                                • Opcode Fuzzy Hash: bc516a2bab0fd2dabb31f38c09fe13686d8bc52fc91c30cad1ae8991df07bb70
                                                • Instruction Fuzzy Hash: 3441F270D04618CFDB25DFAAC884BDEBBB5FF49304F24846AD408AB251DBB59946CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 251 8a77470-8a774c6 253 8a774d6-8a77515 WriteProcessMemory 251->253 254 8a774c8-8a774d4 251->254 256 8a77517-8a7751d 253->256 257 8a7751e-8a7754e 253->257 254->253 256->257
                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08A77508
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.804132090.0000000008A70000.00000040.00000001.sdmp, Offset: 08A70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_8a70000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: 8304331bbae7feb3f18b81f9490f7081f74f5ccea5649d5059b8272c4f98cfeb
                                                • Instruction ID: b5a4a385802f3fd028ea460bb74522d4838eae4e600408cf13cfc827bb1e7ad5
                                                • Opcode Fuzzy Hash: 8304331bbae7feb3f18b81f9490f7081f74f5ccea5649d5059b8272c4f98cfeb
                                                • Instruction Fuzzy Hash: 2A2146B59002199FCF00CFA9C9807EEBBF5FF48314F10882AE918A7640D7789955DBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 261 8a77478-8a774c6 263 8a774d6-8a77515 WriteProcessMemory 261->263 264 8a774c8-8a774d4 261->264 266 8a77517-8a7751d 263->266 267 8a7751e-8a7754e 263->267 264->263 266->267
                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08A77508
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.804132090.0000000008A70000.00000040.00000001.sdmp, Offset: 08A70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_8a70000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: c954576040d16478f654056a87fb0f6cdbc3de625755719ae869016f89522765
                                                • Instruction ID: c0859d0d71e4a0baf4cd090c49350bfa6d17eae4362a205855d6893390faca8d
                                                • Opcode Fuzzy Hash: c954576040d16478f654056a87fb0f6cdbc3de625755719ae869016f89522765
                                                • Instruction Fuzzy Hash: C42124B19003499FCF10CFA9C984BEEBBF5FF48314F50882AE919A7640D7789954DBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 271 8a772da-8a7732b 273 8a7732d-8a77339 271->273 274 8a7733b-8a7736b SetThreadContext 271->274 273->274 276 8a77374-8a773a4 274->276 277 8a7736d-8a77373 274->277 277->276
                                                APIs
                                                • SetThreadContext.KERNELBASE(?,00000000), ref: 08A7735E
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.804132090.0000000008A70000.00000040.00000001.sdmp, Offset: 08A70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_8a70000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: ContextThread
                                                • String ID:
                                                • API String ID: 1591575202-0
                                                • Opcode ID: c49eb3ee770a528ce54df98823d478d85ef38863fc372e5a1e36733061fb30d7
                                                • Instruction ID: 620f015a6313a2ab3c6eeac867fe21843d48ee96b884e5b102e6c07cc12e5ff4
                                                • Opcode Fuzzy Hash: c49eb3ee770a528ce54df98823d478d85ef38863fc372e5a1e36733061fb30d7
                                                • Instruction Fuzzy Hash: D8213AB5D003098FCB10CFA9C5857EEBBF4AF48224F54842AD919AB740DB789945CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 281 8a77560-8a775f5 ReadProcessMemory 284 8a775f7-8a775fd 281->284 285 8a775fe-8a7762e 281->285 284->285
                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08A775E8
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.804132090.0000000008A70000.00000040.00000001.sdmp, Offset: 08A70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_8a70000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: 7cb373ce713ab8c8edb68fce3d89c5c5cbea768a19f1ba2a3cf47d9577e15f83
                                                • Instruction ID: 23522bffdf854b1306bd769ed1412b43239408258ae8bf86db26bf2572ed3525
                                                • Opcode Fuzzy Hash: 7cb373ce713ab8c8edb68fce3d89c5c5cbea768a19f1ba2a3cf47d9577e15f83
                                                • Instruction Fuzzy Hash: D12105B1D002499FCB10CFA9C9847EEBBB5BF48224F54882AD518A7640D7799954DBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 289 8a772e0-8a7732b 291 8a7732d-8a77339 289->291 292 8a7733b-8a7736b SetThreadContext 289->292 291->292 294 8a77374-8a773a4 292->294 295 8a7736d-8a77373 292->295 295->294
                                                APIs
                                                • SetThreadContext.KERNELBASE(?,00000000), ref: 08A7735E
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.804132090.0000000008A70000.00000040.00000001.sdmp, Offset: 08A70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_8a70000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: ContextThread
                                                • String ID:
                                                • API String ID: 1591575202-0
                                                • Opcode ID: f7f6af54d707ade031c001cfeb66a4dbae59cc2be9dd5643344741e6be2bc349
                                                • Instruction ID: 537bb3688f03951b2eccb7424340a25a7b39cd39969586a87f4358ea3e290d9e
                                                • Opcode Fuzzy Hash: f7f6af54d707ade031c001cfeb66a4dbae59cc2be9dd5643344741e6be2bc349
                                                • Instruction Fuzzy Hash: 262118B1D002098FDB10DFAAC4847EEBBF8EF48254F548429D919A7740DB78A945CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 299 8a77568-8a775f5 ReadProcessMemory 302 8a775f7-8a775fd 299->302 303 8a775fe-8a7762e 299->303 302->303
                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08A775E8
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.804132090.0000000008A70000.00000040.00000001.sdmp, Offset: 08A70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_8a70000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: 50b63d4959d858e194309c49f5599c3d8e75165daf1e9ceced783d3257d230c9
                                                • Instruction ID: d9b14b55c42cab6dbb0d9fc990d3311e808501f6248568a7675acd2b28f05e00
                                                • Opcode Fuzzy Hash: 50b63d4959d858e194309c49f5599c3d8e75165daf1e9ceced783d3257d230c9
                                                • Instruction Fuzzy Hash: CA2128B1C002499FCF10CFA9C880BEEBBF5FF48314F508429E518A7640D7789954DBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 307 140c0f0-140c18c DuplicateHandle 308 140c195-140c1b2 307->308 309 140c18e-140c194 307->309 309->308
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0140C17F
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.798747419.0000000001400000.00000040.00000001.sdmp, Offset: 01400000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_1400000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 0bbf48999b646a5a85f744878ad9a61cdd56d05332911ee4683645644c9ca188
                                                • Instruction ID: d818f8e1f2678bf6f7e91ed0baa3d9e4582b1f4ab245fe2a51adb92792e50697
                                                • Opcode Fuzzy Hash: 0bbf48999b646a5a85f744878ad9a61cdd56d05332911ee4683645644c9ca188
                                                • Instruction Fuzzy Hash: 9E21B3B5D00209DFDB10CFA9D584ADEBBF8FB48324F14852AE918A7350D378A954CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0140C17F
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.798747419.0000000001400000.00000040.00000001.sdmp, Offset: 01400000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_1400000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: d8385b6c49bec26bd1943c8d12becbc2a7afff309e8dc365c1666741706649bc
                                                • Instruction ID: 82007ad5d15044f6f0fa090111987bc7bfdff4786e17aefd8a8dad4f864a03b8
                                                • Opcode Fuzzy Hash: d8385b6c49bec26bd1943c8d12becbc2a7afff309e8dc365c1666741706649bc
                                                • Instruction Fuzzy Hash: 3421C6B5D00209DFDB10CFAAD584ADEBBF8FB48314F14852AE914A7350D374A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0140A191,00000800,00000000,00000000), ref: 0140A3A2
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.798747419.0000000001400000.00000040.00000001.sdmp, Offset: 01400000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_1400000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: 1444e95974a7160ebb8f4730d1096f9e26bdd1a31aee9d284237bf3464590345
                                                • Instruction ID: 3a758196a0ac5817b2b53f1f6de97d12f7251c751276ff8804d5dcc80709189b
                                                • Opcode Fuzzy Hash: 1444e95974a7160ebb8f4730d1096f9e26bdd1a31aee9d284237bf3464590345
                                                • Instruction Fuzzy Hash: 601103B69003098FDB10CF9AD444BDEFBF8AB58314F14842AE915A7350C3B8A945CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08A77426
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.804132090.0000000008A70000.00000040.00000001.sdmp, Offset: 08A70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_8a70000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: c76af5d1ce2b4aa8b8a6f001179d025d6a2dd38385951d10f09f813da81fa81c
                                                • Instruction ID: 9389aaf90f75ad418eb353d5e776c9f2a1421d96ca412d8949d6c7bb101a7d06
                                                • Opcode Fuzzy Hash: c76af5d1ce2b4aa8b8a6f001179d025d6a2dd38385951d10f09f813da81fa81c
                                                • Instruction Fuzzy Hash: 051189768002088FCF10CFE9C8447EEBBF9AF48324F14882AD519A7650CB799954CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 08A77426
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.804132090.0000000008A70000.00000040.00000001.sdmp, Offset: 08A70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_8a70000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: da3ee51fded656605feacbab8cdb06272f898f45e222c58cb5b5fbd2676b2ef6
                                                • Instruction ID: e3f51f7669949bd4c096c3e47c43b7a7c5029f9cfb1db6c8c097c90eda7add7a
                                                • Opcode Fuzzy Hash: da3ee51fded656605feacbab8cdb06272f898f45e222c58cb5b5fbd2676b2ef6
                                                • Instruction Fuzzy Hash: E41126759002099FCF10DFE9C844BEEBBF9AF48324F148829D519A7650CB759954DFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0140A191,00000800,00000000,00000000), ref: 0140A3A2
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.798747419.0000000001400000.00000040.00000001.sdmp, Offset: 01400000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_1400000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: 210871bf97c28088821589b9d1b8521dc1b3672e3538741b4b1d3b20359b3024
                                                • Instruction ID: 174916c80167e39dd68f66faa1891f59f33db46c2c0f67f0c08b16e8d3defdc7
                                                • Opcode Fuzzy Hash: 210871bf97c28088821589b9d1b8521dc1b3672e3538741b4b1d3b20359b3024
                                                • Instruction Fuzzy Hash: FB1114B69003498FDB14CFAAD444BDEFBF8AF98310F14842AD915A7740C3B8A545CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.804132090.0000000008A70000.00000040.00000001.sdmp, Offset: 08A70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_8a70000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: af3f03a17407609509de3a5e460e0b250b96ec7967977d2509623ed6a6b4becb
                                                • Instruction ID: 09243a5c91fc35234c09e977c96bffa32cd06779f6323a79664e03ea85897c85
                                                • Opcode Fuzzy Hash: af3f03a17407609509de3a5e460e0b250b96ec7967977d2509623ed6a6b4becb
                                                • Instruction Fuzzy Hash: C01158B5D002098FDB10DFE9C5447EEBBF9AF48224F24882AC529B7740DB799945CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.804132090.0000000008A70000.00000040.00000001.sdmp, Offset: 08A70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_8a70000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: 290a128a783d5b6d5a0f3e4de4bebb3ad3ee7d2389c15650ddc78ff78461bb24
                                                • Instruction ID: 3f8901a4374a41e9dc0624805be0aa56e34b256326162b8ae8d76213a9129690
                                                • Opcode Fuzzy Hash: 290a128a783d5b6d5a0f3e4de4bebb3ad3ee7d2389c15650ddc78ff78461bb24
                                                • Instruction Fuzzy Hash: 2F110AB1D042498FDB10DFAAC4447EFFBF9AF48224F148829D519A7740DB79A944CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0140A116
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.798747419.0000000001400000.00000040.00000001.sdmp, Offset: 01400000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_1400000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 810ca41b6d03ae5983ca01b5309f357036d727a77f55ced725357bdb5a95275f
                                                • Instruction ID: 7da821b1d34d78a2b25fb1d3fc02c1fcb13c7ffa8038a91c82343ca1cbbae5d6
                                                • Opcode Fuzzy Hash: 810ca41b6d03ae5983ca01b5309f357036d727a77f55ced725357bdb5a95275f
                                                • Instruction Fuzzy Hash: 1C110FB5C003498FDB10CF9AC444BDEFBF8AB88224F24842AD529B7750D379A545CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 08A79E15
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.804132090.0000000008A70000.00000040.00000001.sdmp, Offset: 08A70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_8a70000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: 6ddcfe499b4de840226f0a2ceea650e5495befff4acd505656567fbd3e708c07
                                                • Instruction ID: 2d15a957f8bfbcba948c075a89d3f61a911bab2dd5d6db7d773fb8d5360cd4ca
                                                • Opcode Fuzzy Hash: 6ddcfe499b4de840226f0a2ceea650e5495befff4acd505656567fbd3e708c07
                                                • Instruction Fuzzy Hash: 6B11F2B58002498FCB10CF99D984BDEBBF8FB48324F14842AD558A7700D379A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 08A79E15
                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.804132090.0000000008A70000.00000040.00000001.sdmp, Offset: 08A70000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_8a70000_tKZVPq.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: d081f2e7da2d5d35bda7f2618741e5760a19ce6d14a809597f215a7e5dc59f91
                                                • Instruction ID: 4cde7002a48f8c2537dafbb5353ad143fa534d0c534ced95853eee3d27f36e20
                                                • Opcode Fuzzy Hash: d081f2e7da2d5d35bda7f2618741e5760a19ce6d14a809597f215a7e5dc59f91
                                                • Instruction Fuzzy Hash: AC11C2B58003499FDB10DF99D984BDEBBF8FB48324F14841AD554A7700D379A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.798580965.00000000013AD000.00000040.00000001.sdmp, Offset: 013AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_13ad000_tKZVPq.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a9852933b093ce52029f14a6c77dece139803dd1ee9de4a3fc3ba500bf6aaf48
                                                • Instruction ID: 80fb28080f4b79bcb25005812462870b8cae8ab62febb5ede855f76878f5cfb0
                                                • Opcode Fuzzy Hash: a9852933b093ce52029f14a6c77dece139803dd1ee9de4a3fc3ba500bf6aaf48
                                                • Instruction Fuzzy Hash: F4213471544204DFCB11CFA4D8C4B26BBA9FB88358F60C969E80A4FB46C73AD847CB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.798580965.00000000013AD000.00000040.00000001.sdmp, Offset: 013AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_13ad000_tKZVPq.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3352643328cbeb29338111153fdf9c76a051b388debac7c43bae171f1b1e79be
                                                • Instruction ID: f35473e0032bdfe226e6a548ce1c700ab7cb491c925033e6f3b786c87892d70a
                                                • Opcode Fuzzy Hash: 3352643328cbeb29338111153fdf9c76a051b388debac7c43bae171f1b1e79be
                                                • Instruction Fuzzy Hash: 3D212975504204DFDB05CF94D9C4B2ABBA9FB8432CF64C96DE8094BB42C73AD846CB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.798580965.00000000013AD000.00000040.00000001.sdmp, Offset: 013AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_13ad000_tKZVPq.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f1bd06c66196a66e8da304e5eca9a60bc1fb39d758ccafa4ed05a898ff35ea23
                                                • Instruction ID: 98e848422aa2827ea34ff4660236438e38a52f0d4e8af306471df8e6580a40bd
                                                • Opcode Fuzzy Hash: f1bd06c66196a66e8da304e5eca9a60bc1fb39d758ccafa4ed05a898ff35ea23
                                                • Instruction Fuzzy Hash: AD2162755483809FCB03CF64D994B11BF71EF46214F28C5DAD8858F6A7C33A985ACB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 0000000A.00000002.798580965.00000000013AD000.00000040.00000001.sdmp, Offset: 013AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_10_2_13ad000_tKZVPq.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ad2a8cfca3367af31ed8fccdba65c6857044cb1be902d9aeec9971aaaa20cc2e
                                                • Instruction ID: 9c495f1ec1de08cdf89e93b07d7c117c8d5963d0fec4105754af4ad7287eca75
                                                • Opcode Fuzzy Hash: ad2a8cfca3367af31ed8fccdba65c6857044cb1be902d9aeec9971aaaa20cc2e
                                                • Instruction Fuzzy Hash: 19118B75504280DFDB12CF54D5C4B15BBB1FB84228F28C6AAD8494BA96C33AD45ACB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Non-executed Functions