Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
New Order.exe

Overview

General Information

Sample Name:New Order.exe
Analysis ID:626210
MD5:faa827279f0932969adb995b977f2a1e
SHA1:9f836961f492cb7083f29a0c9180c27a7ea406e2
SHA256:4ff77f4e72dd52708b1612318b205be3c750b6f6956363b6055b524bd89cf3fb
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • New Order.exe (PID: 6468 cmdline: "C:\Users\user\Desktop\New Order.exe" MD5: FAA827279F0932969ADB995B977F2A1E)
    • New Order.exe (PID: 6868 cmdline: {path} MD5: FAA827279F0932969ADB995B977F2A1E)
  • cleanup
{"Exfil Mode": "FTP", "FTP Host": "ftp://ftp.navetesilazi.ro/", "Username": "sunny@navetesilazi.ro", "Password": "u,S2gsd@*K7C"}
SourceRuleDescriptionAuthorStrings
00000004.00000000.292255451.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000000.292255451.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000004.00000002.519247653.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000004.00000002.519247653.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000004.00000000.290944064.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 15 entries
            SourceRuleDescriptionAuthorStrings
            0.2.New Order.exe.3606cd0.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.New Order.exe.3606cd0.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.New Order.exe.3606cd0.3.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x2ef16:$s1: get_kbok
                • 0x2f84a:$s2: get_CHoo
                • 0x304a5:$s3: set_passwordIsSet
                • 0x2ed1a:$s4: get_enableLog
                • 0x333c3:$s8: torbrowser
                • 0x31d9f:$s10: logins
                • 0x31717:$s11: credential
                • 0x2e10d:$g1: get_Clipboard
                • 0x2e11b:$g2: get_Keyboard
                • 0x2e128:$g3: get_Password
                • 0x2f6f8:$g4: get_CtrlKeyDown
                • 0x2f708:$g5: get_ShiftKeyDown
                • 0x2f719:$g6: get_AltKeyDown
                4.2.New Order.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  4.2.New Order.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    Click to see the 27 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 4.2.New Order.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "FTP Host": "ftp://ftp.navetesilazi.ro/", "Username": "sunny@navetesilazi.ro", "Password": "u,S2gsd@*K7C"}
                    Source: New Order.exeVirustotal: Detection: 37%Perma Link
                    Source: New Order.exeReversingLabs: Detection: 31%
                    Source: New Order.exeJoe Sandbox ML: detected
                    Source: 4.2.New Order.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 4.0.New Order.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 4.0.New Order.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 4.0.New Order.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 4.0.New Order.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 4.0.New Order.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: New Order.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: New Order.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_06A6D530

                    Networking

                    barindex
                    Source: Yara matchFile source: 4.2.New Order.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.New Order.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.New Order.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.New Order.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.New Order.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.New Order.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.New Order.exe.3606cd0.3.raw.unpack, type: UNPACKEDPE
                    Source: New Order.exe, 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ftp://ftp.navetesilazi.ro/sunny
                    Source: New Order.exe, 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: New Order.exe, 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                    Source: New Order.exe, 00000004.00000002.521962296.0000000002D30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.255603989.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: New Order.exe, 00000000.00000003.260043589.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263069055.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261800272.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260403237.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259679585.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260675550.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259189127.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262944790.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262794568.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260575464.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262733473.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261707286.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261734967.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261615691.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.264325169.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261594663.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
                    Source: New Order.exe, 00000000.00000003.260043589.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263069055.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261800272.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260403237.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259679585.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260675550.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259189127.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262944790.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262794568.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260575464.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262733473.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261707286.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261734967.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261615691.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.264325169.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261594663.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html6
                    Source: New Order.exe, 00000000.00000003.256313284.00000000053B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: New Order.exe, 00000000.00000003.261800272.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260403237.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261615691.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261594663.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261468260.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261962697.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260373768.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261487868.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260315925.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262215325.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261947858.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262371935.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262129266.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: New Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262215325.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262371935.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262129266.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262402257.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262187348.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262168734.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262236657.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262261834.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com.TTF
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: New Order.exe, 00000000.00000003.261707286.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261719581.00000000053FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlX
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                    Source: New Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261343363.00000000053FC000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261402977.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmlht
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: New Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261615691.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261594663.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261468260.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261487868.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261504574.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261054840.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261573979.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261195291.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260945047.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261520264.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261402977.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261265180.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261310707.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261284495.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
                    Source: New Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262215325.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262371935.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262129266.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261982834.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262402257.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262187348.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262168734.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261997015.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262236657.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262261834.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comG
                    Source: New Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262215325.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262371935.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262129266.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261982834.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262402257.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262187348.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262168734.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261997015.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262236657.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262261834.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comI.TTF
                    Source: New Order.exe, 00000000.00000003.267297280.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267127411.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.294277019.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267151398.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267521568.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267112661.00000000053F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
                    Source: New Order.exe, 00000000.00000003.261800272.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261707286.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261734967.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261615691.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261594663.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261468260.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261962697.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261487868.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262215325.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261947858.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262371935.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262129266.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261504574.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261776381.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261573979.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261750999.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261982834.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comaN
                    Source: New Order.exe, 00000000.00000003.260315925.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdQ
                    Source: New Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261468260.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261487868.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261504574.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261520264.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261402977.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdb
                    Source: New Order.exe, 00000000.00000003.261800272.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261962697.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262215325.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261947858.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262371935.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262129266.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261982834.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262402257.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261911453.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262187348.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262168734.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261997015.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262236657.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262261834.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261838549.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261930191.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262477906.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262431790.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdi
                    Source: New Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260864090.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261054840.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261195291.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260945047.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261265180.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260920245.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261310707.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261284495.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdt
                    Source: New Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261054840.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261195291.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260945047.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261265180.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261310707.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261284495.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessedb
                    Source: New Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261707286.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261734967.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261615691.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261594663.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261468260.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261487868.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261504574.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261776381.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261573979.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261750999.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261690313.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261520264.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261402977.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261670238.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessedi
                    Source: New Order.exe, 00000000.00000003.260403237.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260535172.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comld
                    Source: New Order.exe, 00000000.00000003.267127411.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267151398.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267112661.00000000053F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comldvP
                    Source: New Order.exe, 00000000.00000003.261707286.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comlic
                    Source: New Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261468260.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261487868.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261504574.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261054840.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261195291.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260945047.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261520264.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261402977.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261265180.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260920245.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261310707.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261284495.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comoitu
                    Source: New Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261707286.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261615691.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261594663.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260864090.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261468260.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261487868.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261504574.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261054840.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261573979.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261195291.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260945047.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261690313.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261520264.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261402977.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261265180.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260920245.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comony
                    Source: New Order.exe, 00000000.00000003.267297280.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267127411.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.294277019.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267151398.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267521568.00000000053F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comrsiva
                    Source: New Order.exe, 00000000.00000003.261800272.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261962697.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262215325.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261947858.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262371935.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262129266.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261776381.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261982834.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262402257.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261911453.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262187348.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262168734.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261997015.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262236657.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262261834.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261838549.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261930191.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262477906.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262431790.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comtuta
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: New Order.exe, 00000000.00000003.254695939.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.254580619.00000000053E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: New Order.exe, 00000000.00000003.255367660.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.255219858.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.255017818.00000000053EF000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.255127554.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.255187356.00000000053EF000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.255151097.00000000053ED000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.254970898.00000000053EF000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.255136855.00000000053EC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/L;;
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: New Order.exe, 00000000.00000003.254695939.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.254580619.00000000053E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnt
                    Source: New Order.exe, 00000000.00000003.263291014.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: New Order.exe, 00000000.00000003.263269630.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263528813.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263370715.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263353480.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263502565.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263983826.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263291014.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: New Order.exe, 00000000.00000003.256813993.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.256855458.00000000053EB000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.256943522.00000000053E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/#
                    Source: New Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258296537.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/2
                    Source: New Order.exe, 00000000.00000003.257146126.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258296537.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257263804.00000000053EB000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/4
                    Source: New Order.exe, 00000000.00000003.257146126.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257263804.00000000053EB000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257046797.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.256943522.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/G
                    Source: New Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Gras
                    Source: New Order.exe, 00000000.00000003.257146126.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257263804.00000000053EB000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257046797.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/N
                    Source: New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/P
                    Source: New Order.exe, 00000000.00000003.257146126.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257263804.00000000053EB000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257046797.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
                    Source: New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259597195.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260131394.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259941673.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259443452.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258929215.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259855092.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260100966.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259361235.00000000053F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
                    Source: New Order.exe, 00000000.00000003.257146126.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257263804.00000000053EB000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257046797.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/t
                    Source: New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ue
                    Source: New Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/wa
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: New Order.exe, 00000000.00000003.255250488.00000000053BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.
                    Source: New Order.exe, 00000000.00000003.255146264.00000000053EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: New Order.exe, 00000000.00000003.254052864.00000000053C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com;
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: New Order.exe, 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ySmlPP.com
                    Source: New Order.exe, 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gp8eppjNNQTPw.net
                    Source: New Order.exe, 00000004.00000003.502947482.0000000000CC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gp8eppjNNQTPw.net853321935-2125563209-4053062332-1002_Classes
                    Source: New Order.exe, 00000000.00000002.298887082.00000000034BF000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000004.00000000.292255451.0000000000402000.00000040.00000400.00020000.00000000.sdmp, New Order.exe, 00000004.00000000.290944064.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: New Order.exe, 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                    Source: New Order.exe, 00000000.00000002.295210516.000000000080A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    System Summary

                    barindex
                    Source: 0.2.New Order.exe.3606cd0.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 4.2.New Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.New Order.exe.24e4ef8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                    Source: 4.0.New Order.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 4.0.New Order.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 4.0.New Order.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 4.0.New Order.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 4.0.New Order.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.New Order.exe.3606cd0.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: New Order.exe PID: 6868, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: initial sampleStatic PE information: Filename: New Order.exe
                    Source: 4.2.New Order.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b04ABEA9Cu002dD42Du002d49B5u002dA531u002d8B2C266481EEu007d/u00373E4875Au002d7B70u002d4F11u002dBD68u002d29AE886A5E85.csLarge array initialization: .cctor: array initializer size 11948
                    Source: 4.0.New Order.exe.400000.12.unpack, u003cPrivateImplementationDetailsu003eu007b04ABEA9Cu002dD42Du002d49B5u002dA531u002d8B2C266481EEu007d/u00373E4875Au002d7B70u002d4F11u002dBD68u002d29AE886A5E85.csLarge array initialization: .cctor: array initializer size 11948
                    Source: 4.0.New Order.exe.400000.10.unpack, u003cPrivateImplementationDetailsu003eu007b04ABEA9Cu002dD42Du002d49B5u002dA531u002d8B2C266481EEu007d/u00373E4875Au002d7B70u002d4F11u002dBD68u002d29AE886A5E85.csLarge array initialization: .cctor: array initializer size 11948
                    Source: 4.0.New Order.exe.400000.6.unpack, u003cPrivateImplementationDetailsu003eu007b04ABEA9Cu002dD42Du002d49B5u002dA531u002d8B2C266481EEu007d/u00373E4875Au002d7B70u002d4F11u002dBD68u002d29AE886A5E85.csLarge array initialization: .cctor: array initializer size 11948
                    Source: New Order.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 0.2.New Order.exe.3606cd0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 4.2.New Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.New Order.exe.24e4ef8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                    Source: 4.0.New Order.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 4.0.New Order.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 4.0.New Order.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 4.0.New Order.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 4.0.New Order.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.New Order.exe.3606cd0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: New Order.exe PID: 6868, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_0246E5700_2_0246E570
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_0246E5800_2_0246E580
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_0246BCF40_2_0246BCF4
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A696180_2_06A69618
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A656580_2_06A65658
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A622500_2_06A62250
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A66B280_2_06A66B28
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A698980_2_06A69898
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A696170_2_06A69617
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A6AE600_2_06A6AE60
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A656480_2_06A65648
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A62DB80_2_06A62DB8
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A61DE00_2_06A61DE0
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A61DD00_2_06A61DD0
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A6750B0_2_06A6750B
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A69AEA0_2_06A69AEA
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A6722F0_2_06A6722F
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A672300_2_06A67230
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A662000_2_06A66200
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A60A680_2_06A60A68
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A622480_2_06A62248
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A60A580_2_06A60A58
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A61B870_2_06A61B87
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A61B880_2_06A61B88
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A693230_2_06A69323
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A693300_2_06A69330
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A69B030_2_06A69B03
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A66B180_2_06A66B18
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A69B610_2_06A69B61
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A69B450_2_06A69B45
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A6988B0_2_06A6988B
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A618080_2_06A61808
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A618180_2_06A61818
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A6206F0_2_06A6206F
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A620700_2_06A62070
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A661F80_2_06A661F8
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A671CC0_2_06A671CC
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_000620500_2_00062050
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_00C9C0A04_2_00C9C0A0
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_00C920204_2_00C92020
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_00C92D504_2_00C92D50
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_00C927684_2_00C92768
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_00C9F3084_2_00C9F308
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_00C9B9204_2_00C9B920
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_00E500404_2_00E50040
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_00E523084_2_00E52308
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_00E594604_2_00E59460
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_00E55EAC4_2_00E55EAC
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_00E5EFC84_2_00E5EFC8
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_00E5003D4_2_00E5003D
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_00E543E04_2_00E543E0
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_006320504_2_00632050
                    Source: New Order.exeBinary or memory string: OriginalFilename vs New Order.exe
                    Source: New Order.exe, 00000000.00000002.298887082.00000000034BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTPojXuVgRwvTuslAVhGVJFKrC.exe4 vs New Order.exe
                    Source: New Order.exe, 00000000.00000002.298887082.00000000034BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs New Order.exe
                    Source: New Order.exe, 00000000.00000002.295210516.000000000080A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs New Order.exe
                    Source: New Order.exe, 00000000.00000002.297102320.00000000024A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs New Order.exe
                    Source: New Order.exe, 00000000.00000002.297102320.00000000024A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTPojXuVgRwvTuslAVhGVJFKrC.exe4 vs New Order.exe
                    Source: New Order.exe, 00000000.00000003.280367821.0000000002AF2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs New Order.exe
                    Source: New Order.exe, 00000000.00000002.302500433.0000000006E20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs New Order.exe
                    Source: New Order.exeBinary or memory string: OriginalFilename vs New Order.exe
                    Source: New Order.exe, 00000004.00000000.292255451.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTPojXuVgRwvTuslAVhGVJFKrC.exe4 vs New Order.exe
                    Source: New Order.exe, 00000004.00000002.520356033.0000000000AF8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs New Order.exe
                    Source: New Order.exeBinary or memory string: OriginalFilenameBHMCc.exe8 vs New Order.exe
                    Source: New Order.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: New Order.exeVirustotal: Detection: 37%
                    Source: New Order.exeReversingLabs: Detection: 31%
                    Source: New Order.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\New Order.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\New Order.exe "C:\Users\user\Desktop\New Order.exe"
                    Source: C:\Users\user\Desktop\New Order.exeProcess created: C:\Users\user\Desktop\New Order.exe {path}
                    Source: C:\Users\user\Desktop\New Order.exeProcess created: C:\Users\user\Desktop\New Order.exe {path}Jump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\New Order.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\New Order.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New Order.exe.logJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@0/0
                    Source: C:\Users\user\Desktop\New Order.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: 4.2.New Order.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 4.2.New Order.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 4.0.New Order.exe.400000.12.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 4.0.New Order.exe.400000.12.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 4.0.New Order.exe.400000.10.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 4.0.New Order.exe.400000.10.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\New Order.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: New Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: New Order.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_000676A7 push es; retf 0_2_000676BE
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_000676BF push es; retf 0_2_000676D6
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A67B27 push es; retf A679h0_2_06A67B40
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A6536D push es; ret 0_2_06A65380
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A640E0 push edi; iretd 0_2_06A640E3
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A640D6 push edi; iretd 0_2_06A640D9
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A66847 push es; retf 0_2_06A66850
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A61190 push esp; iretd 0_2_06A61191
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 0_2_06A69153 push es; retf 0_2_06A69154
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_006376A7 push es; retf 4_2_006376BE
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_006376BF push es; retf 4_2_006376D6
                    Source: C:\Users\user\Desktop\New Order.exeCode function: 4_2_00C97A37 push edi; retn 0000h4_2_00C97A39
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.85321118232
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 6468, type: MEMORYSTR
                    Source: New Order.exe, 00000000.00000002.298637921.0000000002A0F000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000002.297102320.00000000024A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                    Source: New Order.exe, 00000000.00000002.298637921.0000000002A0F000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000002.297102320.00000000024A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\New Order.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\New Order.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\New Order.exe TID: 6488Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exe TID: 6252Thread sleep count: 37 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\New Order.exe TID: 6252Thread sleep time: -34126476536362649s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exe TID: 6292Thread sleep count: 5029 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\New Order.exe TID: 6292Thread sleep count: 4780 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeWindow / User API: threadDelayed 5029Jump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeWindow / User API: threadDelayed 4780Jump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\New Order.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\New Order.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: New Order.exe, 00000000.00000002.297102320.00000000024A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                    Source: New Order.exe, 00000000.00000002.297102320.00000000024A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: New Order.exe, 00000000.00000002.297102320.00000000024A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: New Order.exe, 00000000.00000002.297102320.00000000024A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                    Source: New Order.exe, 00000000.00000002.297102320.00000000024A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                    Source: New Order.exe, 00000000.00000002.297102320.00000000024A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: New Order.exe, 00000000.00000002.297102320.00000000024A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                    Source: New Order.exe, 00000000.00000002.297102320.00000000024A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: New Order.exe, 00000000.00000002.297102320.00000000024A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                    Source: C:\Users\user\Desktop\New Order.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\New Order.exeMemory written: C:\Users\user\Desktop\New Order.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeProcess created: C:\Users\user\Desktop\New Order.exe {path}Jump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Users\user\Desktop\New Order.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Users\user\Desktop\New Order.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.New Order.exe.3606cd0.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.New Order.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.New Order.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.New Order.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.New Order.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.New Order.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.New Order.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.New Order.exe.3606cd0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000000.292255451.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.519247653.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000000.290944064.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000000.292766510.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000000.291441736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.298887082.00000000034BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 6468, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 6868, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\New Order.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\New Order.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: Yara matchFile source: 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 6868, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.New Order.exe.3606cd0.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.New Order.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.New Order.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.New Order.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.New Order.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.New Order.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.0.New Order.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.New Order.exe.3606cd0.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000000.292255451.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.519247653.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000000.290944064.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000000.292766510.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000000.291441736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.298887082.00000000034BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 6468, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: New Order.exe PID: 6868, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    Path Interception111
                    Process Injection
                    1
                    Masquerading
                    2
                    OS Credential Dumping
                    211
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Disable or Modify Tools
                    1
                    Input Capture
                    1
                    Process Discovery
                    Remote Desktop Protocol1
                    Input Capture
                    Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                    Virtualization/Sandbox Evasion
                    1
                    Credentials in Registry
                    131
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares11
                    Archive Collected Data
                    Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object Model2
                    Data from Local System
                    Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets114
                    System Information Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common3
                    Obfuscated Files or Information
                    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items3
                    Software Packing
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    New Order.exe38%VirustotalBrowse
                    New Order.exe32%ReversingLabsByteCode-MSIL.Trojan.Pwsx
                    New Order.exe100%Joe Sandbox ML
                    No Antivirus matches
                    SourceDetectionScannerLabelLinkDownload
                    4.2.New Order.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    4.0.New Order.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    4.0.New Order.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    4.0.New Order.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    4.0.New Order.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    4.0.New Order.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://www.tiro.com;0%Avira URL Cloudsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://www.fontbureau.comI.TTF0%URL Reputationsafe
                    http://www.fontbureau.comessedi0%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/ue0%URL Reputationsafe
                    http://www.fontbureau.comessedb0%Avira URL Cloudsafe
                    https://gp8eppjNNQTPw.net0%Avira URL Cloudsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.carterandcone.com0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.fontbureau.comony0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://www.ascendercorp.com/typedesigners.html60%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/40%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/20%URL Reputationsafe
                    http://www.founder.com.cn/cnt0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/Y00%URL Reputationsafe
                    http://www.founder.com.cn/cn/L;;0%Avira URL Cloudsafe
                    http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/#0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    http://www.fontbureau.com.TTF0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    http://www.fontbureau.comtuta0%Avira URL Cloudsafe
                    http://ySmlPP.com0%Avira URL Cloudsafe
                    http://www.galapagosdesign.com/0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://www.fontbureau.comdt0%Avira URL Cloudsafe
                    http://www.fontbureau.comF0%URL Reputationsafe
                    http://www.fontbureau.comaN0%Avira URL Cloudsafe
                    http://www.fontbureau.comG0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/wa0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    ftp://ftp.navetesilazi.ro/sunny0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/P0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/N0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/G0%URL Reputationsafe
                    http://www.fontbureau.comldvP0%Avira URL Cloudsafe
                    https://gp8eppjNNQTPw.net853321935-2125563209-4053062332-1002_Classes0%Avira URL Cloudsafe
                    http://www.fontbureau.comdb0%Avira URL Cloudsafe
                    http://www.fontbureau.comlic0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/Gras0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                    http://www.fontbureau.coma0%URL Reputationsafe
                    http://www.fontbureau.comdi0%Avira URL Cloudsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.tiro.0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://www.fontbureau.comdQ0%Avira URL Cloudsafe
                    http://www.fontbureau.comoitu0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/t0%URL Reputationsafe
                    http://www.fontbureau.comld0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.fontbureau.comrsiva0%URL Reputationsafe
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.tiro.com;New Order.exe, 00000000.00000003.254052864.00000000053C5000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://127.0.0.1:HTTP/1.1New Order.exe, 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.fontbureau.com/designersGNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comI.TTFNew Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262215325.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262371935.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262129266.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261982834.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262402257.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262187348.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262168734.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261997015.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262236657.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262261834.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.comessediNew Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261707286.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261734967.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261615691.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261594663.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261468260.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261487868.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261504574.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261776381.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261573979.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261750999.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261690313.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261520264.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261402977.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261670238.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designers/?New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bTheNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/ueNew Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers?New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comessedbNew Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261054840.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261195291.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260945047.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261265180.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261310707.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261284495.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://gp8eppjNNQTPw.netNew Order.exe, 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.tiro.comNew Order.exe, 00000000.00000003.255146264.00000000053EA000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.goodfont.co.krNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comNew Order.exe, 00000000.00000003.256313284.00000000053B3000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.comNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/cTheNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comonyNew Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261707286.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261615691.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261594663.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260864090.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261468260.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261487868.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261504574.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261054840.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261573979.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261195291.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260945047.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261690313.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261520264.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261402977.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261265180.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260920245.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmNew Order.exe, 00000000.00000003.263269630.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263528813.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263370715.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263353480.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263502565.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263983826.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263291014.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.ascendercorp.com/typedesigners.html6New Order.exe, 00000000.00000003.260043589.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263069055.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261800272.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260403237.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259679585.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260675550.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259189127.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262944790.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262794568.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260575464.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262733473.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261707286.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261734967.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261615691.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.264325169.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261594663.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/4New Order.exe, 00000000.00000003.257146126.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258296537.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257263804.00000000053EB000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/2New Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258296537.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cntNew Order.exe, 00000000.00000003.254695939.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.254580619.00000000053E9000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.jiyu-kobo.co.jp/Y0New Order.exe, 00000000.00000003.257146126.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257263804.00000000053EB000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257046797.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cn/L;;New Order.exe, 00000000.00000003.255367660.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.255219858.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.255017818.00000000053EF000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.255127554.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.255187356.00000000053EF000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.255151097.00000000053ED000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.254970898.00000000053EF000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.255136855.00000000053EC000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.ascendercorp.com/typedesigners.htmlNew Order.exe, 00000000.00000003.260043589.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.263069055.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261800272.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260403237.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259679585.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260675550.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259189127.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262944790.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262794568.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260575464.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262733473.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261707286.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261734967.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261615691.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.264325169.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261594663.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fonts.comNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.sandoll.co.krNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/#New Order.exe, 00000000.00000003.256813993.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.256855458.00000000053EB000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.256943522.00000000053E9000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.urwpp.deDPleaseNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.zhongyicts.com.cnNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameNew Order.exe, 00000004.00000002.521962296.0000000002D30000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sakkal.comNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com.TTFNew Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262215325.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262371935.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262129266.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262402257.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262187348.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262168734.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262236657.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262261834.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipNew Order.exe, 00000000.00000002.298887082.00000000034BF000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000004.00000000.292255451.0000000000402000.00000040.00000400.00020000.00000000.sdmp, New Order.exe, 00000004.00000000.290944064.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comtutaNew Order.exe, 00000000.00000003.261800272.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261962697.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262215325.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261947858.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262371935.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262129266.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261776381.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261982834.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262402257.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261911453.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262187348.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262168734.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261997015.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262236657.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262261834.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261838549.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261930191.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262477906.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262431790.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://ySmlPP.comNew Order.exe, 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.apache.org/licenses/LICENSE-2.0New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.255603989.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.comNew Order.exe, 00000000.00000003.261800272.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260403237.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261615691.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261594663.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261468260.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261962697.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260373768.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261487868.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260315925.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262215325.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261947858.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262371935.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262129266.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.galapagosdesign.com/New Order.exe, 00000000.00000003.263291014.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://DynDns.comDynDNSNew Order.exe, 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comdtNew Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260864090.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261054840.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261195291.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260945047.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261265180.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260920245.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261310707.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261284495.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.comFNew Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261615691.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261594663.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261468260.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261487868.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261504574.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261054840.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261573979.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261195291.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260945047.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261520264.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261402977.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261265180.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261310707.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261284495.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comaNNew Order.exe, 00000000.00000003.261800272.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261707286.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261734967.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261615691.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261594663.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261468260.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261962697.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261487868.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262215325.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261947858.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262371935.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262129266.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261504574.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261776381.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261573979.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261750999.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261982834.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.comGNew Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262215325.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262371935.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262129266.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261982834.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262402257.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262187348.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262168734.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261997015.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262236657.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262261834.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/waNew Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haNew Order.exe, 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    ftp://ftp.navetesilazi.ro/sunnyNew Order.exe, 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/PNew Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/NNew Order.exe, 00000000.00000003.257146126.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257263804.00000000053EB000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257046797.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/GNew Order.exe, 00000000.00000003.257146126.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257263804.00000000053EB000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257046797.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.256943522.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comldvPNew Order.exe, 00000000.00000003.267127411.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267151398.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267112661.00000000053F5000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://gp8eppjNNQTPw.net853321935-2125563209-4053062332-1002_ClassesNew Order.exe, 00000004.00000003.502947482.0000000000CC4000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    low
                                    http://www.fontbureau.comdbNew Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261468260.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261487868.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261504574.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261520264.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261402977.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.comlicNew Order.exe, 00000000.00000003.261707286.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/GrasNew Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/jp/New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259597195.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260131394.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259941673.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259443452.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258929215.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259855092.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260100966.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.259361235.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comaNew Order.exe, 00000000.00000003.267297280.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267127411.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.294277019.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267151398.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267521568.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267112661.00000000053F5000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comdiNew Order.exe, 00000000.00000003.261800272.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262150037.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262074018.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261962697.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262215325.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261947858.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262371935.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262129266.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261982834.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262402257.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261911453.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262187348.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262168734.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261997015.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262236657.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262261834.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261838549.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261930191.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262477906.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.262431790.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.carterandcone.comlNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.tiro.New Order.exe, 00000000.00000003.255250488.00000000053BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cnNew Order.exe, 00000000.00000003.254695939.00000000053EA000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.254580619.00000000053E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-jones.htmlNew Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fontbureau.comdQNew Order.exe, 00000000.00000003.260315925.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.fontbureau.comoituNew Order.exe, 00000000.00000003.261536074.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261242239.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261008326.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261468260.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261487868.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261504574.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261054840.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261195291.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260945047.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261520264.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261402977.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261265180.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260920245.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261310707.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261284495.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.jiyu-kobo.co.jp/tNew Order.exe, 00000000.00000003.257146126.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257696041.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257978806.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257924602.00000000053F0000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257263804.00000000053EB000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.258046006.00000000053EE000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257046797.00000000053E9000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257543837.00000000053F2000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.comldNew Order.exe, 00000000.00000003.260403237.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.260535172.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.jiyu-kobo.co.jp/New Order.exe, 00000000.00000003.257483589.00000000053F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.comrsivaNew Order.exe, 00000000.00000003.267297280.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267127411.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.294277019.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267151398.00000000053F5000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.267521568.00000000053F5000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers/cabarga.htmlXNew Order.exe, 00000000.00000003.261707286.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261719581.00000000053FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.fontbureau.com/designers8New Order.exe, 00000000.00000002.301860506.0000000006642000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.com/designers/frere-jones.htmlhtNew Order.exe, 00000000.00000003.261363692.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261343363.00000000053FC000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261329710.00000000053F3000.00000004.00000800.00020000.00000000.sdmp, New Order.exe, 00000000.00000003.261402977.00000000053F3000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              No contacted IP infos
                                              Joe Sandbox Version:34.0.0 Boulder Opal
                                              Analysis ID:626210
                                              Start date and time: 13/05/202217:43:122022-05-13 17:43:12 +02:00
                                              Joe Sandbox Product:CloudBasic
                                              Overall analysis duration:0h 9m 25s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Sample file name:New Order.exe
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                              Number of analysed new started processes analysed:25
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • HDC enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winEXE@3/1@0/0
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HDC Information:Failed
                                              HCA Information:
                                              • Successful, ratio: 97%
                                              • Number of executed functions: 57
                                              • Number of non-executed functions: 24
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Adjust boot time
                                              • Enable AMSI
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              TimeTypeDescription
                                              17:44:27API Interceptor609x Sleep call for process: New Order.exe modified
                                              No context
                                              No context
                                              No context
                                              No context
                                              No context
                                              Process:C:\Users\user\Desktop\New Order.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1216
                                              Entropy (8bit):5.355304211458859
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                              MD5:69206D3AF7D6EFD08F4B4726998856D3
                                              SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                              SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                              SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):7.84777519780579
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Windows Screen Saver (13104/52) 0.07%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              File name:New Order.exe
                                              File size:827904
                                              MD5:faa827279f0932969adb995b977f2a1e
                                              SHA1:9f836961f492cb7083f29a0c9180c27a7ea406e2
                                              SHA256:4ff77f4e72dd52708b1612318b205be3c750b6f6956363b6055b524bd89cf3fb
                                              SHA512:b318977b0acd2930160e015ede39d4c110a7b3c2c63e9e1d4200ce53039a3c6937b0aad97cba5222f1925b5cd7f2117c0d182c443756d75b0421cdcc13280601
                                              SSDEEP:24576:Y1+MlTwFRZdknMjjGQVM63WlhtQm+d2s51bsnEpSjR:+VwFRZWOaQSLlj9+d11Invj
                                              TLSH:870502253B2C7D11E5A7DB349590C11881B6BC6FBE33F22A2E973D8F1D097418671AB2
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....]~b..............P.............Z.... ........@.. ....................................@................................
                                              Icon Hash:00828e8e8686b000
                                              Entrypoint:0x4cb65a
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                              Time Stamp:0x627E5DBC [Fri May 13 13:31:40 2022 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:v4.0.30319
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              or al, byte ptr [eax+00h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [esi], cl
                                              inc eax
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              adc byte ptr [eax+00h], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax+eax*2], cl
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              adc dword ptr [eax+00h], eax
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xcb6080x4f.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xcc0000x5a4.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xce0000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000xc96880xc9800False0.900231903303data7.85321118232IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                              .rsrc0xcc0000x5a40x600False0.421223958333data4.08556644653IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0xce0000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountry
                                              RT_VERSION0xcc0900x314data
                                              RT_MANIFEST0xcc3b40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              DescriptionData
                                              Translation0x0000 0x04b0
                                              LegalCopyrightCopyright 2017
                                              Assembly Version1.0.0.0
                                              InternalNameBHMCc.exe
                                              FileVersion1.0.0.0
                                              CompanyName
                                              LegalTrademarks
                                              Comments
                                              ProductNameCoffee Shop
                                              ProductVersion1.0.0.0
                                              FileDescriptionCoffee Shop
                                              OriginalFilenameBHMCc.exe
                                              No network behavior found

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:17:44:15
                                              Start date:13/05/2022
                                              Path:C:\Users\user\Desktop\New Order.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\New Order.exe"
                                              Imagebase:0x60000
                                              File size:827904 bytes
                                              MD5 hash:FAA827279F0932969ADB995B977F2A1E
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.298887082.00000000034BF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.298887082.00000000034BF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low

                                              Target ID:4
                                              Start time:17:44:34
                                              Start date:13/05/2022
                                              Path:C:\Users\user\Desktop\New Order.exe
                                              Wow64 process (32bit):true
                                              Commandline:{path}
                                              Imagebase:0x630000
                                              File size:827904 bytes
                                              MD5 hash:FAA827279F0932969ADB995B977F2A1E
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000000.292255451.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000000.292255451.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.519247653.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000002.519247653.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000000.290944064.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000000.290944064.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000000.292766510.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000000.292766510.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000000.291441736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000000.291441736.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000004.00000002.521456203.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                              Reputation:low

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:11%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:21.3%
                                                Total number of Nodes:169
                                                Total number of Limit Nodes:16
                                                execution_graph 16926 6a64804 16930 6a65550 16926->16930 16933 6a65548 16926->16933 16927 6a64815 16931 6a65598 VirtualProtect 16930->16931 16932 6a655d2 16931->16932 16932->16927 16934 6a65598 VirtualProtect 16933->16934 16935 6a655d2 16934->16935 16935->16927 16900 246be00 DuplicateHandle 16901 246be96 16900->16901 16902 6a6be60 16903 6a6bea3 VirtualAllocEx 16902->16903 16904 6a6beda 16903->16904 16905 6a6c160 16906 6a6c2eb 16905->16906 16908 6a6c186 16905->16908 16908->16906 16911 246ff40 SetWindowLongW 16908->16911 16913 246ff38 SetWindowLongW 16908->16913 16915 6a6b918 16908->16915 16912 246ffac 16911->16912 16912->16908 16914 246ffac 16913->16914 16914->16908 16916 6a6c3e0 PostMessageW 16915->16916 16917 6a6c44c 16916->16917 16917->16908 16936 6a6c0c0 16937 6a6c101 ResumeThread 16936->16937 16938 6a6c12e 16937->16938 16939 24668a0 16940 24668b7 16939->16940 16943 24655e4 16940->16943 16942 24668c4 16944 24655ef 16943->16944 16947 246568c 16944->16947 16946 2466995 16946->16942 16948 2465697 16947->16948 16951 24656bc 16948->16951 16950 2466a7a 16950->16946 16952 24656c7 16951->16952 16955 24656ec 16952->16955 16954 2466b6a 16954->16950 16956 24656f7 16955->16956 16957 24672bc 16956->16957 16959 246b4f8 16956->16959 16957->16954 16961 246b529 16959->16961 16960 246b54d 16960->16957 16961->16960 16964 246b6aa 16961->16964 16968 246b6b8 16961->16968 16966 246b6c5 16964->16966 16965 246b6ff 16965->16960 16966->16965 16972 2469e74 16966->16972 16969 246b6c5 16968->16969 16970 246b6ff 16969->16970 16971 2469e74 2 API calls 16969->16971 16970->16960 16971->16970 16973 2469e7f 16972->16973 16975 246c3f8 16973->16975 16976 246ba24 16973->16976 16977 246ba2f 16976->16977 16978 24656ec 2 API calls 16977->16978 16979 246c467 16977->16979 16978->16979 16980 246c4a0 16979->16980 16983 246e1f0 16979->16983 16989 246e1d8 16979->16989 16980->16975 16985 246e26e 16983->16985 16986 246e221 16983->16986 16984 246e22d 16984->16980 16985->16980 16986->16984 16995 246e528 16986->16995 16998 246e538 16986->16998 16991 246e221 16989->16991 16992 246e26e 16989->16992 16990 246e22d 16990->16980 16991->16990 16993 246e528 2 API calls 16991->16993 16994 246e538 2 API calls 16991->16994 16992->16980 16993->16992 16994->16992 16996 24694e8 LoadLibraryExW GetModuleHandleW 16995->16996 16997 246e541 16996->16997 16997->16985 16999 24694e8 LoadLibraryExW GetModuleHandleW 16998->16999 17000 246e541 16998->17000 16999->17000 17000->16985 16918 246b7d0 GetCurrentProcess 16919 246b843 16918->16919 16920 246b84a GetCurrentThread 16918->16920 16919->16920 16921 246b887 GetCurrentProcess 16920->16921 16922 246b880 16920->16922 16923 246b8bd 16921->16923 16922->16921 16924 246b8e5 GetCurrentThreadId 16923->16924 16925 246b916 16924->16925 17009 6a6bd90 17010 6a6bddb ReadProcessMemory 17009->17010 17011 6a6be1e 17010->17011 17012 6a692d0 17013 6a692ed 17012->17013 17017 6a69617 17013->17017 17027 6a69618 17013->17027 17014 6a69310 17018 6a6963f 17017->17018 17019 6a6975e 17018->17019 17037 6a69aea 17018->17037 17041 6a69b61 17018->17041 17045 6a69b03 17018->17045 17049 6a69b45 17018->17049 17053 6a69d26 17018->17053 17057 6a69898 17018->17057 17061 6a6988b 17018->17061 17019->17014 17028 6a6963f 17027->17028 17029 6a6975e 17028->17029 17030 6a69d26 WriteProcessMemory 17028->17030 17031 6a69b45 CreateProcessW 17028->17031 17032 6a69b03 CreateProcessW 17028->17032 17033 6a69b61 CreateProcessW 17028->17033 17034 6a69aea CreateProcessW 17028->17034 17035 6a6988b CreateProcessW 17028->17035 17036 6a69898 CreateProcessW 17028->17036 17029->17014 17030->17028 17031->17028 17032->17028 17033->17028 17034->17028 17035->17028 17036->17028 17039 6a6990d 17037->17039 17038 6a69ae2 17038->17018 17039->17037 17039->17038 17065 6a6b558 17039->17065 17043 6a6990d 17041->17043 17042 6a69ae2 17042->17018 17043->17042 17044 6a6b558 CreateProcessW 17043->17044 17044->17043 17047 6a6990d 17045->17047 17046 6a69ae2 17046->17018 17047->17046 17048 6a6b558 CreateProcessW 17047->17048 17048->17047 17051 6a6990d 17049->17051 17050 6a69ae2 17050->17018 17051->17050 17052 6a6b558 CreateProcessW 17051->17052 17052->17051 17054 6a69d2f 17053->17054 17069 6a6bf08 17054->17069 17058 6a698cb 17057->17058 17059 6a69ae2 17058->17059 17060 6a6b558 CreateProcessW 17058->17060 17059->17018 17060->17058 17062 6a698cb 17061->17062 17063 6a69ae2 17062->17063 17064 6a6b558 CreateProcessW 17062->17064 17063->17018 17064->17062 17066 6a6b5d7 CreateProcessW 17065->17066 17068 6a6b6c0 17066->17068 17070 6a6bf53 WriteProcessMemory 17069->17070 17072 6a69d5b 17070->17072 17073 6a6bcd0 17074 6a6bd18 SetThreadContext 17073->17074 17076 6a6bd56 17074->17076 17077 24693f0 17078 24693ff 17077->17078 17081 24694d8 17077->17081 17089 24694e8 17077->17089 17082 24694fb 17081->17082 17083 2469513 17082->17083 17097 2469770 17082->17097 17101 2469760 17082->17101 17083->17078 17084 246950b 17084->17083 17085 2469710 GetModuleHandleW 17084->17085 17086 246973d 17085->17086 17086->17078 17090 24694fb 17089->17090 17091 2469513 17090->17091 17095 2469760 LoadLibraryExW 17090->17095 17096 2469770 LoadLibraryExW 17090->17096 17091->17078 17092 246950b 17092->17091 17093 2469710 GetModuleHandleW 17092->17093 17094 246973d 17093->17094 17094->17078 17095->17092 17096->17092 17098 2469784 17097->17098 17100 24697a9 17098->17100 17105 2468890 17098->17105 17100->17084 17102 2469784 17101->17102 17103 24697a9 17102->17103 17104 2468890 LoadLibraryExW 17102->17104 17103->17084 17104->17103 17106 2469950 LoadLibraryExW 17105->17106 17108 24699c9 17106->17108 17108->17100 17109 6a6331f 17111 6a65550 VirtualProtect 17109->17111 17112 6a65548 VirtualProtect 17109->17112 17110 6a63333 17111->17110 17112->17110 17125 246fcf8 17126 246fd60 CreateWindowExW 17125->17126 17128 246fe1c 17126->17128
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: {3/
                                                • API String ID: 0-2911790921
                                                • Opcode ID: 00b81e5d62c2e1ef869fcfd79d08dadb05b238e600bc8e657296d742b0b02e40
                                                • Instruction ID: 34c1e15717ca49f92fd440ba475963640dbadb6379b80b4d7facc05d05159e04
                                                • Opcode Fuzzy Hash: 00b81e5d62c2e1ef869fcfd79d08dadb05b238e600bc8e657296d742b0b02e40
                                                • Instruction Fuzzy Hash: 29B13674E04259CFCB44EFAAC94059EFBF2FF89310F24D52AE405AB215E734A941CBA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: {3/
                                                • API String ID: 0-2911790921
                                                • Opcode ID: 3c57e720fce91bf5a3ec5bcabd9c9f03f200ff20bcba85c3691321d0d50cfa79
                                                • Instruction ID: 6f3e68eb833388bcf41ba2de47f8f137bb623cd7bf019d3ee7b8485ce419363f
                                                • Opcode Fuzzy Hash: 3c57e720fce91bf5a3ec5bcabd9c9f03f200ff20bcba85c3691321d0d50cfa79
                                                • Instruction Fuzzy Hash: B9B15874E04259CFCB44DFAAC94059EFBF2FF89310F14D52AE405AB219E734A902CBA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: mtG
                                                • API String ID: 0-2219882087
                                                • Opcode ID: 3073d7b25255db2c013a1b5a411f4f2ea1b9c07b49449802742167eb0c1ae84e
                                                • Instruction ID: 16e34651ef1877460057ac634a7655aa83addf44cbe3a6fd282d487fac81aa0e
                                                • Opcode Fuzzy Hash: 3073d7b25255db2c013a1b5a411f4f2ea1b9c07b49449802742167eb0c1ae84e
                                                • Instruction Fuzzy Hash: 71514874D0A209DFDB44DFA6E580ADEFBF6EB89310F24902AE406BB254D7748941CF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: mtG
                                                • API String ID: 0-2219882087
                                                • Opcode ID: 6124c7fa37c93672d26271159a48f7b35586d0f334df9e64481ded5358094485
                                                • Instruction ID: f6b0cfd8cae3c38c3d93322b40ad91315b0e21d5f693f79ac30632791b1eda5c
                                                • Opcode Fuzzy Hash: 6124c7fa37c93672d26271159a48f7b35586d0f334df9e64481ded5358094485
                                                • Instruction Fuzzy Hash: 15514874D0A209DFDB44DFA6E580ADEFBF2EB89310F24942AE406BB254D7348941CF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e0964619fb29a8bf1fa7306c61666940e6d9a279a82ff917e3598e7b75bd6c13
                                                • Instruction ID: 62208092f66fbb188adf2ff0bae97cd8ec85382796abedb81351fde3a7173126
                                                • Opcode Fuzzy Hash: e0964619fb29a8bf1fa7306c61666940e6d9a279a82ff917e3598e7b75bd6c13
                                                • Instruction Fuzzy Hash: E6D15978E08205DFDB48EFA9D68498DBFF2FB89315B14C4A9E405EB264E734A940CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 712bfbd82c1b6cdcd007e63f043976dec3575eb2c0ded1b6a1e84ab936ac15e0
                                                • Instruction ID: 2b9c10e46ea2b5435143ceea312f70c02ddefcf06997f84a7a42d1dc7b4e2bba
                                                • Opcode Fuzzy Hash: 712bfbd82c1b6cdcd007e63f043976dec3575eb2c0ded1b6a1e84ab936ac15e0
                                                • Instruction Fuzzy Hash: B0C16A78E04205DFDB48EFA9D68498DBFF2FB89315B14C469E405EB268E738A941CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 77aa16ce8e5089bef7e800379901e6d1a03d423224acd3780ae88f3396895281
                                                • Instruction ID: 38653aa80ffb9261583ea534f4751b23b5373f0c91cdd4759972f0a4c8ba2392
                                                • Opcode Fuzzy Hash: 77aa16ce8e5089bef7e800379901e6d1a03d423224acd3780ae88f3396895281
                                                • Instruction Fuzzy Hash: B3714971E4562A8FDB68CF66CD44B9AF7B2BB88300F1081FAD50DA7250E7705E819F40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 18e251bbe039f4be3fc00ce731a9da6c27b1328c34fc7594f494c23918f7d11e
                                                • Instruction ID: bc6b970e8ff40662bcdb1eefed7014435392bb33103bb41b1f41225cd96178c1
                                                • Opcode Fuzzy Hash: 18e251bbe039f4be3fc00ce731a9da6c27b1328c34fc7594f494c23918f7d11e
                                                • Instruction Fuzzy Hash: 05514A71E4161A8BDB68CF66CD44BDAFBB2FF88304F1481EAD509A7654EB705E818F40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 04c53b37e18a31703dc8d8d610f61c694df5bc3b8a999d4cd38aa62ed963102a
                                                • Instruction ID: 56e3e95b7362a428d64b1d3a09c1102037d42ebb6adc7176d8761158ac4bf1da
                                                • Opcode Fuzzy Hash: 04c53b37e18a31703dc8d8d610f61c694df5bc3b8a999d4cd38aa62ed963102a
                                                • Instruction Fuzzy Hash: C7512675E4162A8FDB64CF61CD84B9AF7B2FB88304F1082E6D519A7650E770AEC19F40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bbe05d5cfb0676252ae0fd5e31c7e0be5062dc96eca920644bd4ed02f3dd6766
                                                • Instruction ID: 8a8ad79bcbbfd798130a892c3ca44ed35fe1aded90d409d3c1a9e9c9e30607f0
                                                • Opcode Fuzzy Hash: bbe05d5cfb0676252ae0fd5e31c7e0be5062dc96eca920644bd4ed02f3dd6766
                                                • Instruction Fuzzy Hash: 57514774D4162A8FDB64CF65CD84BDAF7B2BB88304F1085EAD509A7650E7709EC18F40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 276feba5b32ceb9c9ccbf7f6173a955b6bc7e938e8380869f3f6b83759e5e6b7
                                                • Instruction ID: e2b492eedc2590dfd5dd77dfcdb8458424e9bb7d6fac38c08264889b9f8472a4
                                                • Opcode Fuzzy Hash: 276feba5b32ceb9c9ccbf7f6173a955b6bc7e938e8380869f3f6b83759e5e6b7
                                                • Instruction Fuzzy Hash: 95513571E4162B8FDB64CF61CD80B9AB7B2BB98304F1081EAD519A7650E770AEC19F40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1d5c2bd50a5024af513545e363b94b03e62e45bc604349d663df8276c0341bbc
                                                • Instruction ID: f247f4ef812405f00f071ecb6ccec55e21049da14186b75e0aad716e2f8a108c
                                                • Opcode Fuzzy Hash: 1d5c2bd50a5024af513545e363b94b03e62e45bc604349d663df8276c0341bbc
                                                • Instruction Fuzzy Hash: CC515571E4062B8FDB64CF61CD80B9AB7B2BF88300F1081EAD509A7650E770AEC19F40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 80ba475f3c342e432f4c26c10640162a0318bd725716f554341c867d94e6fa37
                                                • Instruction ID: b9e56e2daf5099ca524ce87fc48e4e9d8dc00e7a242e2a28242cfc3c2166418d
                                                • Opcode Fuzzy Hash: 80ba475f3c342e432f4c26c10640162a0318bd725716f554341c867d94e6fa37
                                                • Instruction Fuzzy Hash: 5031F971E146189BEB58DFABD84069EFBF3BFC8200F04C5BAD418A6224DB305A468F51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a21e43f3d2e205b300986328c8d4e88f6f5a45d0772763c1ef1d07a598651560
                                                • Instruction ID: f6adc0a3d06627601ffcbdafb58c9ff3c2dabbe2dd707ebb5fe060972852b745
                                                • Opcode Fuzzy Hash: a21e43f3d2e205b300986328c8d4e88f6f5a45d0772763c1ef1d07a598651560
                                                • Instruction Fuzzy Hash: 90112E70D042588FDB15AFA6C4187EDBBF1EF4E355F145069E401B7290C7748944CB79
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 0246B830
                                                • GetCurrentThread.KERNEL32 ref: 0246B86D
                                                • GetCurrentProcess.KERNEL32 ref: 0246B8AA
                                                • GetCurrentThreadId.KERNEL32 ref: 0246B903
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.296666741.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2460000_New Order.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: a0e88336dc35bbb730750b59ce6a55408a466c068fa5ff1d90df55fcc8080790
                                                • Instruction ID: c9f8185e93c3b0dabeb81cb9173479a9a8f3ffbfbb4600ffb652a6e3603a48ad
                                                • Opcode Fuzzy Hash: a0e88336dc35bbb730750b59ce6a55408a466c068fa5ff1d90df55fcc8080790
                                                • Instruction Fuzzy Hash: D95166B0A042448FDB14CFA9DA487AEBBF0FF48308F14849AE559B7350D7745988CF66
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 0246B830
                                                • GetCurrentThread.KERNEL32 ref: 0246B86D
                                                • GetCurrentProcess.KERNEL32 ref: 0246B8AA
                                                • GetCurrentThreadId.KERNEL32 ref: 0246B903
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.296666741.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2460000_New Order.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 6375ff521466df11520be55a5f38f3098a8c38b687f3735e0815d15afca6e48e
                                                • Instruction ID: 86a695c17efa6f5d7a68e23816ea6bbdbd4e44eb5230d9d9c1042ad732abc855
                                                • Opcode Fuzzy Hash: 6375ff521466df11520be55a5f38f3098a8c38b687f3735e0815d15afca6e48e
                                                • Instruction Fuzzy Hash: 815145B0A046088FDB14CFA9DA48BAEBBF1FB48308F20845AE559B7350D7745984CF66
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 38 24694e8-24694f0 39 24694fb-24694fd 38->39 40 24694f6 call 2466fd4 38->40 41 2469513-2469517 39->41 42 24694ff 39->42 40->39 43 246952b-246956c 41->43 44 2469519-2469523 41->44 93 2469505 call 2469760 42->93 94 2469505 call 2469770 42->94 49 246956e-2469576 43->49 50 2469579-2469587 43->50 44->43 45 246950b-246950d 45->41 46 2469648-2469708 45->46 86 2469710-246973b GetModuleHandleW 46->86 87 246970a-246970d 46->87 49->50 52 24695ab-24695ad 50->52 53 2469589-246958e 50->53 54 24695b0-24695b7 52->54 55 2469590-2469597 call 2468834 53->55 56 2469599 53->56 57 24695c4-24695cb 54->57 58 24695b9-24695c1 54->58 61 246959b-24695a9 55->61 56->61 62 24695cd-24695d5 57->62 63 24695d8-24695e1 call 2468844 57->63 58->57 61->54 62->63 68 24695e3-24695eb 63->68 69 24695ee-24695f3 63->69 68->69 71 24695f5-24695fc 69->71 72 2469611-2469615 69->72 71->72 73 24695fe-246960e call 2468854 call 2468864 71->73 91 2469618 call 2469a41 72->91 92 2469618 call 2469a68 72->92 73->72 75 246961b-246961e 77 2469620-246963e 75->77 78 2469641-2469647 75->78 77->78 88 2469744-2469758 86->88 89 246973d-2469743 86->89 87->86 89->88 91->75 92->75 93->45 94->45
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0246972E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.296666741.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2460000_New Order.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID: |Nm$|Nm
                                                • API String ID: 4139908857-3440798706
                                                • Opcode ID: e0845667f60f30ac5c9e22404f0f51c29047d549f8f4b001e575b407ed0b35f8
                                                • Instruction ID: 7a6f21eaf0de8ebacf876257ee784cb8fe73d4b048fc45682246afbe0241afe7
                                                • Opcode Fuzzy Hash: e0845667f60f30ac5c9e22404f0f51c29047d549f8f4b001e575b407ed0b35f8
                                                • Instruction Fuzzy Hash: 5A711271A00B058FD764DF6AD44476BB7F2BB88304F00892ED44ADBB40DB75E9498F92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 265 6a6b558-6a6b5e3 267 6a6b5e5-6a6b5eb 265->267 268 6a6b5ee-6a6b5f5 265->268 267->268 269 6a6b5f7-6a6b5fd 268->269 270 6a6b600-6a6b616 268->270 269->270 271 6a6b621-6a6b6be CreateProcessW 270->271 272 6a6b618-6a6b61e 270->272 274 6a6b6c7-6a6b73b 271->274 275 6a6b6c0-6a6b6c6 271->275 272->271 283 6a6b74d-6a6b754 274->283 284 6a6b73d-6a6b743 274->284 275->274 285 6a6b756-6a6b765 283->285 286 6a6b76b 283->286 284->283 285->286
                                                APIs
                                                • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 06A6B6AB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: 0036e56cdea85f331bca085b4773b5dff9f6df21e5cd7bc1f531927f1d3fe44a
                                                • Instruction ID: ead2eb84bbfd51362a4a3bb3ca5b6609e92b1be4344d9c44ebf18d79129f3b4b
                                                • Opcode Fuzzy Hash: 0036e56cdea85f331bca085b4773b5dff9f6df21e5cd7bc1f531927f1d3fe44a
                                                • Instruction Fuzzy Hash: 92512671D053299FDB50DF95C980BDDBBB5BF48304F01809AE908B7250DB759A98CF60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 288 246fcec-246fd5e 289 246fd60-246fd66 288->289 290 246fd69-246fd70 288->290 289->290 291 246fd72-246fd78 290->291 292 246fd7b-246fdb3 290->292 291->292 293 246fdbb-246fe1a CreateWindowExW 292->293 294 246fe23-246fe5b 293->294 295 246fe1c-246fe22 293->295 299 246fe5d-246fe60 294->299 300 246fe68 294->300 295->294 299->300 301 246fe69 300->301 301->301
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0246FE0A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.296666741.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2460000_New Order.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: 825efb71339072bc1289144e1c87ecdfadd89c7844ab59f159568efd90a8e57b
                                                • Instruction ID: c5982bc25f60644387c382c47d0f3d7cf2733decbceb03da2410835d8aae9205
                                                • Opcode Fuzzy Hash: 825efb71339072bc1289144e1c87ecdfadd89c7844ab59f159568efd90a8e57b
                                                • Instruction Fuzzy Hash: 2951C0B1D003099FDB14CFA9D984ADEBBB5FF88314F25812AE819AB210D7749985CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 302 246fcf8-246fd5e 303 246fd60-246fd66 302->303 304 246fd69-246fd70 302->304 303->304 305 246fd72-246fd78 304->305 306 246fd7b-246fe1a CreateWindowExW 304->306 305->306 308 246fe23-246fe5b 306->308 309 246fe1c-246fe22 306->309 313 246fe5d-246fe60 308->313 314 246fe68 308->314 309->308 313->314 315 246fe69 314->315 315->315
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0246FE0A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.296666741.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2460000_New Order.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: 1c1b70925ca2232603bafe2fc8d5092b0160906b349308380b45863e3fa6b29e
                                                • Instruction ID: ce5bef3527e641bac9d96b91be12fce0595178ac097e0dceff826805decfe2fa
                                                • Opcode Fuzzy Hash: 1c1b70925ca2232603bafe2fc8d5092b0160906b349308380b45863e3fa6b29e
                                                • Instruction Fuzzy Hash: 0241B0B1D003099FDB14CF99D984ADEBFB5FF48314F25812AE819AB210D774A985CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 316 6a6bf08-6a6bf59 318 6a6bf5b-6a6bf67 316->318 319 6a6bf69-6a6bfa2 WriteProcessMemory 316->319 318->319 320 6a6bfa4-6a6bfaa 319->320 321 6a6bfab-6a6bfcc 319->321 320->321
                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06A6BF95
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: 7d972df0afe96eb921b66aaf3ca5a9c4f06538c55c65ab7f269f26ce4c8d0b52
                                                • Instruction ID: 9c176810e95b9cb641dd24c25dc0f9a2a6342e2a8c711634ac6142e03fe55e46
                                                • Opcode Fuzzy Hash: 7d972df0afe96eb921b66aaf3ca5a9c4f06538c55c65ab7f269f26ce4c8d0b52
                                                • Instruction Fuzzy Hash: C42100B5A002499FCB10CF9AD885BDEBBF4FF48314F00842AE919E7250D778A954CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 323 246bdf8-246be94 DuplicateHandle 324 246be96-246be9c 323->324 325 246be9d-246beba 323->325 324->325
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0246BE87
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.296666741.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2460000_New Order.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 0b835d48a849083eb96dcefd4093f6b31eeb6e3def0f52f0690beb529ed809ac
                                                • Instruction ID: 2c29cc89c645116f384423d5325f1bc8cfdcbd00dcf3624d6d97c780da54dd9f
                                                • Opcode Fuzzy Hash: 0b835d48a849083eb96dcefd4093f6b31eeb6e3def0f52f0690beb529ed809ac
                                                • Instruction Fuzzy Hash: 422125B59042499FDB10CFAAD984ADEFBF4FB48324F14841AE914B3310C378A955CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 328 246be00-246be94 DuplicateHandle 329 246be96-246be9c 328->329 330 246be9d-246beba 328->330 329->330
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0246BE87
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.296666741.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2460000_New Order.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 0ec531059ad6c397457910919a4dc70c712c2344a063e7df13cc98ee4382de59
                                                • Instruction ID: f1aa525ef3080672d62c4448e216a9f9e0e47a3c56036ce0e251e76677cff18f
                                                • Opcode Fuzzy Hash: 0ec531059ad6c397457910919a4dc70c712c2344a063e7df13cc98ee4382de59
                                                • Instruction Fuzzy Hash: 7421E4B59042089FDB10CF9AD984AEEFBF8FB48324F14841AE914B3310D374A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 333 6a6bd90-6a6be1c ReadProcessMemory 335 6a6be25-6a6be46 333->335 336 6a6be1e-6a6be24 333->336 336->335
                                                APIs
                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06A6BE0F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: 5f3af16dd8bba70e38003e8f1f8507a7bf41be86a7ea0cd32c4d80c0af6f4b8f
                                                • Instruction ID: 6097903ac6e8a85a0bf39084ef019e0605d2b94790f3720bfe53647974a6e02f
                                                • Opcode Fuzzy Hash: 5f3af16dd8bba70e38003e8f1f8507a7bf41be86a7ea0cd32c4d80c0af6f4b8f
                                                • Instruction Fuzzy Hash: D621E3B59052599FCB10CF9AD984BDEFBF4FB48320F10842AE918A7250D378A554CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetThreadContext.KERNELBASE(?,00000000), ref: 06A6BD47
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID: ContextThread
                                                • String ID:
                                                • API String ID: 1591575202-0
                                                • Opcode ID: 751efe9ac9d56d6edbae07e3e8190d5963b6947ef8d9b1e549b3c304a5fdcde1
                                                • Instruction ID: f9c45884abc8777318bb40fdf740f35a8ee14bb640e0174f25cbf32b6d5b4458
                                                • Opcode Fuzzy Hash: 751efe9ac9d56d6edbae07e3e8190d5963b6947ef8d9b1e549b3c304a5fdcde1
                                                • Instruction Fuzzy Hash: E5213871D042599FCB00CF9AD9457EEFBF4BB48214F00812AE518B7240D778A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 06A655C3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: c6fa54867de6b1336d2b7c72f2080573ad3f800d461c8ff32edab60fe558f2fb
                                                • Instruction ID: b2ecb3c92cd4c613d997300e2d7dd0f26244bf47f415ee6113cb7a1e514f136a
                                                • Opcode Fuzzy Hash: c6fa54867de6b1336d2b7c72f2080573ad3f800d461c8ff32edab60fe558f2fb
                                                • Instruction Fuzzy Hash: 9B213675D042499FCB10CF9AC884BDEFBF4FB48324F108429E459A7640D378A644CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,024697A9,00000800,00000000,00000000), ref: 024699BA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.296666741.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2460000_New Order.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: acd299421c5efff3763b8f3a6fb6f5a7181d039efed613c083003fedd0e02f08
                                                • Instruction ID: 4f9044e35df5572458fbe6355e674eb9dd5fb07e3340420a51361175e04dbc05
                                                • Opcode Fuzzy Hash: acd299421c5efff3763b8f3a6fb6f5a7181d039efed613c083003fedd0e02f08
                                                • Instruction Fuzzy Hash: 611117B69042098FDB10CF9AD584BDEFBF4EB48324F15842ED455A7340C378A549CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 06A655C3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: 231bc08b888d2e9cc8a014ab88e78e6b153b335d6d5d1a02a36d6dc3fc3ed2f8
                                                • Instruction ID: 6065a35412d1e7ef114654c32c4d84421c0d29aa0cc64fd890a3ca2df2bd5dc8
                                                • Opcode Fuzzy Hash: 231bc08b888d2e9cc8a014ab88e78e6b153b335d6d5d1a02a36d6dc3fc3ed2f8
                                                • Instruction Fuzzy Hash: 512126B5D042499FCB10CF9AC984BDEFBF8FB48320F108429E959A7240D778A644CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,024697A9,00000800,00000000,00000000), ref: 024699BA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.296666741.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2460000_New Order.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: 9d11dafddfae6bfc3837e527d2d167e16e4e9b9e0d6040bcb2e3e5d0e40e9aa4
                                                • Instruction ID: c63e44d696af6ab6f86b4b86e6f13a99db64d038c589d410271491e374162eea
                                                • Opcode Fuzzy Hash: 9d11dafddfae6bfc3837e527d2d167e16e4e9b9e0d6040bcb2e3e5d0e40e9aa4
                                                • Instruction Fuzzy Hash: AA11F2B69042099FDB10CF9AD548BEEBBF4AB88214F05842ED519A7300C3B4A949CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06A6BECB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 8b50fd7bdbcc0a1813d2d37f3344540ded732df09817407ca7e202261d9810f6
                                                • Instruction ID: cefee70f08fc5e82069b47fb2b8d34affd8de8bcc54f6f0a5126021032619c37
                                                • Opcode Fuzzy Hash: 8b50fd7bdbcc0a1813d2d37f3344540ded732df09817407ca7e202261d9810f6
                                                • Instruction Fuzzy Hash: 2D1125B59042489FCB10CF9AD884BDFBBF8FB48324F108419E529A7210C375A554CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 06A6C43D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: 0bacaa2e3b1390ae28d3c44c1704a6ba0ad273ce1c85da3a2f2cef003414f0fd
                                                • Instruction ID: e828b231adf02b71bd1f6ab7e21c45b3fbb7526dfa04e63112ccaf8d4c207412
                                                • Opcode Fuzzy Hash: 0bacaa2e3b1390ae28d3c44c1704a6ba0ad273ce1c85da3a2f2cef003414f0fd
                                                • Instruction Fuzzy Hash: 4C1106B59043489FDB10DF9AD889BEEFBF8FB48324F10841AE555A7200D374A954CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0246972E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.296666741.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2460000_New Order.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: d09ffdee0d626d2cfa581f0996e86c724923751e6c98ea3c5c81985868d42b6d
                                                • Instruction ID: 88f1e31a1e4c33f742ccbc5e48e3cc70b60eca6dbcd95b6df62ed2876710ccc9
                                                • Opcode Fuzzy Hash: d09ffdee0d626d2cfa581f0996e86c724923751e6c98ea3c5c81985868d42b6d
                                                • Instruction Fuzzy Hash: F21102B5D006498FDB10CF9AD448ADFFBF4AB88224F15841AD419A7200D374A545CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetWindowLongW.USER32(?,?,?), ref: 0246FF9D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.296666741.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2460000_New Order.jbxd
                                                Similarity
                                                • API ID: LongWindow
                                                • String ID:
                                                • API String ID: 1378638983-0
                                                • Opcode ID: ede44306e0affde0993112c6d0e298664ae1d4cf384ecd936448af542c9f5f4f
                                                • Instruction ID: b078e369f8f36f2960a34f076ea1e8af590ea1adeba1ea16f08c7801df02025e
                                                • Opcode Fuzzy Hash: ede44306e0affde0993112c6d0e298664ae1d4cf384ecd936448af542c9f5f4f
                                                • Instruction Fuzzy Hash: 141136B59002498FDB10CF99D585BDFFBF4FB48324F11841AE855A3640C374A548CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetWindowLongW.USER32(?,?,?), ref: 0246FF9D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.296666741.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2460000_New Order.jbxd
                                                Similarity
                                                • API ID: LongWindow
                                                • String ID:
                                                • API String ID: 1378638983-0
                                                • Opcode ID: 1de9d4835ad9e386658727519e594604bf23f1efd4ae3123329617851cb967d6
                                                • Instruction ID: c35bec1a6bb236cb14ced7b9ff68a1d527d8723d889ef24e309c09d6b28c2b7f
                                                • Opcode Fuzzy Hash: 1de9d4835ad9e386658727519e594604bf23f1efd4ae3123329617851cb967d6
                                                • Instruction Fuzzy Hash: FF1103B59042089FDB10CF99D589BDFBBF8EB48324F11841AE955A3740C374A944CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: e6de647a6e94c073aece29014b79fd3d7ca08a9792014706429d2aeba8bf7fe7
                                                • Instruction ID: 28702523373187e5858f946674b6f6117f242b7a6c1c22851d5afbc28a061f4e
                                                • Opcode Fuzzy Hash: e6de647a6e94c073aece29014b79fd3d7ca08a9792014706429d2aeba8bf7fe7
                                                • Instruction Fuzzy Hash: 201153B19042488FCB10CF9AD884BDEFBF8FB48324F10841AD519B3200D378A984CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.294957323.00000000006CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006CD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6cd000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 126a0d80ef7f81fb0c9b3e76f9a04a46ef52aa4e50e55694cf45e2e06202ef21
                                                • Instruction ID: 0c1747bdb384c5c231f467b7a42d9451c2214f87eb1411f3d8239edc370b8fab
                                                • Opcode Fuzzy Hash: 126a0d80ef7f81fb0c9b3e76f9a04a46ef52aa4e50e55694cf45e2e06202ef21
                                                • Instruction Fuzzy Hash: 0221F1B1508244EFDB05DF14D9C0F66BBA6FB88328F24C57DE9054A256C336D856CBA2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.295004144.00000000006DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006DD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6dd000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1ef7d8c4e83ed101fe2dcf398e5dd3c9a05b3fa656a428a5cb87c23c1bae6c67
                                                • Instruction ID: 6d95ecbd59ba0c7dd491088ed3c003911ac30da5740aa59b185a1e18e3d2e8ad
                                                • Opcode Fuzzy Hash: 1ef7d8c4e83ed101fe2dcf398e5dd3c9a05b3fa656a428a5cb87c23c1bae6c67
                                                • Instruction Fuzzy Hash: 7421D775908244DFDB14EF14D9C4B26BB66FBC8314F24C56AD9094B346C376D847CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.295004144.00000000006DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006DD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6dd000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9a86f65679f07841eb1a8a22c8957b159a266ac78c3ba5218ecb2f3ca5168651
                                                • Instruction ID: 5fcd97ea203b29f1d4c838f399b8227a39083c8fdb80ead282f9d2a6c30a7fcf
                                                • Opcode Fuzzy Hash: 9a86f65679f07841eb1a8a22c8957b159a266ac78c3ba5218ecb2f3ca5168651
                                                • Instruction Fuzzy Hash: 11212971908244EFDB01EF50D9C0F26BBA6FB88314F24C5AEEA094B346C336D946CB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.295004144.00000000006DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006DD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6dd000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7dcd19002458a88b7cf9376650ebf8710fda6e56ffe83614dca2a9a28553225b
                                                • Instruction ID: 779d2381fe6ed5cc8173d0816a903491eb4e9c4c17b4e159f0a287f0ba92fd09
                                                • Opcode Fuzzy Hash: 7dcd19002458a88b7cf9376650ebf8710fda6e56ffe83614dca2a9a28553225b
                                                • Instruction Fuzzy Hash: F82171755083809FCB02DF24D994751BF71EB86314F28C5DAD8458B397C33A9856CB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.294957323.00000000006CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006CD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6cd000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7cd45df645f4a8ea0696ff541091910f0911980562d29522548271fd63a809da
                                                • Instruction ID: b6d82a175945c05597582235b53acf624cd430a46fce1548954e1f7bfaabe5d5
                                                • Opcode Fuzzy Hash: 7cd45df645f4a8ea0696ff541091910f0911980562d29522548271fd63a809da
                                                • Instruction Fuzzy Hash: 1211B176904280DFCB12CF14D5C4B66BF72FB84324F24C6ADD9050B656C336D85ACBA2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.295004144.00000000006DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006DD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6dd000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2ed02e3589a6c9689257582ffec95221d783e0c36bebb138d43ff1c22c0bf5f0
                                                • Instruction ID: a4a6f96dfa01405e9165127dcbbd85cff8e47f3d3ffeba2c69f2fdcc92038b7d
                                                • Opcode Fuzzy Hash: 2ed02e3589a6c9689257582ffec95221d783e0c36bebb138d43ff1c22c0bf5f0
                                                • Instruction Fuzzy Hash: D311BB75904280DFCB01DF10C5C0B55BBB2FB84324F28C6AAD9494B756C33AD85ACB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.294957323.00000000006CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006CD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6cd000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5c7326a94e1d5d7110fd48bf64077ff4af6cd29cc1e55544fee743b0a23ec567
                                                • Instruction ID: e79d48c2827f8cd9ec574c320bc870f616aab65251f1b07139a808ff8e7a530e
                                                • Opcode Fuzzy Hash: 5c7326a94e1d5d7110fd48bf64077ff4af6cd29cc1e55544fee743b0a23ec567
                                                • Instruction Fuzzy Hash: 9101A27150C384AEE7104A16DD85FB6FBDCEF41368F19846EEE055A686C3789884CAB1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.294957323.00000000006CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 006CD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6cd000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f3b3a7e5dd1eff79293745fb302340228369c3deb6274b02f19e72659aa1484d
                                                • Instruction ID: 613d730eed6588488fe3b1be3a6edfd4eba677ddde0836f420da6f642e0e5c0a
                                                • Opcode Fuzzy Hash: f3b3a7e5dd1eff79293745fb302340228369c3deb6274b02f19e72659aa1484d
                                                • Instruction Fuzzy Hash: E1F06D71508384AEEB108A16DC85BB2FB9CEB81774F18C46AED085B686C3799C44CAB1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: -fN$`RUP$ySy
                                                • API String ID: 0-247820568
                                                • Opcode ID: 1852640c07e74bf54fed0d7b50b164347f93798503b811082b27321675b47abf
                                                • Instruction ID: e7910eedb84410e189fb2911c43e2398884ffa0e1ddc9db968ccce18e2015289
                                                • Opcode Fuzzy Hash: 1852640c07e74bf54fed0d7b50b164347f93798503b811082b27321675b47abf
                                                • Instruction Fuzzy Hash: EE71E274E15219CFDB44CFAAC5805EEFBF2EB89214F28942AE415F7224D7349A428B64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: -fN$`RUP$ySy
                                                • API String ID: 0-247820568
                                                • Opcode ID: 45595bf547ec2f3af787d3eba07ba16d14059c40cf6fc8664107f688ff4cc521
                                                • Instruction ID: 495c06100ffbcaf1cb12c3c2530c31f03efd598ee8876af37a0c4afa0bb80510
                                                • Opcode Fuzzy Hash: 45595bf547ec2f3af787d3eba07ba16d14059c40cf6fc8664107f688ff4cc521
                                                • Instruction Fuzzy Hash: 6171F374E15219CFDB44CFAAC5805EEFBF2EF89214F28946AE415F7224D3349E428B64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: JE+d
                                                • API String ID: 0-2668851270
                                                • Opcode ID: 087a7183d9153cae553ea333d0d6a3d275fdcc8349481b21c0a9212d73fff4d6
                                                • Instruction ID: 056e46bb8e85043be13d173960dd80018694ce4c11cf644acf3e4ad06d4e8716
                                                • Opcode Fuzzy Hash: 087a7183d9153cae553ea333d0d6a3d275fdcc8349481b21c0a9212d73fff4d6
                                                • Instruction Fuzzy Hash: 23916BB4E04219CFDB54DFAAC980AADFBB2FB89304F14D1A9E408AB355D7309941CF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: JE+d
                                                • API String ID: 0-2668851270
                                                • Opcode ID: c03c8268a95851e8d3d2c52f97aef83e3e89f0ed002652bffe3bc970e57b89d7
                                                • Instruction ID: 119c5c5ca14ce9b2ebcaca0cf7e4374076169f5197381cb2cc0de589e29a8472
                                                • Opcode Fuzzy Hash: c03c8268a95851e8d3d2c52f97aef83e3e89f0ed002652bffe3bc970e57b89d7
                                                • Instruction Fuzzy Hash: 1E915CB4E052198FDB54DFAAC980AAEFBF2FB89304F14D169E408AB355D7309941CF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: bTp
                                                • API String ID: 0-1047882121
                                                • Opcode ID: c35ba65e9cbea04f114e54603199e7f85da8c9cdf9b04e82b66256a15086332c
                                                • Instruction ID: aa27a08ba95ce371dede12d56bfc3c9d0bdaf831c0ec2a643a96b0ad1e74bec1
                                                • Opcode Fuzzy Hash: c35ba65e9cbea04f114e54603199e7f85da8c9cdf9b04e82b66256a15086332c
                                                • Instruction Fuzzy Hash: 43713678E0520ACFDB44DFAAD5845EEFBF2EB89310F10942AE419B7254E7349902CF95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: bTp
                                                • API String ID: 0-1047882121
                                                • Opcode ID: a3ea62db9ce49cd59d65cf06ff57f34f1f5f3e5ae50b85804d8d2d1d92c13ddd
                                                • Instruction ID: 645f2c050abfa06b685bb423cb741fc2857a861c74ef62cb0dda1174c8698428
                                                • Opcode Fuzzy Hash: a3ea62db9ce49cd59d65cf06ff57f34f1f5f3e5ae50b85804d8d2d1d92c13ddd
                                                • Instruction Fuzzy Hash: FF712378E0520ACFCB44DFAAD5845EEFBB2EB89310F10942AE415B7254E7349A02CF95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.296666741.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2460000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 803edf5674d159dd096c4d38c278318bcf1fc16904284b6b3ff38a22c3db6a4d
                                                • Instruction ID: 1fc2b4d27a28c0a1fe7bebcc008314f058805a08d736f05ab8fb392ea4ac3f35
                                                • Opcode Fuzzy Hash: 803edf5674d159dd096c4d38c278318bcf1fc16904284b6b3ff38a22c3db6a4d
                                                • Instruction Fuzzy Hash: A51291B1D11B468AE310CFB5ED9C1893BA1B785368B90C328D2692AAF1D7F411CBCF44
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.296666741.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2460000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 63880ef8a9aaa33be6a4184496bcc239f9b134261e3f0e276a19031a540b87fa
                                                • Instruction ID: dc84e8455ede890c8a766f19f2ede7cb20dbe6499db7327a22d95897bc0c0cc8
                                                • Opcode Fuzzy Hash: 63880ef8a9aaa33be6a4184496bcc239f9b134261e3f0e276a19031a540b87fa
                                                • Instruction Fuzzy Hash: 2DA17032F10619CFCF05DFA5C8485EEBBB2FF89304B15816AE905AB225DB31A946CF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.296666741.0000000002460000.00000040.00000800.00020000.00000000.sdmp, Offset: 02460000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2460000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 218b599fc072c05f7985695a4e55108fcc83a230dd4f028c1e3a1118cd7a4a2d
                                                • Instruction ID: a75f65ebaa397ce5709bacf25fe430db5a47b31d7435293b9eae375b01561ddc
                                                • Opcode Fuzzy Hash: 218b599fc072c05f7985695a4e55108fcc83a230dd4f028c1e3a1118cd7a4a2d
                                                • Instruction Fuzzy Hash: C5C1F8B1D11B468AE710CFB5EC881897BA1BB85368F50C328D2696B6E0E7F451CBCF54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9c4eb3ba299b3f43696aa1728e74959a88b555b3dfe40fcc10b84680f06d1d0a
                                                • Instruction ID: 125bcf86b836dd1ac6ddab48622a34abdf77f58a9e7ff8c2f1bb920e5b5a88c4
                                                • Opcode Fuzzy Hash: 9c4eb3ba299b3f43696aa1728e74959a88b555b3dfe40fcc10b84680f06d1d0a
                                                • Instruction Fuzzy Hash: DA613770E1421ACFDB44DFAAC4809AEFBF2EB89314F14D469E514B7254D734DA818FA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b0b16a41df572459b720ef3b8fce6271cf17452e1a6a22eb7286bb9ecba39b20
                                                • Instruction ID: 6f3d1200ba1cc688a578ff944452214d7312644221fd947d1517a5110731b122
                                                • Opcode Fuzzy Hash: b0b16a41df572459b720ef3b8fce6271cf17452e1a6a22eb7286bb9ecba39b20
                                                • Instruction Fuzzy Hash: 28614774E1424A8FDB44DFAAC4809AEFBF2EB89314F14D469E514B7354D734DA418FA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d18918e3ed85677f356b0767331e99a4d1fa947a59640cb1ee50f7944cefb7f4
                                                • Instruction ID: c0d80733c794a5da46303117761ef634f7352a2422f6ab363ed9c73631af2ae9
                                                • Opcode Fuzzy Hash: d18918e3ed85677f356b0767331e99a4d1fa947a59640cb1ee50f7944cefb7f4
                                                • Instruction Fuzzy Hash: A0615774E1424ACFDB44DFAAC4809AEFBF2AB89314F14D46AE514B7354D734DA818FA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 94d1595d0c6edeb980f353d8815b09128b508a7dda8cdcb5e9292f5b0ac64d67
                                                • Instruction ID: 36816abb1907da978485962afb07c559ca1ce78aea91c348b0e4c7db654b5bdb
                                                • Opcode Fuzzy Hash: 94d1595d0c6edeb980f353d8815b09128b508a7dda8cdcb5e9292f5b0ac64d67
                                                • Instruction Fuzzy Hash: 8C61CD74E112099FCB48CF9AD58499EFBF1FF89210F15C56AE429AB321D734A981CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cda32c695a67ecb284c8cbfd0943918fa267862ca84933f2d12c9291e34e4050
                                                • Instruction ID: 219185d244e5497850b79db14e8a6ea3a6daf5c0af892f75ee422a7390232ab0
                                                • Opcode Fuzzy Hash: cda32c695a67ecb284c8cbfd0943918fa267862ca84933f2d12c9291e34e4050
                                                • Instruction Fuzzy Hash: 8661CF74E112099FCB88CF9AD58499EFBF1FF89210F15C56AE419AB321D734A981CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b4347c718503fbae10234e7f42a1d875fd7220922f2ea6e2a635c6087759c0cc
                                                • Instruction ID: 72c4d74cb2bba6e460f7ba9d99018595d9f93a9164351dcf89676bc871df2ae8
                                                • Opcode Fuzzy Hash: b4347c718503fbae10234e7f42a1d875fd7220922f2ea6e2a635c6087759c0cc
                                                • Instruction Fuzzy Hash: 596117B1E0424A9FDB44DFAAC5815EEFFB2FF89304F14815AE415A7214D734AA42CF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 12f0797014011312c40dc9ad13485ca2939b8863ddaa95062d1072f8ad4e3126
                                                • Instruction ID: bb983e71f57789d31a3451b05b329a6a155a9a3ae5602f83db1d8c9b54f34c71
                                                • Opcode Fuzzy Hash: 12f0797014011312c40dc9ad13485ca2939b8863ddaa95062d1072f8ad4e3126
                                                • Instruction Fuzzy Hash: 775125B1E0524A9FDB44DFAAC5815EEFFF2EF89300F14806AE415A7254D734AA42CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5c0b04dbb737db0081599b6ba8b7ed013f7a268b6eed1b6f495775df9efed046
                                                • Instruction ID: a51e5283b5c46fdef889446bfbaab10726454d1a05f90baac05843e146375cc1
                                                • Opcode Fuzzy Hash: 5c0b04dbb737db0081599b6ba8b7ed013f7a268b6eed1b6f495775df9efed046
                                                • Instruction Fuzzy Hash: 4A51F870E0420ACFDB48DFABC5815EEFBF2AB89314F24C46AD515AB254E7349A418F94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8e90d5ddbd2abe8475f7472c7636ce0f4cb623b77af80fc6003150ea2f533e7b
                                                • Instruction ID: 88fc5037554a9900bc8d698d2cbd0ec6356dac0ca3f23c47af1addff3d861919
                                                • Opcode Fuzzy Hash: 8e90d5ddbd2abe8475f7472c7636ce0f4cb623b77af80fc6003150ea2f533e7b
                                                • Instruction Fuzzy Hash: 19410974E0420ACFDB48DFAAC5815AEFBF2AB89304F14C46AD515AB354E7349A418F94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cb697eea42ba07e12c1a0ece8784bf17486a35308928147e52631712520389d2
                                                • Instruction ID: ba9c8f73d9ecaf40d3fd26e30eec75dc5b743906be3c1a584f51e4856ea306ad
                                                • Opcode Fuzzy Hash: cb697eea42ba07e12c1a0ece8784bf17486a35308928147e52631712520389d2
                                                • Instruction Fuzzy Hash: 0F410AB4E0520ADFDB48DFA6C5815AEFBB2BB88300F24D069D515B7214D7319B41CBA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 21667a0025a20f4df9ec1d799b21b522f9437d207fef1491891bf428abe601e9
                                                • Instruction ID: f413cc0b1236b0e835c19a5e40c570899abc0308f160b636704ecd6274a650ac
                                                • Opcode Fuzzy Hash: 21667a0025a20f4df9ec1d799b21b522f9437d207fef1491891bf428abe601e9
                                                • Instruction Fuzzy Hash: 91417F71E056188BEB58DF6B8D4539EFBF3BFC9304F14C1BA950CA6214EB300A858E51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0f2d7d648fd12308ebd8467fdfdcd86b272527836c19a7f09e7773bbb69c6f26
                                                • Instruction ID: 3b5d5a4d758ea94b89f445616ad7351cd0ea8ebb4e6063d54a783ec4da024435
                                                • Opcode Fuzzy Hash: 0f2d7d648fd12308ebd8467fdfdcd86b272527836c19a7f09e7773bbb69c6f26
                                                • Instruction Fuzzy Hash: 0541E8B4E0520ADFDB48DFA6C5815AEFBF2BB88300F24D06AD515A7218D7319B41CBA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3ecb529a12211f80c9bf3c389ec738c1de8df5f22d0d988042803bc22ab2162b
                                                • Instruction ID: 6c8be14081e78da827dfe0ab00e8e7d4092166afd1daf7944f7e285f3413aa6c
                                                • Opcode Fuzzy Hash: 3ecb529a12211f80c9bf3c389ec738c1de8df5f22d0d988042803bc22ab2162b
                                                • Instruction Fuzzy Hash: 8821E9B1E146199BEB58CFABD84469EFBF3BFC8200F04C57AD818A6214EB3446428F51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c99674c6539d577bc34fbba5948b0dcca1a9fbe6d2a8ea8b3a36b6eb0bf0410d
                                                • Instruction ID: f693c72bf2bc148e0601028a436bd3ad49356433f43490c413ee5927ca2b4e83
                                                • Opcode Fuzzy Hash: c99674c6539d577bc34fbba5948b0dcca1a9fbe6d2a8ea8b3a36b6eb0bf0410d
                                                • Instruction Fuzzy Hash: 2E210471E116198BDB58CFABD9406AEFBF7EBC9210F14C16AE518B7254DB304A018FA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.302448362.0000000006A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6a60000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1a474e8273d73b255334308c49e755c18d06ea3f9df6e81ee0f0a9e72093a643
                                                • Instruction ID: 5f5b451ea7a738e795d43bf1c27a36efe579c3da4abfe867249aceb186bb9ce2
                                                • Opcode Fuzzy Hash: 1a474e8273d73b255334308c49e755c18d06ea3f9df6e81ee0f0a9e72093a643
                                                • Instruction Fuzzy Hash: C1112BB0E156589BDB48CF6BD95169EFBF3EFC9210F14C0BAE408AB255DA304A428F51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Execution Graph

                                                Execution Coverage:12.4%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:325
                                                Total number of Limit Nodes:46
                                                execution_graph 23903 c9f308 23905 c9f30c 23903->23905 23904 c9f370 23905->23904 23907 c95030 23905->23907 23908 c9504d 23907->23908 23909 c951f7 InitializePointerDeviceInjection 23908->23909 23910 c95055 23908->23910 23911 c9520a 23909->23911 23910->23905 23911->23905 24221 e55900 24222 e5591e 24221->24222 24223 e55bba 24222->24223 24225 e55eac 19 API calls 24222->24225 24224 e55a4e 24224->24223 24226 e58970 20 API calls 24224->24226 24227 e58a90 20 API calls 24224->24227 24228 e58a98 20 API calls 24224->24228 24229 e5b700 20 API calls 24224->24229 24225->24224 24226->24224 24227->24224 24228->24224 24229->24224 23912 e55bec 23913 e55a40 23912->23913 23914 e55bba 23913->23914 23921 e55eac 23913->23921 23915 e55a4e 23915->23914 23926 e58a98 23915->23926 23932 e58a90 23915->23932 23938 e58970 23915->23938 23944 e5b700 23915->23944 23923 e55cbb 23921->23923 23922 e564fe 23922->23915 23923->23921 23923->23922 23951 c91498 23923->23951 23956 c914a8 23923->23956 23927 e58aa6 23926->23927 23928 e58b19 23927->23928 24102 e59460 23927->24102 24118 e59500 23927->24118 24134 e59550 23927->24134 23928->23915 23933 e58aa6 23932->23933 23934 e58b19 23933->23934 23935 e59460 20 API calls 23933->23935 23936 e59550 20 API calls 23933->23936 23937 e59500 20 API calls 23933->23937 23934->23915 23935->23934 23936->23934 23937->23934 23939 e5897f 23938->23939 23940 e589ae 23939->23940 23941 e59460 20 API calls 23939->23941 23942 e59550 20 API calls 23939->23942 23943 e59500 20 API calls 23939->23943 23940->23915 23941->23940 23942->23940 23943->23940 23945 e5b734 23944->23945 23946 e5b711 23944->23946 23947 e5b700 20 API calls 23945->23947 23946->23915 23948 e5b774 23947->23948 23949 e58a98 20 API calls 23948->23949 23950 e5b7e2 23948->23950 23949->23950 23950->23915 23952 c914b6 23951->23952 23953 c914d9 23951->23953 23952->23923 23954 c91572 23953->23954 23961 c91629 23953->23961 23954->23923 23957 c914b6 23956->23957 23958 c914d9 23956->23958 23957->23923 23959 c91572 23958->23959 23960 c91629 19 API calls 23958->23960 23959->23923 23960->23959 23962 c9164b 23961->23962 23966 c916c8 23962->23966 23986 c916b8 23962->23986 23963 c916ab 23963->23954 23967 c916ec 23966->23967 23972 c91700 23966->23972 23968 c9173f 23967->23968 23967->23972 23983 c916c8 17 API calls 23968->23983 23984 c916b8 17 API calls 23968->23984 23969 c91750 23970 c91711 23969->23970 24006 c92020 23969->24006 23970->23963 23971 c9178f 23971->23970 24034 c93e18 23971->24034 24038 c93e28 23971->24038 23972->23970 23973 c918f1 23972->23973 23975 c91864 23972->23975 23974 c918fb 23973->23974 23979 c916c8 17 API calls 23973->23979 23980 c916b8 17 API calls 23973->23980 23976 c919bb InitializePointerDeviceInjection 23974->23976 23978 c918cb 23974->23978 23977 c91955 InitializePointerDeviceInjection 23975->23977 23975->23978 23976->23978 23977->23974 23978->23963 23979->23974 23980->23974 23983->23969 23984->23969 23987 c916ec 23986->23987 23988 c91700 23986->23988 23987->23988 23989 c9173f 23987->23989 23991 c91711 23988->23991 23993 c918f1 23988->23993 23995 c91864 23988->23995 24003 c916c8 17 API calls 23989->24003 24004 c916b8 17 API calls 23989->24004 23990 c91750 23990->23991 24005 c92020 15 API calls 23990->24005 23991->23963 23992 c9178f 23992->23991 24001 c93e18 InitializePointerDeviceInjection 23992->24001 24002 c93e28 InitializePointerDeviceInjection 23992->24002 23994 c918fb 23993->23994 23999 c916c8 17 API calls 23993->23999 24000 c916b8 17 API calls 23993->24000 23996 c919bb InitializePointerDeviceInjection 23994->23996 23998 c918cb 23994->23998 23997 c91955 InitializePointerDeviceInjection 23995->23997 23995->23998 23996->23998 23997->23994 23998->23963 23999->23994 24000->23994 24001->23991 24002->23991 24003->23990 24004->23990 24005->23992 24008 c92037 24006->24008 24007 c92107 24011 c92138 24007->24011 24018 c92061 24007->24018 24049 c92d42 24007->24049 24058 c92d50 24007->24058 24009 c92081 24008->24009 24010 c9229c 24008->24010 24017 c9204f 24008->24017 24030 c92020 8 API calls 24008->24030 24042 c92618 24008->24042 24012 c9245f InitializePointerDeviceInjection 24009->24012 24009->24018 24013 c9260b 24010->24013 24014 c92572 InitializePointerDeviceInjection 24010->24014 24010->24018 24016 c9226d 24011->24016 24011->24018 24023 c92233 24011->24023 24015 c92472 InitializePointerDeviceInjection 24012->24015 24067 c92768 24013->24067 24016->24010 24016->24017 24016->24018 24017->24018 24020 c9240d InitializePointerDeviceInjection 24017->24020 24018->23971 24020->24009 24021 c926c7 IsDialogMessageW 24022 c926a7 24021->24022 24022->23971 24023->24018 24025 c9255f InitializePointerDeviceInjection 24023->24025 24024 c92687 24024->24022 24027 c92732 InitializePointerDeviceInjection 24024->24027 24025->24014 24027->24024 24030->24007 24035 c93e28 24034->24035 24036 c94ac5 InitializePointerDeviceInjection 24035->24036 24037 c943f8 24035->24037 24036->24037 24037->23970 24039 c93e50 24038->24039 24040 c94ac5 InitializePointerDeviceInjection 24039->24040 24041 c943f8 24039->24041 24040->24041 24041->23970 24043 c92656 24042->24043 24048 c92768 6 API calls 24042->24048 24044 c926c7 IsDialogMessageW 24043->24044 24045 c92687 24043->24045 24046 c926a7 24044->24046 24045->24046 24047 c92732 InitializePointerDeviceInjection 24045->24047 24046->24007 24047->24045 24048->24043 24050 c930ea 24049->24050 24051 c92d7b 24049->24051 24050->24011 24051->24050 24052 c93436 24051->24052 24072 c938c8 24051->24072 24077 c938d8 24051->24077 24052->24050 24053 c93786 24052->24053 24054 c936a6 InitializePointerDeviceInjection 24052->24054 24053->24050 24055 c93828 InitializePointerDeviceInjection 24053->24055 24054->24052 24055->24053 24059 c92d7b 24058->24059 24061 c930ea 24058->24061 24060 c93436 24059->24060 24059->24061 24065 c938c8 2 API calls 24059->24065 24066 c938d8 2 API calls 24059->24066 24060->24061 24062 c93786 24060->24062 24063 c936a6 InitializePointerDeviceInjection 24060->24063 24061->24011 24062->24061 24064 c93828 InitializePointerDeviceInjection 24062->24064 24063->24060 24064->24062 24065->24059 24066->24059 24069 c9278d 24067->24069 24068 c92656 24068->24021 24068->24024 24069->24068 24070 c92d50 4 API calls 24069->24070 24071 c92d42 4 API calls 24069->24071 24070->24069 24071->24069 24073 c938f4 24072->24073 24074 c938ea 24072->24074 24073->24074 24082 c93ac8 24073->24082 24088 c93c10 24073->24088 24074->24051 24078 c938f4 24077->24078 24079 c938ea 24077->24079 24078->24079 24080 c93ac8 2 API calls 24078->24080 24081 c93c10 2 API calls 24078->24081 24079->24051 24080->24079 24081->24079 24084 c93aed 24082->24084 24083 c93b7d 24083->24074 24084->24083 24092 c93d09 24084->24092 24097 c93d18 24084->24097 24085 c93c36 24085->24074 24089 c93c36 24088->24089 24090 c93d09 2 API calls 24088->24090 24091 c93d18 2 API calls 24088->24091 24089->24074 24090->24089 24091->24089 24093 c93d31 24092->24093 24095 c93e18 InitializePointerDeviceInjection 24093->24095 24096 c93e28 InitializePointerDeviceInjection 24093->24096 24094 c93d3b 24094->24085 24095->24094 24096->24094 24098 c93d31 24097->24098 24100 c93e18 InitializePointerDeviceInjection 24098->24100 24101 c93e28 InitializePointerDeviceInjection 24098->24101 24099 c93d3b 24099->24085 24100->24099 24101->24099 24103 e59480 24102->24103 24104 e594d3 24103->24104 24105 e59740 24103->24105 24115 e59460 20 API calls 24103->24115 24116 e59550 20 API calls 24103->24116 24117 e59500 20 API calls 24103->24117 24104->23928 24106 e59769 24105->24106 24110 e59460 20 API calls 24105->24110 24111 e59550 20 API calls 24105->24111 24112 e59500 20 API calls 24105->24112 24113 c91498 19 API calls 24105->24113 24114 c914a8 19 API calls 24105->24114 24150 c95448 24105->24150 24154 c953f6 24105->24154 24159 c953f8 24105->24159 24106->23928 24110->24105 24111->24105 24112->24105 24113->24105 24114->24105 24115->24103 24116->24103 24117->24103 24120 e59507 24118->24120 24119 e59769 24119->23928 24121 e59519 24120->24121 24122 e59740 24120->24122 24131 e59460 20 API calls 24120->24131 24132 e59550 20 API calls 24120->24132 24133 e59500 20 API calls 24120->24133 24121->23928 24122->24119 24123 c953f8 20 API calls 24122->24123 24124 c95448 20 API calls 24122->24124 24125 c953f6 20 API calls 24122->24125 24126 e59460 20 API calls 24122->24126 24127 e59550 20 API calls 24122->24127 24128 e59500 20 API calls 24122->24128 24129 c91498 19 API calls 24122->24129 24130 c914a8 19 API calls 24122->24130 24123->24122 24124->24122 24125->24122 24126->24122 24127->24122 24128->24122 24129->24122 24130->24122 24131->24120 24132->24120 24133->24120 24137 e59571 24134->24137 24135 e59769 24135->23928 24136 e59740 24136->24135 24139 c953f8 20 API calls 24136->24139 24140 c95448 20 API calls 24136->24140 24141 c953f6 20 API calls 24136->24141 24142 e59460 20 API calls 24136->24142 24143 e59550 20 API calls 24136->24143 24144 e59500 20 API calls 24136->24144 24145 c91498 19 API calls 24136->24145 24146 c914a8 19 API calls 24136->24146 24137->24136 24138 e59580 24137->24138 24147 e59460 20 API calls 24137->24147 24148 e59550 20 API calls 24137->24148 24149 e59500 20 API calls 24137->24149 24138->23928 24139->24136 24140->24136 24141->24136 24142->24136 24143->24136 24144->24136 24145->24136 24146->24136 24147->24137 24148->24137 24149->24137 24151 c95474 24150->24151 24164 c954f1 24151->24164 24155 c95424 24154->24155 24157 c9540a 24154->24157 24155->24105 24156 c954cd 24156->24105 24157->24155 24158 c954f1 20 API calls 24157->24158 24158->24156 24160 c95424 24159->24160 24162 c9540a 24159->24162 24160->24105 24161 c954cd 24161->24105 24162->24160 24163 c954f1 20 API calls 24162->24163 24163->24161 24165 c95515 24164->24165 24166 c955a9 24165->24166 24167 c95576 24165->24167 24169 c954cd 24165->24169 24168 c916c8 19 API calls 24166->24168 24167->24169 24172 c95650 24167->24172 24182 c95660 24167->24182 24168->24169 24169->24105 24173 c95668 24172->24173 24181 c95684 24172->24181 24174 c95030 InitializePointerDeviceInjection 24173->24174 24173->24181 24175 c95706 24174->24175 24176 c95030 InitializePointerDeviceInjection 24175->24176 24175->24181 24177 c9575b 24176->24177 24178 c95030 InitializePointerDeviceInjection 24177->24178 24177->24181 24179 c957b9 24178->24179 24180 c95030 InitializePointerDeviceInjection 24179->24180 24179->24181 24180->24179 24181->24169 24183 c95668 24182->24183 24189 c95684 24182->24189 24184 c95030 InitializePointerDeviceInjection 24183->24184 24183->24189 24185 c95706 24184->24185 24186 c95030 InitializePointerDeviceInjection 24185->24186 24185->24189 24187 c9575b 24186->24187 24188 c95030 InitializePointerDeviceInjection 24187->24188 24187->24189 24190 c957b9 24188->24190 24189->24169 24190->24189 24191 c95030 InitializePointerDeviceInjection 24190->24191 24191->24190 24234 c9de70 24235 c9de93 24234->24235 24239 c9e718 24235->24239 24253 c9e728 24235->24253 24236 c9defb 24240 c9e6e1 24239->24240 24241 c9e726 24239->24241 24242 c9e7fc 24241->24242 24244 c9e747 24241->24244 24248 c9e799 24242->24248 24250 c9e718 3 API calls 24242->24250 24251 c9e728 3 API calls 24242->24251 24243 c9eaee 24265 c9eca8 24243->24265 24244->24243 24244->24248 24271 c9e128 InitializePointerDeviceInjection 24244->24271 24246 c9eadf 24272 c9e128 InitializePointerDeviceInjection 24246->24272 24248->24236 24249 c9eb07 24249->24236 24250->24248 24251->24248 24254 c9e7fc 24253->24254 24255 c9e747 24253->24255 24256 c9e799 24254->24256 24263 c9e718 3 API calls 24254->24263 24264 c9e728 3 API calls 24254->24264 24255->24256 24260 c9eaee 24255->24260 24273 c9e128 InitializePointerDeviceInjection 24255->24273 24256->24236 24258 c9eadf 24274 c9e128 InitializePointerDeviceInjection 24258->24274 24262 c9eca8 2 API calls 24260->24262 24261 c9eb07 24261->24236 24262->24261 24263->24256 24264->24256 24266 c9ecc9 24265->24266 24267 c9ecec 24265->24267 24266->24249 24268 c9ed19 24267->24268 24269 c9ede1 InitializePointerDeviceInjection 24267->24269 24270 c9ee40 InitializePointerDeviceInjection 24267->24270 24268->24249 24269->24267 24270->24267 24271->24246 24272->24243 24273->24258 24274->24260 24230 e569c8 24231 e5e3b0 GlobalMemoryStatusEx 24230->24231 24233 e5e426 24231->24233 24192 c9f897 24193 c9f89f 24192->24193 24194 c9f8a3 24193->24194 24197 c9f8df 24193->24197 24209 c9f8e0 24193->24209 24207 c9f8df 6 API calls 24197->24207 24208 c9f8e0 6 API calls 24197->24208 24198 c9f8fe 24198->24194 24199 c9fa66 24199->24194 24200 c9fa51 24200->24199 24202 c92768 6 API calls 24200->24202 24203 c9fbab 24200->24203 24201 c9f8fa 24201->24198 24201->24200 24205 c9f8df 6 API calls 24201->24205 24206 c9f8e0 6 API calls 24201->24206 24202->24203 24203->24199 24204 c92768 6 API calls 24203->24204 24204->24199 24205->24200 24206->24200 24207->24201 24208->24201 24211 c9f8fa 24209->24211 24219 c9f8df 6 API calls 24209->24219 24220 c9f8e0 6 API calls 24209->24220 24210 c9f8fe 24210->24194 24211->24210 24213 c9fa51 24211->24213 24217 c9f8df 6 API calls 24211->24217 24218 c9f8e0 6 API calls 24211->24218 24212 c9fa66 24212->24194 24213->24212 24214 c92768 6 API calls 24213->24214 24215 c9fbab 24213->24215 24214->24215 24215->24212 24216 c92768 6 API calls 24215->24216 24216->24212 24217->24213 24218->24213 24219->24211 24220->24211

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 c92020-c9203a 2 c92068-c92079 0->2 3 c9203c-c9204d 0->3 4 c9207b-c9207f 2->4 5 c920ea-c920fe 2->5 3->2 13 c9204f-c9205b 3->13 6 c9209a-c920a3 4->6 7 c92081-c9208d 4->7 139 c92101 call c92618 5->139 140 c92101 call c92020 5->140 11 c920a9-c920ac 6->11 12 c923b8 6->12 9 c92093-c92095 7->9 10 c92427-c92472 InitializePointerDeviceInjection 7->10 15 c923ae-c923b5 9->15 69 c92479-c924f8 InitializePointerDeviceInjection 10->69 11->12 16 c920b2-c920d1 11->16 17 c923bd-c92420 InitializePointerDeviceInjection 12->17 13->17 18 c92061-c92063 13->18 14 c92107-c9210d 19 c9210f-c92111 14->19 20 c92116-c9211d 14->20 16->12 37 c920d7-c920dd 16->37 17->10 18->15 19->15 21 c92211-c92222 20->21 22 c92123-c92130 20->22 32 c9224c-c92252 21->32 33 c92224-c92231 21->33 142 c92132 call c92d50 22->142 143 c92132 call c92d42 22->143 26 c92138-c9213a 26->21 29 c92140-c9214c 26->29 34 c9220a-c9220c 29->34 35 c92152-c921c4 29->35 38 c9226d-c92273 32->38 39 c92254-c92260 32->39 33->38 50 c92233-c9223f 33->50 34->15 88 c921f2-c92207 35->88 89 c921c6-c921f0 35->89 45 c925fd-c92609 37->45 46 c920e3-c920e7 37->46 42 c92279-c92296 38->42 43 c923ab 38->43 40 c9250f-c92572 InitializePointerDeviceInjection 39->40 41 c92266-c92268 39->41 102 c92579-c925c5 InitializePointerDeviceInjection 40->102 41->15 42->12 66 c9229c-c9229f 42->66 43->15 58 c9260b-c9265c call c92768 45->58 59 c925c7-c925f8 45->59 46->5 55 c924fd-c92508 50->55 56 c92245-c92247 50->56 55->40 56->15 72 c926ac-c926b0 58->72 73 c9265e-c92662 58->73 59->102 66->45 70 c922a5-c922cb 66->70 70->43 98 c922d1-c922dd 70->98 80 c926b2-c926c1 72->80 81 c926c7-c926dd IsDialogMessageW 72->81 78 c92671-c92678 73->78 79 c92664-c92669 73->79 90 c9274e-c92760 78->90 91 c9267e-c92685 78->91 79->78 82 c926ed-c926f7 80->82 83 c926c3-c926c5 80->83 85 c926e3-c926ea 81->85 96 c926f9-c926ff 82->96 97 c92701-c92705 82->97 83->85 88->34 89->88 109 c9271f-c92747 InitializePointerDeviceInjection 90->109 110 c92763 90->110 91->72 94 c92687-c9268b 91->94 99 c9269a-c926a1 94->99 100 c9268d-c92692 94->100 103 c9270d-c9271e 96->103 97->103 104 c92707 97->104 105 c922e3-c92361 98->105 106 c923a7-c923a9 98->106 99->90 111 c926a7-c926aa 99->111 100->99 102->59 103->109 104->103 131 c9238f-c923a4 105->131 132 c92363-c9238d 105->132 106->15 109->90 111->85 131->106 132->131 139->14 140->14 142->26 143->26
                                                APIs
                                                • InitializePointerDeviceInjection.USER32 ref: 00C92411
                                                • InitializePointerDeviceInjection.USER32 ref: 00C92463
                                                • InitializePointerDeviceInjection.USER32 ref: 00C924C5
                                                • InitializePointerDeviceInjection.USER32 ref: 00C92563
                                                • InitializePointerDeviceInjection.USER32 ref: 00C925C5
                                                • InitializePointerDeviceInjection.USER32 ref: 00C92738
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.520825105.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_c90000_New Order.jbxd
                                                Similarity
                                                • API ID: DeviceInitializeInjectionPointer
                                                • String ID:
                                                • API String ID: 3161782776-0
                                                • Opcode ID: f0fde95e4a20db6fb6bfcf0b1335e4da7206e3ed55a0d9930b39cd5b1a8ca3d0
                                                • Instruction ID: 297bf69d9b537fc39cebd52256761f7c792401ea826e5950d14e5f7309ce9656
                                                • Opcode Fuzzy Hash: f0fde95e4a20db6fb6bfcf0b1335e4da7206e3ed55a0d9930b39cd5b1a8ca3d0
                                                • Instruction Fuzzy Hash: B312BE70A042199FCB14DFA4C858BAEBBF2BF88304F148529E556EB395DB34DD41CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.520825105.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_c90000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 22ab03580eb81c8e66b8231cd2c9dec8f3f1c31cd4a0a7b90802ab13668715e2
                                                • Instruction ID: d6899aab032ef52e7e1cd5c5dbd7039c9ad0b5dc16e9f6d73ac353a9989e04f4
                                                • Opcode Fuzzy Hash: 22ab03580eb81c8e66b8231cd2c9dec8f3f1c31cd4a0a7b90802ab13668715e2
                                                • Instruction Fuzzy Hash: 77825930A00649DFCF14CF69C988AAEBBF2BF48314F158559E41ADB2A1D730EE41CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 421 e569c8-e5e424 GlobalMemoryStatusEx 424 e5e426-e5e42c 421->424 425 e5e42d-e5e455 421->425 424->425
                                                APIs
                                                • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,00E5E32A), ref: 00E5E417
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.520918753.0000000000E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_e50000_New Order.jbxd
                                                Similarity
                                                • API ID: GlobalMemoryStatus
                                                • String ID: d)^
                                                • API String ID: 1890195054-1943070175
                                                • Opcode ID: 59115968b105c693da17d7936b311b80c7d45a0bcc06543337bc39fa3aa96862
                                                • Instruction ID: d959e81efb94aafd27f7a000359c2064aaf8e6e89252f0be4be0dd928505d753
                                                • Opcode Fuzzy Hash: 59115968b105c693da17d7936b311b80c7d45a0bcc06543337bc39fa3aa96862
                                                • Instruction Fuzzy Hash: 811130B1C046599BCB10CF9AD544BEEFBF4EB48324F05856AD918B7240D378AA58CFE1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 428 c916c8-c916ea 429 c916ec-c916f0 428->429 430 c91700-c9170b 428->430 431 c91718-c9171f 429->431 432 c916f2-c916fe 429->432 433 c91711-c91713 430->433 434 c917b3-c917df 430->434 436 c9173f-c91748 431->436 437 c91721-c91728 431->437 432->430 432->431 435 c917ab-c917b0 433->435 441 c917e6-c9183e 434->441 535 c9174a call c916c8 436->535 536 c9174a call c916b8 436->536 437->436 439 c9172a-c91735 437->439 440 c9173b-c9173d 439->440 439->441 440->435 460 c9184d-c9185e 441->460 461 c91840-c91846 441->461 442 c91750-c91752 443 c9175a-c91762 442->443 444 c91754-c91758 442->444 447 c91771-c91773 443->447 448 c91764-c91769 443->448 444->443 446 c91775-c91794 call c92020 444->446 454 c917a9 446->454 455 c91796-c9179f 446->455 447->435 448->447 454->435 533 c917a1 call c93e18 455->533 534 c917a1 call c93e28 455->534 457 c917a7 457->435 463 c918f1-c918f3 460->463 464 c91864-c91868 460->464 461->460 528 c918f5 call c916c8 463->528 529 c918f5 call c916b8 463->529 530 c918f5 call c919e0 463->530 531 c918f5 call c919f0 463->531 465 c91878-c91885 464->465 466 c9186a-c91876 464->466 472 c91887-c91890 465->472 466->472 467 c918fb-c91901 469 c9190d-c91914 467->469 470 c91903-c91909 467->470 473 c9190b 470->473 474 c9196f-c919ce InitializePointerDeviceInjection 470->474 477 c918bd-c918c1 472->477 478 c91892-c918a1 472->478 473->469 488 c919d5-c91a06 474->488 479 c918cd-c918d1 477->479 480 c918c3-c918c9 477->480 489 c918b1-c918bb 478->489 490 c918a3-c918aa 478->490 479->469 482 c918d3-c918d7 479->482 484 c918cb 480->484 485 c91917-c91968 InitializePointerDeviceInjection 480->485 487 c918dd-c918ef 482->487 482->488 484->469 485->474 487->469 500 c91a08-c91a15 488->500 501 c91a2b-c91a30 488->501 489->477 490->489 507 c91a27-c91a29 500->507 508 c91a17-c91a25 500->508 506 c91a38 501->506 510 c91a3a-c91a43 506->510 507->510 508->510 515 c91a6b-c91a6d call c91ac0 510->515 516 c91a45-c91a53 510->516 517 c91a73-c91a77 515->517 519 c91a60-c91a69 516->519 520 c91a55-c91a59 516->520 521 c91a79-c91a8e 517->521 522 c91a90-c91a94 517->522 519->515 520->519 523 c91ab2-c91ab8 521->523 522->523 524 c91a96-c91aab 522->524 524->523 528->467 529->467 530->467 531->467 533->457 534->457 535->442 536->442
                                                APIs
                                                • InitializePointerDeviceInjection.USER32 ref: 00C91959
                                                • InitializePointerDeviceInjection.USER32 ref: 00C919BF
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.520825105.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_c90000_New Order.jbxd
                                                Similarity
                                                • API ID: DeviceInitializeInjectionPointer
                                                • String ID:
                                                • API String ID: 3161782776-0
                                                • Opcode ID: 66af59d0e8328eda5a044acdc82b0bc06bd24b58a3d10d17c440c22cf4e42257
                                                • Instruction ID: 66d97bac45db018cfbbdfe032e34fc2999ec0cdbdb81631738f35c57f9ba2e1c
                                                • Opcode Fuzzy Hash: 66af59d0e8328eda5a044acdc82b0bc06bd24b58a3d10d17c440c22cf4e42257
                                                • Instruction Fuzzy Hash: B6C10F347082128FDB169B65C899B7E77E2AFC9344F098929E916CB385CF34DD42CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 538 c9eca8-c9ecc7 539 c9ecc9-c9ecd3 538->539 540 c9ecec-c9ed17 538->540 541 c9ece8-c9eceb 539->541 542 c9ecd5-c9ece6 539->542 544 c9ed19-c9ed23 540->544 545 c9ed3c-c9ed50 540->545 542->541 547 c9ed38-c9ed3b 544->547 548 c9ed25-c9ed36 544->548 551 c9eda9-c9edf4 InitializePointerDeviceInjection 545->551 552 c9ed52-c9ed79 545->552 548->547 553 c9edfb-c9ee53 InitializePointerDeviceInjection 551->553 552->553 554 c9ed7f-c9ed81 552->554 562 c9ee5a-c9ee5d 553->562 556 c9ed9c-c9eda1 554->556 557 c9ed83-c9ed85 554->557 556->551 558 c9ed90-c9ed92 557->558 559 c9ed87-c9ed8a 557->559 563 c9eea7-c9eead 558->563 559->558 559->562 565 c9ee5f-c9ee62 562->565 566 c9ee75-c9ee77 562->566 570 c9ee68-c9ee73 565->570 571 c9ed97 565->571 567 c9ee79-c9ee7d 566->567 568 c9ee83-c9ee85 566->568 567->568 572 c9ee7f-c9ee81 567->572 568->563 570->566 571->556 572->568 574 c9ee87-c9ee8a 572->574 577 c9ee8c 574->577 578 c9ee8f-c9ee96 574->578 577->578 582 c9ee9e 578->582 582->563
                                                APIs
                                                • InitializePointerDeviceInjection.USER32 ref: 00C9EDE5
                                                • InitializePointerDeviceInjection.USER32 ref: 00C9EE44
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.520825105.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_c90000_New Order.jbxd
                                                Similarity
                                                • API ID: DeviceInitializeInjectionPointer
                                                • String ID:
                                                • API String ID: 3161782776-0
                                                • Opcode ID: b3923c6e029f301e0f6ed85e402dba59ee4d874fa5a543fa9a0f6795388990bd
                                                • Instruction ID: e7238ce7b2127fffc9a7e54926c07daabdedd9ebe9bfdae4bb19e46002516e9d
                                                • Opcode Fuzzy Hash: b3923c6e029f301e0f6ed85e402dba59ee4d874fa5a543fa9a0f6795388990bd
                                                • Instruction Fuzzy Hash: CB514935B092404FDB56D77988186BF3BE29FE6304B1A806AE115DB3D6DF34CD0287A2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 584 c92618-c9264e 585 c92656-c9265c 584->585 612 c92650 call c92768 584->612 586 c926ac-c926b0 585->586 587 c9265e-c92662 585->587 590 c926b2-c926c1 586->590 591 c926c7-c926dd IsDialogMessageW 586->591 588 c92671-c92678 587->588 589 c92664-c92669 587->589 595 c9274e-c92760 588->595 596 c9267e-c92685 588->596 589->588 592 c926ed-c926f7 590->592 593 c926c3-c926c5 590->593 594 c926e3-c926ea 591->594 598 c926f9-c926ff 592->598 599 c92701-c92705 592->599 593->594 606 c9271f-c92747 InitializePointerDeviceInjection 595->606 607 c92763 595->607 596->586 597 c92687-c9268b 596->597 600 c9269a-c926a1 597->600 601 c9268d-c92692 597->601 603 c9270d-c9271e 598->603 599->603 604 c92707 599->604 600->595 605 c926a7-c926aa 600->605 601->600 603->606 604->603 605->594 606->595 612->585
                                                APIs
                                                • IsDialogMessageW.USER32(00000000,?,?,?,?,?), ref: 00C926DD
                                                • InitializePointerDeviceInjection.USER32 ref: 00C92738
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.520825105.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_c90000_New Order.jbxd
                                                Similarity
                                                • API ID: DeviceDialogInitializeInjectionMessagePointer
                                                • String ID:
                                                • API String ID: 2222529534-0
                                                • Opcode ID: 75ebe46e3589629ad940a630fc3b557789d52e96ae0a2dd1ca56fb613e693cf4
                                                • Instruction ID: d8d57957a81e12a21a509ca02f6bf0ef151c8a6cc3184e326e9790084a5c5772
                                                • Opcode Fuzzy Hash: 75ebe46e3589629ad940a630fc3b557789d52e96ae0a2dd1ca56fb613e693cf4
                                                • Instruction Fuzzy Hash: 8141CF31A04208AFCF109FA4C848BBEBBF6EF84314F05842AF9659B651D775EE55CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 749 c93e28-c94316 824 c94868-c9489d 749->824 825 c9431c-c9432c 749->825 829 c948a9-c948c7 824->829 830 c9489f-c948a4 824->830 825->824 826 c94332-c94342 825->826 826->824 828 c94348-c94358 826->828 828->824 831 c9435e-c9436e 828->831 843 c948c9-c948d3 829->843 844 c9493e-c9494a 829->844 832 c9498e-c94993 830->832 831->824 833 c94374-c94384 831->833 833->824 835 c9438a-c9439a 833->835 835->824 836 c943a0-c943b0 835->836 836->824 837 c943b6-c943c6 836->837 837->824 839 c943cc-c943dc 837->839 839->824 840 c943e2-c943f2 839->840 840->824 842 c943f8-c94867 840->842 843->844 850 c948d5-c948e1 843->850 848 c9494c-c94958 844->848 849 c94961-c9496d 844->849 848->849 857 c9495a-c9495f 848->857 858 c9496f-c9497b 849->858 859 c94984-c94986 849->859 855 c948e3-c948ee 850->855 856 c94906-c94909 850->856 855->856 868 c948f0-c948fa 855->868 861 c9490b-c94917 856->861 862 c94920-c9492c 856->862 857->832 858->859 870 c9497d-c94982 858->870 859->832 861->862 873 c94919-c9491e 861->873 866 c9492e-c94935 862->866 867 c94994-c949f0 call c94b58 862->867 866->867 871 c94937-c9493c 866->871 881 c94a03-c94a0e 867->881 882 c949f2-c949fd 867->882 868->856 878 c948fc-c94901 868->878 870->832 871->832 873->832 878->832 888 c94adf-c94b00 881->888 889 c94a14-c94a25 881->889 882->881 887 c94a86-c94ad8 InitializePointerDeviceInjection 882->887 887->888 893 c94a2b-c94a83 889->893
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.520825105.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_c90000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dec2827a4609cd599df8d89f032f94d068d2ec0b6815543dbff5014d2fbb0416
                                                • Instruction ID: c5647b4b68ce57b60390317413cf767bd6bf43bd6c98206a6ecdf2177b523f5e
                                                • Opcode Fuzzy Hash: dec2827a4609cd599df8d89f032f94d068d2ec0b6815543dbff5014d2fbb0416
                                                • Instruction Fuzzy Hash: 35625434A0811C8FDB24DBA0C951BAEB7B3EF89304F1285A9D10A6B794DF309D85DF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1385 c9a770-c9a787 1541 c9a78a call c9aaa8 1385->1541 1542 c9a78a call c9a80e 1385->1542 1543 c9a78a call c9a770 1385->1543 1544 c9a78a call c9a710 1385->1544 1545 c9a78a call c9aa44 1385->1545 1386 c9a790-c9a7c3 1390 c9a7c9-c9a7d2 1386->1390 1391 c9aa7c-c9aa86 1386->1391 1392 c9a7d8-c9a7eb 1390->1392 1393 c9aa8e-c9aabf 1390->1393 1396 c9a7ed 1392->1396 1397 c9a7f2-c9a826 GetNumaProcessorNode 1392->1397 1398 c9aac1-c9aac4 1393->1398 1399 c9aa67-c9aa6b 1396->1399 1419 c9a82f-c9a831 1397->1419 1400 c9aae9-c9aaec 1398->1400 1401 c9aac6-c9aae8 1398->1401 1404 c9aa89 1399->1404 1405 c9aa6d-c9aa76 1399->1405 1402 c9aaee-c9aaf0 1400->1402 1403 c9aaf3-c9aaf6 1400->1403 1402->1403 1408 c9ab18-c9ab1b 1403->1408 1409 c9aaf8-c9ab13 1403->1409 1404->1393 1405->1390 1405->1391 1411 c9ab2b-c9ab2e 1408->1411 1412 c9ab1d-c9ab20 1408->1412 1409->1408 1415 c9ab3a-c9ab3d 1411->1415 1416 c9ab30-c9ab33 1411->1416 1413 c9ac51 1412->1413 1414 c9ab26 1412->1414 1426 c9ac56-c9ac68 1413->1426 1414->1411 1423 c9ab3f-c9ab59 1415->1423 1424 c9ab60-c9ab63 1415->1424 1421 c9ab35 1416->1421 1422 c9ab84-c9ab87 1416->1422 1419->1399 1420 c9a837-c9a842 1419->1420 1420->1404 1433 c9a848-c9a852 1420->1433 1421->1415 1425 c9ab8d-c9ab91 1422->1425 1422->1426 1423->1412 1449 c9ab5b 1423->1449 1428 c9ab7f-c9ab82 1424->1428 1429 c9ab65-c9ab74 1424->1429 1430 c9ab96-c9ab99 1425->1430 1441 c9ac6a-c9ac7f 1426->1441 1442 c9ac91-c9ac9e 1426->1442 1428->1422 1428->1430 1429->1401 1445 c9ab7a 1429->1445 1434 c9ab9b-c9abb7 1430->1434 1435 c9abbc-c9abbf 1430->1435 1433->1399 1439 c9a858-c9a8be 1433->1439 1434->1435 1443 c9abc1-c9abdd 1435->1443 1444 c9abe2-c9abe5 1435->1444 1494 c9a9ac-c9a9c7 1439->1494 1495 c9a8c4-c9a915 1439->1495 1460 c9ac81-c9ac8b 1441->1460 1461 c9aca4-c9aca9 1441->1461 1455 c9aca0-c9aca3 1442->1455 1443->1444 1446 c9ac08-c9ac0b 1444->1446 1447 c9abe7-c9ac03 1444->1447 1445->1428 1446->1416 1452 c9ac11-c9ac14 1446->1452 1447->1446 1449->1424 1458 c9ac46-c9ac50 1452->1458 1459 c9ac16-c9ac19 1452->1459 1464 c9ac1b 1459->1464 1465 c9ac2a-c9ac2d 1459->1465 1460->1455 1466 c9ac8d-c9ac8f 1460->1466 1474 c9acaa-c9acbd 1461->1474 1476 c9ac23-c9ac25 1464->1476 1467 c9ac2f 1465->1467 1468 c9ac34-c9ac36 1465->1468 1466->1442 1467->1468 1472 c9ac38 1468->1472 1473 c9ac3d-c9ac40 1468->1473 1472->1473 1473->1398 1473->1458 1474->1474 1477 c9acbf-c9accf 1474->1477 1476->1465 1479 c9acd1-c9acdb 1477->1479 1480 c9acf4-c9ad44 1477->1480 1482 c9acdd-c9acee 1479->1482 1483 c9acf0-c9acf3 1479->1483 1482->1483 1502 c9a9c9-c9a9cb 1494->1502 1516 c9a953-c9a976 1495->1516 1517 c9a917-c9a951 1495->1517 1504 c9a9d9 1502->1504 1505 c9a9cd-c9a9d7 1502->1505 1506 c9a9de-c9a9e0 1504->1506 1505->1506 1507 c9a9e2-c9a9e6 1506->1507 1508 c9aa55-c9aa59 1506->1508 1510 c9a9e8-c9a9f5 1507->1510 1511 c9a9f7 1507->1511 1508->1404 1512 c9aa5b-c9aa61 1508->1512 1513 c9a9fc-c9a9fe 1510->1513 1511->1513 1512->1399 1512->1439 1513->1508 1515 c9aa00-c9aa02 1513->1515 1515->1508 1518 c9aa04-c9aa42 1515->1518 1530 c9a978-c9a9aa 1516->1530 1517->1530 1518->1508 1530->1502 1541->1386 1542->1386 1543->1386 1544->1386 1545->1386
                                                APIs
                                                • GetNumaProcessorNode.KERNEL32 ref: 00C9A803
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.520825105.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_c90000_New Order.jbxd
                                                Similarity
                                                • API ID: NodeNumaProcessor
                                                • String ID:
                                                • API String ID: 2982496373-0
                                                • Opcode ID: f510f69df0e43b8ef10d13f93949ebdf46a5fb588fa17ee7e7e4f4acf5b571ad
                                                • Instruction ID: 199c05b9541ea1cae2b571bd7f8aab4a94f7950fc17cf713f9b831d3a3dc877e
                                                • Opcode Fuzzy Hash: f510f69df0e43b8ef10d13f93949ebdf46a5fb588fa17ee7e7e4f4acf5b571ad
                                                • Instruction Fuzzy Hash: 88F1EE30A082058FCF14DB79D9586AE7BF2EF99304F218469E405DB7A1EB34DD45CBA2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.521007974.0000000000EAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EAD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_ead000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b4f1bbc52bba7ee32d685f2db577e9ca136c351c014578449e4b251d1ff76563
                                                • Instruction ID: 8edd1070b5d4b759c3cd709b2b982f5b3a8fba9843a5068d1890d4cd0f73a0de
                                                • Opcode Fuzzy Hash: b4f1bbc52bba7ee32d685f2db577e9ca136c351c014578449e4b251d1ff76563
                                                • Instruction Fuzzy Hash: B221F471508244DFDB00DF10DDC0B66BB65FB8D328F248569E9065E646C336E855D7A1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.521007974.0000000000EAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EAD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_ead000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c47e327777fe35f0e6951cc99bddc639ea1fdd36b717677410fc243138457fc3
                                                • Instruction ID: 8f124d29b8eda4d393abe07b3bbf2ac1f8cec535047f431eec334c336504541c
                                                • Opcode Fuzzy Hash: c47e327777fe35f0e6951cc99bddc639ea1fdd36b717677410fc243138457fc3
                                                • Instruction Fuzzy Hash: 0F2145B1908244DFCB05DF00DDC0B26BF65FB8C328F2485A8E9066F646C336E856DBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.521068420.0000000000EBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EBD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_ebd000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f7b589b2030f50a0320a35dce1c7b21552f70e584c94c87bf35dcfb65685b009
                                                • Instruction ID: 40585e7801de39da15c21ab7543663638069e52327ef50977468cac761430af4
                                                • Opcode Fuzzy Hash: f7b589b2030f50a0320a35dce1c7b21552f70e584c94c87bf35dcfb65685b009
                                                • Instruction Fuzzy Hash: C021F57550C244DFCB14EF14DDC0B67BB66FB88318F24C5A9D9095B246D336D846CA61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.521068420.0000000000EBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EBD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_ebd000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c5630d3abe633faf48bdf81da023adfce4ee6d42bb2bd3f877b865fdd43c9af7
                                                • Instruction ID: 5e3325c490e5eaa6a1adc6348510c4a0f7254bd2994694c90678be26a341c059
                                                • Opcode Fuzzy Hash: c5630d3abe633faf48bdf81da023adfce4ee6d42bb2bd3f877b865fdd43c9af7
                                                • Instruction Fuzzy Hash: A521807550D3C08FCB02CF20D990756BF71EB46314F28C5EAD8498B6A7C33A980ACB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.521007974.0000000000EAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EAD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_ead000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7cd45df645f4a8ea0696ff541091910f0911980562d29522548271fd63a809da
                                                • Instruction ID: ec220cfafdeb3da9ab093f8caaf01013a328caaa61a22c52a163414e3a9c70ff
                                                • Opcode Fuzzy Hash: 7cd45df645f4a8ea0696ff541091910f0911980562d29522548271fd63a809da
                                                • Instruction Fuzzy Hash: CC11B176908280CFDB11CF10D9C4B16BF71FB89328F2486A9D8051B656C336E85ACBA2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000004.00000002.521007974.0000000000EAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EAD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_ead000_New Order.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7cd45df645f4a8ea0696ff541091910f0911980562d29522548271fd63a809da
                                                • Instruction ID: c6ff74aba0c3fbb3fa991f22a34d2ad44565e28e2a1a6abbed151fefb729b11f
                                                • Opcode Fuzzy Hash: 7cd45df645f4a8ea0696ff541091910f0911980562d29522548271fd63a809da
                                                • Instruction Fuzzy Hash: 0411D676504280CFCB05CF10D9C4B16BF71FB99324F24C5A9D8055F656C336D856CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%