Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Purchase Order.exe

Overview

General Information

Sample name:Purchase Order.exe
Analysis ID:1420781
MD5:25a46527b42b425083fe4778768f2073
SHA1:837219cc634a58cb7c10be9a5d6759562eb8d3f3
SHA256:190504e991bb8bb608cf87db9ee7c7549999a17970251490ce85282f85cb49aa
Tags:exe
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
.NET source code contains potential unpacker
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Purchase Order.exe (PID: 6368 cmdline: "C:\Users\user\Desktop\Purchase Order.exe" MD5: 25A46527B42B425083FE4778768F2073)
    • Purchase Order.exe (PID: 5744 cmdline: "C:\Users\user\Desktop\Purchase Order.exe" MD5: 25A46527B42B425083FE4778768F2073)
      • WerFault.exe (PID: 2748 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5744 -s 1516 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "tslogs@mksiimst.com", "Password": "EbxKZL@2", "Host": "us2.smtp.mailhostbox.com ", "Port": "587"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x14782:$a1: get_encryptedPassword
      • 0x14a78:$a2: get_encryptedUsername
      • 0x1458e:$a3: get_timePasswordChanged
      • 0x14689:$a4: get_passwordField
      • 0x14798:$a5: set_encryptedPassword
      • 0x15d9b:$a7: get_logins
      • 0x15cfe:$a10: KeyLoggerEventArgs
      • 0x15997:$a11: KeyLoggerEventArgsEventHandler
      00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x180c0:$x1: $%SMTPDV$
      • 0x18124:$x2: $#TheHashHere%&
      • 0x1975f:$x3: %FTPDV$
      • 0x19853:$x4: $%TelegramDv$
      • 0x15997:$x5: KeyLoggerEventArgs
      • 0x15cfe:$x5: KeyLoggerEventArgs
      • 0x19783:$m2: Clipboard Logs ID
      • 0x1994f:$m2: Screenshot Logs ID
      • 0x19a1b:$m2: keystroke Logs ID
      • 0x19927:$m4: \SnakeKeylogger\
      00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 13 entries
        SourceRuleDescriptionAuthorStrings
        0.2.Purchase Order.exe.3d4c3b8.7.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.Purchase Order.exe.3d4c3b8.7.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
            0.2.Purchase Order.exe.3d4c3b8.7.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
            • 0x12b82:$a1: get_encryptedPassword
            • 0x12e78:$a2: get_encryptedUsername
            • 0x1298e:$a3: get_timePasswordChanged
            • 0x12a89:$a4: get_passwordField
            • 0x12b98:$a5: set_encryptedPassword
            • 0x1419b:$a7: get_logins
            • 0x140fe:$a10: KeyLoggerEventArgs
            • 0x13d97:$a11: KeyLoggerEventArgsEventHandler
            0.2.Purchase Order.exe.3d4c3b8.7.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
            • 0x1a49b:$a2: \Comodo\Dragon\User Data\Default\Login Data
            • 0x196cd:$a3: \Google\Chrome\User Data\Default\Login Data
            • 0x19b00:$a4: \Orbitum\User Data\Default\Login Data
            • 0x1ab3f:$a5: \Kometa\User Data\Default\Login Data
            0.2.Purchase Order.exe.3d4c3b8.7.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
            • 0x1372d:$s1: UnHook
            • 0x13734:$s2: SetHook
            • 0x1373c:$s3: CallNextHook
            • 0x13749:$s4: _hook
            Click to see the 26 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: https://scratchdreams.tkAvira URL Cloud: Label: malware
            Source: 00000003.00000002.2206030183.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "tslogs@mksiimst.com", "Password": "EbxKZL@2", "Host": "us2.smtp.mailhostbox.com ", "Port": "587"}
            Source: https://scratchdreams.tkVirustotal: Detection: 15%Perma Link
            Source: Purchase Order.exeReversingLabs: Detection: 28%
            Source: Purchase Order.exeVirustotal: Detection: 33%Perma Link
            Source: Purchase Order.exeJoe Sandbox ML: detected
            Source: Purchase Order.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: Purchase Order.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: \??\C:\Users\user\Desktop\Purchase Order.PDB source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Xml.ni.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: System.ni.pdbRSDS source: WER9980.tmp.dmp.6.dr
            Source: Binary string: n.pdb source: Purchase Order.exe, 00000003.00000002.2204985960.0000000000EF7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: ydwx.pdbSHA256 source: Purchase Order.exe
            Source: Binary string: System.Configuration.pdb8S source: WER9980.tmp.dmp.6.dr
            Source: Binary string: ydwx.pdbs\ydwx.pdbpdbdwx.pdb source: Purchase Order.exe, 00000003.00000002.2204985960.0000000000EF7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbM source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.ni.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\exe\ydwx.pdbum source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER9980.tmp.dmp.6.dr
            Source: Binary string: nDC:\Users\user\Desktop\ydwx.pdb source: Purchase Order.exe, 00000003.00000002.2204985960.0000000000EF7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdb-m source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdbmm source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\ydwx.pdb source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Xml.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Users\user\Desktop\ydwx.pdbdb source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: System.Xml.ni.pdbRSDS# source: WER9980.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\symbols\exe\ydwx.pdbH source: Purchase Order.exe, 00000003.00000002.2205493610.00000000012D7000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: Microsoft.VisualBasic.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: System.Core.ni.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: nC:\Users\user\Desktop\ydwx.pdb source: Purchase Order.exe, 00000003.00000002.2204985960.0000000000EF7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Windows.Forms.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: mscorlib.pdb source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp, WER9980.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb% source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: ydwx.pdbon source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\symbols\exe\ydwx.pdb source: Purchase Order.exe, 00000003.00000002.2205493610.00000000012D7000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: System.Core.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: ydwx.pdb source: Purchase Order.exe
            Source: Binary string: symbols\exe\ydwx.pdb source: Purchase Order.exe, 00000003.00000002.2204985960.0000000000EF7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: C:\Windows\ydwx.pdbpdbdwx.pdb source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: n(C:\Windows\ydwx.pdb source: Purchase Order.exe, 00000003.00000002.2204985960.0000000000EF7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER9980.tmp.dmp.6.dr
            Source: Binary string: System.ni.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: System.Core.ni.pdbRSDS source: WER9980.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\exe\ydwx.pdb source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp

            Networking

            barindex
            Source: Yara matchFile source: 3.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.3d4c3b8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.3d2bb98.9.raw.unpack, type: UNPACKEDPE
            Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
            Source: Purchase Order.exe, 00000003.00000002.2206030183.0000000002FB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: Purchase Order.exe, 00000003.00000002.2206030183.0000000002F9E000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000003.00000002.2206030183.0000000002FB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: Purchase Order.exe, 00000003.00000002.2206030183.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: Purchase Order.exe, 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
            Source: Purchase Order.exe, 00000003.00000002.2206030183.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Purchase Order.exeString found in binary or memory: http://tempuri.org/DataSet1.xsdCEscolha
            Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
            Source: Purchase Order.exe, 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: Purchase Order.exe, 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000003.00000002.2206030183.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://scratchdreams.tk

            System Summary

            barindex
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 3.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 3.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 3.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 3.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.Purchase Order.exe.3d2bb98.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Purchase Order.exe.3d2bb98.9.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
            Source: 0.2.Purchase Order.exe.3d2bb98.9.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Purchase Order.exe.3d2bb98.9.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 0.2.Purchase Order.exe.3d2bb98.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 0.2.Purchase Order.exe.3d2bb98.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
            Source: 0.2.Purchase Order.exe.3d2bb98.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: Purchase Order.exe PID: 6368, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: Purchase Order.exe PID: 6368, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: Process Memory Space: Purchase Order.exe PID: 5744, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
            Source: Process Memory Space: Purchase Order.exe PID: 5744, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
            Source: initial sampleStatic PE information: Filename: Purchase Order.exe
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_00EADE0C0_2_00EADE0C
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06F147F00_2_06F147F0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06F147E20_2_06F147E2
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06F130E80_2_06F130E8
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06F130D90_2_06F130D9
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06F150600_2_06F15060
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06F100060_2_06F10006
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06F12CB00_2_06F12CB0
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06F14C280_2_06F14C28
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06F14C1A0_2_06F14C1A
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06F19D6C0_2_06F19D6C
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 3_2_016235CA3_2_016235CA
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 3_2_016221B43_2_016221B4
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5744 -s 1516
            Source: Purchase Order.exe, 00000000.00000002.2036617671.0000000002ADC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Purchase Order.exe
            Source: Purchase Order.exe, 00000000.00000002.2035028579.0000000000B1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Purchase Order.exe
            Source: Purchase Order.exe, 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Purchase Order.exe
            Source: Purchase Order.exe, 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Purchase Order.exe
            Source: Purchase Order.exe, 00000000.00000000.1975610638.00000000005D6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameydwx.exeR vs Purchase Order.exe
            Source: Purchase Order.exe, 00000000.00000002.2038406598.0000000006E80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Purchase Order.exe
            Source: Purchase Order.exe, 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs Purchase Order.exe
            Source: Purchase Order.exeBinary or memory string: OriginalFilenameydwx.exeR vs Purchase Order.exe
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: Purchase Order.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 3.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 3.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 3.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.Purchase Order.exe.3d2bb98.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Purchase Order.exe.3d2bb98.9.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 0.2.Purchase Order.exe.3d2bb98.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Purchase Order.exe.3d2bb98.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 0.2.Purchase Order.exe.3d2bb98.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 0.2.Purchase Order.exe.3d2bb98.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
            Source: 0.2.Purchase Order.exe.3d2bb98.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: Purchase Order.exe PID: 6368, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: Purchase Order.exe PID: 6368, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Process Memory Space: Purchase Order.exe PID: 5744, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
            Source: Process Memory Space: Purchase Order.exe PID: 5744, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
            Source: Purchase Order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.3d4c3b8.7.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.3d2bb98.9.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.3d2bb98.9.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.3d2bb98.9.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.3d2bb98.9.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, FyuJ0fZT8QkGKLbO0a.csSecurity API names: _0020.SetAccessControl
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, FyuJ0fZT8QkGKLbO0a.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, FyuJ0fZT8QkGKLbO0a.csSecurity API names: _0020.AddAccessRule
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, NGtW9mR6Cee8uYqSK0.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, NGtW9mR6Cee8uYqSK0.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, FyuJ0fZT8QkGKLbO0a.csSecurity API names: _0020.SetAccessControl
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, FyuJ0fZT8QkGKLbO0a.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, FyuJ0fZT8QkGKLbO0a.csSecurity API names: _0020.AddAccessRule
            Source: 0.2.Purchase Order.exe.5230000.11.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
            Source: 0.2.Purchase Order.exe.2ab632c.1.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
            Source: 0.2.Purchase Order.exe.2b02944.5.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
            Source: 0.2.Purchase Order.exe.2abe344.3.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
            Source: classification engineClassification label: mal100.troj.evad.winEXE@4/6@1/1
            Source: C:\Users\user\Desktop\Purchase Order.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase Order.exe.logJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMutant created: NULL
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5744
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\f2dbadf2-782e-4c54-a631-1e82bb95e774Jump to behavior
            Source: Purchase Order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: Purchase Order.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\Purchase Order.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Purchase Order.exeReversingLabs: Detection: 28%
            Source: Purchase Order.exeVirustotal: Detection: 33%
            Source: C:\Users\user\Desktop\Purchase Order.exeFile read: C:\Users\user\Desktop\Purchase Order.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order.exe "C:\Users\user\Desktop\Purchase Order.exe"
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess created: C:\Users\user\Desktop\Purchase Order.exe "C:\Users\user\Desktop\Purchase Order.exe"
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5744 -s 1516
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess created: C:\Users\user\Desktop\Purchase Order.exe "C:\Users\user\Desktop\Purchase Order.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\Purchase Order.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: Purchase Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: Purchase Order.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Purchase Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: \??\C:\Users\user\Desktop\Purchase Order.PDB source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Xml.ni.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: System.ni.pdbRSDS source: WER9980.tmp.dmp.6.dr
            Source: Binary string: n.pdb source: Purchase Order.exe, 00000003.00000002.2204985960.0000000000EF7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: ydwx.pdbSHA256 source: Purchase Order.exe
            Source: Binary string: System.Configuration.pdb8S source: WER9980.tmp.dmp.6.dr
            Source: Binary string: ydwx.pdbs\ydwx.pdbpdbdwx.pdb source: Purchase Order.exe, 00000003.00000002.2204985960.0000000000EF7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbM source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.ni.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\exe\ydwx.pdbum source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdbRSDS source: WER9980.tmp.dmp.6.dr
            Source: Binary string: nDC:\Users\user\Desktop\ydwx.pdb source: Purchase Order.exe, 00000003.00000002.2204985960.0000000000EF7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdb-m source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\mscorlib.pdbmm source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\ydwx.pdb source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Xml.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Users\user\Desktop\ydwx.pdbdb source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: System.Xml.ni.pdbRSDS# source: WER9980.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\symbols\exe\ydwx.pdbH source: Purchase Order.exe, 00000003.00000002.2205493610.00000000012D7000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: Microsoft.VisualBasic.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: System.Core.ni.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: nC:\Users\user\Desktop\ydwx.pdb source: Purchase Order.exe, 00000003.00000002.2204985960.0000000000EF7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Windows.Forms.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: mscorlib.pdb source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp, WER9980.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb% source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: ydwx.pdbon source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\symbols\exe\ydwx.pdb source: Purchase Order.exe, 00000003.00000002.2205493610.00000000012D7000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mscorlib.ni.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: System.Core.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: ydwx.pdb source: Purchase Order.exe
            Source: Binary string: symbols\exe\ydwx.pdb source: Purchase Order.exe, 00000003.00000002.2204985960.0000000000EF7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: C:\Windows\ydwx.pdbpdbdwx.pdb source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: n(C:\Windows\ydwx.pdb source: Purchase Order.exe, 00000003.00000002.2204985960.0000000000EF7000.00000004.00000010.00020000.00000000.sdmp
            Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER9980.tmp.dmp.6.dr
            Source: Binary string: System.ni.pdb source: WER9980.tmp.dmp.6.dr
            Source: Binary string: System.Core.ni.pdbRSDS source: WER9980.tmp.dmp.6.dr
            Source: Binary string: \??\C:\Windows\exe\ydwx.pdb source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Purchase Order.exe, Form1.cs.Net Code: InitializeComponent
            Source: 0.2.Purchase Order.exe.5060000.10.raw.unpack, nL.cs.Net Code: sf
            Source: 0.2.Purchase Order.exe.5060000.10.raw.unpack, nL.cs.Net Code: wb System.Reflection.Assembly.Load(byte[])
            Source: 0.2.Purchase Order.exe.2aa4e90.6.raw.unpack, nL.cs.Net Code: sf
            Source: 0.2.Purchase Order.exe.2aa4e90.6.raw.unpack, nL.cs.Net Code: wb System.Reflection.Assembly.Load(byte[])
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, FyuJ0fZT8QkGKLbO0a.cs.Net Code: eSHBZKoPfD System.Reflection.Assembly.Load(byte[])
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, FyuJ0fZT8QkGKLbO0a.cs.Net Code: eSHBZKoPfD System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_00EA5DCB pushad ; iretd 0_2_00EA5DD9
            Source: C:\Users\user\Desktop\Purchase Order.exeCode function: 0_2_06F17C22 push es; retf 0_2_06F17C24
            Source: Purchase Order.exeStatic PE information: section name: .text entropy: 7.939183932107505
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, NGtW9mR6Cee8uYqSK0.csHigh entropy of concatenated method names: 'fbXp4Gnw3s', 'bTIpX3VQcW', 'niUpRjoXv7', 'a9RpQlQiRj', 'pCQpGbEl8t', 'wKKpnTR70y', 'UvPpVc5VQX', 'cfLpCKfhbj', 'XxBpxXERkY', 'Wp5phDbj4d'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, uoIBHmFPkhUFQerbYn.csHigh entropy of concatenated method names: 'IPvl1OSdbU', 'iv6lAul8sA', 'S5LlrTwXBu', 'V7Ylev95Iv', 'zJllgLV9CA', 'Y1alJuhpQh', 'Qh8l00KHLF', 'idElN1XpTc', 'lFQlPjK4FR', 'CTZlWrKB1b'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, E1vSHmxrHlqTsNUgxd.csHigh entropy of concatenated method names: 'khju8BZm6S', 'QDoupOsxpD', 'neju5gp4nw', 'mVwuDXOurx', 'AP2ucO5ww1', 'GRguK3OTqw', 'WZyudkoDPA', 'r3Yuf2oba9', 'eiIu3tj5To', 'D0wuLrFvON'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, bmPJCkvxRZ0biGsWep.csHigh entropy of concatenated method names: 'CQF5ifFu1O', 'z1r5yTMuSr', 'Jne51G5GsZ', 'qDN5ACnGkE', 'aXa5m4YkqD', 'UIB5SWmRtN', 'kLQ5M8EbIt', 'zk65uthTdn', 'GMd59IoVYH', 'j8k5UAK3FE'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, N6InL94UlvEinA1O1jx.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'yj0U49BKSv', 'v5mUXYyE53', 'aElURRs8GJ', 'BC9UQENkDm', 'EdaUGmhS1w', 'EaLUnDRZLG', 'IVZUVw9SZ8'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, KC1wtZamGsktrMxJHS.csHigh entropy of concatenated method names: 'pn0K8bJKEB', 'EOBK5pPI7d', 'k2bKcpf5mt', 'YbTchGcGyZ', 'h3BczNr3Nu', 'UowKqlDMtE', 'QEOKjqCArh', 'kMtK75PnCB', 'PLAKFTZj3s', 'GBvKBcLiEU'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, YHZGZmtud5qs1b81Hm.csHigh entropy of concatenated method names: 'DTgcHSREws', 'bsNcbntoRV', 'WPqcZCDTS8', 'eB2ciple79', 'PNmcy64RGO', 'SrxcwpRAfn', 'VshcAZXE3r', 'lLtcEBS4PY', 'AW7BNL5uqdj42FSS8YN', 'LRJGFm5e0101PufXTiB'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, xp0TTnCEDMiZTN5mCF.csHigh entropy of concatenated method names: 'y7Q9jNlevm', 'CGe9FYJXIj', 'XaN9BGOJce', 'OWo9892RjW', 'BDK9pq19Ko', 'tNk9DrqBs7', 'cBk9cpg81D', 'SsnuVfEPXK', 'hUhuCEW7dP', 'EZruxC86D9'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, Dm2Aa1KN8NCRa2S116.csHigh entropy of concatenated method names: 'DqWmPgEVvI', 'JFFmTD6Gqt', 'stwm4tJnlB', 'TuvmXMIf2F', 'JGbmergLkt', 'GommtF6Qi6', 'JvOmgoqAOL', 'd1omJ8cZG2', 'v4CmaBHbeY', 'P0Am08FLAx'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, QrapHu4bTYdeWhiBv34.csHigh entropy of concatenated method names: 'MtL9bmEOyB', 'rYN9sVySMn', 'vu59ZQGavL', 'wIH9ijo2Zk', 'hv09Is9hsE', 'NM89yt9heb', 'wOh9w5ZT61', 'QgK91IctX3', 'fVm9AZ8bQt', 'O229Ej1HuM'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, A6MLiKBRyMujdf4xuU.csHigh entropy of concatenated method names: 'fZWjKlvPpC', 'qSkjdKtY9I', 'eX7j3Xgyf6', 'wmdjLK0VKJ', 'EvWjmNeVey', 'J5wjSxR61i', 'YpkW6iFQGX7lA4bpU7', 'hSc09BxJuG4rW8LpYM', 'RUBjj8mj5e', 'iALjF00D7I'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, ddU9BNIepTqiYiDSNe.csHigh entropy of concatenated method names: 'ToString', 'RgsSWurqnc', 'n0ZSeww0Ls', 'FPEStuSK6a', 'CcSSgCT38J', 'EVqSJjRUgb', 'B7bSalfqZ0', 'N7cS0xB4sq', 'mDASN606bI', 'QsrS6L6rCW'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, FyuJ0fZT8QkGKLbO0a.csHigh entropy of concatenated method names: 'MCpF2gwF2Y', 'QMFF83KnJV', 'OcxFp9x8lF', 'C9iF5RrC5r', 'WjoFDckhNi', 'ovlFc68W9Z', 'xr6FK2qnmD', 'k9XFdwKR7s', 'zyuFfnlxlU', 'RiTF3qyEGj'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, M0VWMlW1XLOoXZdsFT.csHigh entropy of concatenated method names: 'LlLM3LIay6', 'IeWMLxlH4M', 'ToString', 'YOnM8OKuFH', 'KXoMpZFTJN', 'cVfM5cmakJ', 'm7lMDD4ifU', 'sbnMc3QUNv', 'unWMK4hXTS', 'CGMMdaD4Ky'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, yHJiJiM1egwcK8Tpms.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'gel7xVHfat', 'frb7h5Advd', 'NcZ7zGW2qY', 'nkeFqlu1XR', 'pA3Fj3U7ke', 'UHHF7Ccixp', 'QMHFFM3s6b', 'En9uIYKcHWU07GO99rk'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, OjtXevgflriv064PBT.csHigh entropy of concatenated method names: 'tPZMC3O3kO', 'iXuMhrH52F', 'mfXuqnUD1d', 'mYHuj5empF', 'faJMWBPhxG', 'fLaMThJy9E', 'PdiMvm2o04', 'Hv3M4LbtKk', 'QbgMXtoM7Z', 'OErMReRsvY'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, N98lf8z4IoKp8QYGYE.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'ueM9lq2ERr', 'Wnl9mFZwyT', 'Lqy9SiMUqR', 'TZ09MAwOjM', 'I4o9ut758p', 'F4V99DWYFC', 'CGv9U4rwfP'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, w5I2yQcLxXelSwIFPi.csHigh entropy of concatenated method names: 'Dispose', 'gPxjxhEliC', 'Ft87eEtsyT', 'vM1OOMEmqN', 'D3hjhAK1OW', 'Umojz1CJPs', 'ProcessDialogKey', 'zpt7qprMtj', 'NjZ7jHvBy1', 'H1e774lvat'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, IalQVsoXW2uguJbXwL.csHigh entropy of concatenated method names: 'UfoZNYu9T', 'LmYiIHLoh', 'EX9y4SqrO', 'xr1wfaOWF', 'BuTANytUO', 'Sx2EMARek', 'UevhZGJSnCMPgTlwcy', 'gwrG7uk1RM5IhjM7Mw', 'lkEuZPa5j', 'FG8Ullk38'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, zm8M94O2ty4UIhePqx.csHigh entropy of concatenated method names: 'prKKbYLagH', 'fc7KsNvH8V', 'xRZKZLUm2t', 'nxOKiO2eEr', 'uH8KIjPl0P', 'FNJKyJt4Ea', 'NuPKwXXeH4', 'y1yK1xsKJp', 'SYEKASAAUn', 'TWcKE8kZGM'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, itB6mEiuYAhrSJUq77.csHigh entropy of concatenated method names: 'WVYurkZDfk', 'kZEueuEPeT', 'iQ3utGpMgM', 'coHugOmDF2', 'ODPu4ZAJmf', 'HfeuJGgpE9', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.Purchase Order.exe.3d97540.8.raw.unpack, cqZD1FH9amU9k1wEc9.csHigh entropy of concatenated method names: 'YyNc2Zm8PF', 'l2KcpOuMZE', 'UwOcDg7ZQV', 'HnycK4dOti', 'XUpcdfgAEa', 'A6eDGhDvtV', 'kNbDnFaP9F', 'dFWDVOvPEu', 'OrqDCPREJ8', 'RFkDx4nTVe'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, NGtW9mR6Cee8uYqSK0.csHigh entropy of concatenated method names: 'fbXp4Gnw3s', 'bTIpX3VQcW', 'niUpRjoXv7', 'a9RpQlQiRj', 'pCQpGbEl8t', 'wKKpnTR70y', 'UvPpVc5VQX', 'cfLpCKfhbj', 'XxBpxXERkY', 'Wp5phDbj4d'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, uoIBHmFPkhUFQerbYn.csHigh entropy of concatenated method names: 'IPvl1OSdbU', 'iv6lAul8sA', 'S5LlrTwXBu', 'V7Ylev95Iv', 'zJllgLV9CA', 'Y1alJuhpQh', 'Qh8l00KHLF', 'idElN1XpTc', 'lFQlPjK4FR', 'CTZlWrKB1b'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, E1vSHmxrHlqTsNUgxd.csHigh entropy of concatenated method names: 'khju8BZm6S', 'QDoupOsxpD', 'neju5gp4nw', 'mVwuDXOurx', 'AP2ucO5ww1', 'GRguK3OTqw', 'WZyudkoDPA', 'r3Yuf2oba9', 'eiIu3tj5To', 'D0wuLrFvON'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, bmPJCkvxRZ0biGsWep.csHigh entropy of concatenated method names: 'CQF5ifFu1O', 'z1r5yTMuSr', 'Jne51G5GsZ', 'qDN5ACnGkE', 'aXa5m4YkqD', 'UIB5SWmRtN', 'kLQ5M8EbIt', 'zk65uthTdn', 'GMd59IoVYH', 'j8k5UAK3FE'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, N6InL94UlvEinA1O1jx.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'yj0U49BKSv', 'v5mUXYyE53', 'aElURRs8GJ', 'BC9UQENkDm', 'EdaUGmhS1w', 'EaLUnDRZLG', 'IVZUVw9SZ8'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, KC1wtZamGsktrMxJHS.csHigh entropy of concatenated method names: 'pn0K8bJKEB', 'EOBK5pPI7d', 'k2bKcpf5mt', 'YbTchGcGyZ', 'h3BczNr3Nu', 'UowKqlDMtE', 'QEOKjqCArh', 'kMtK75PnCB', 'PLAKFTZj3s', 'GBvKBcLiEU'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, YHZGZmtud5qs1b81Hm.csHigh entropy of concatenated method names: 'DTgcHSREws', 'bsNcbntoRV', 'WPqcZCDTS8', 'eB2ciple79', 'PNmcy64RGO', 'SrxcwpRAfn', 'VshcAZXE3r', 'lLtcEBS4PY', 'AW7BNL5uqdj42FSS8YN', 'LRJGFm5e0101PufXTiB'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, xp0TTnCEDMiZTN5mCF.csHigh entropy of concatenated method names: 'y7Q9jNlevm', 'CGe9FYJXIj', 'XaN9BGOJce', 'OWo9892RjW', 'BDK9pq19Ko', 'tNk9DrqBs7', 'cBk9cpg81D', 'SsnuVfEPXK', 'hUhuCEW7dP', 'EZruxC86D9'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, Dm2Aa1KN8NCRa2S116.csHigh entropy of concatenated method names: 'DqWmPgEVvI', 'JFFmTD6Gqt', 'stwm4tJnlB', 'TuvmXMIf2F', 'JGbmergLkt', 'GommtF6Qi6', 'JvOmgoqAOL', 'd1omJ8cZG2', 'v4CmaBHbeY', 'P0Am08FLAx'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, QrapHu4bTYdeWhiBv34.csHigh entropy of concatenated method names: 'MtL9bmEOyB', 'rYN9sVySMn', 'vu59ZQGavL', 'wIH9ijo2Zk', 'hv09Is9hsE', 'NM89yt9heb', 'wOh9w5ZT61', 'QgK91IctX3', 'fVm9AZ8bQt', 'O229Ej1HuM'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, A6MLiKBRyMujdf4xuU.csHigh entropy of concatenated method names: 'fZWjKlvPpC', 'qSkjdKtY9I', 'eX7j3Xgyf6', 'wmdjLK0VKJ', 'EvWjmNeVey', 'J5wjSxR61i', 'YpkW6iFQGX7lA4bpU7', 'hSc09BxJuG4rW8LpYM', 'RUBjj8mj5e', 'iALjF00D7I'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, ddU9BNIepTqiYiDSNe.csHigh entropy of concatenated method names: 'ToString', 'RgsSWurqnc', 'n0ZSeww0Ls', 'FPEStuSK6a', 'CcSSgCT38J', 'EVqSJjRUgb', 'B7bSalfqZ0', 'N7cS0xB4sq', 'mDASN606bI', 'QsrS6L6rCW'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, FyuJ0fZT8QkGKLbO0a.csHigh entropy of concatenated method names: 'MCpF2gwF2Y', 'QMFF83KnJV', 'OcxFp9x8lF', 'C9iF5RrC5r', 'WjoFDckhNi', 'ovlFc68W9Z', 'xr6FK2qnmD', 'k9XFdwKR7s', 'zyuFfnlxlU', 'RiTF3qyEGj'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, M0VWMlW1XLOoXZdsFT.csHigh entropy of concatenated method names: 'LlLM3LIay6', 'IeWMLxlH4M', 'ToString', 'YOnM8OKuFH', 'KXoMpZFTJN', 'cVfM5cmakJ', 'm7lMDD4ifU', 'sbnMc3QUNv', 'unWMK4hXTS', 'CGMMdaD4Ky'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, yHJiJiM1egwcK8Tpms.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'gel7xVHfat', 'frb7h5Advd', 'NcZ7zGW2qY', 'nkeFqlu1XR', 'pA3Fj3U7ke', 'UHHF7Ccixp', 'QMHFFM3s6b', 'En9uIYKcHWU07GO99rk'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, OjtXevgflriv064PBT.csHigh entropy of concatenated method names: 'tPZMC3O3kO', 'iXuMhrH52F', 'mfXuqnUD1d', 'mYHuj5empF', 'faJMWBPhxG', 'fLaMThJy9E', 'PdiMvm2o04', 'Hv3M4LbtKk', 'QbgMXtoM7Z', 'OErMReRsvY'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, N98lf8z4IoKp8QYGYE.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'ueM9lq2ERr', 'Wnl9mFZwyT', 'Lqy9SiMUqR', 'TZ09MAwOjM', 'I4o9ut758p', 'F4V99DWYFC', 'CGv9U4rwfP'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, w5I2yQcLxXelSwIFPi.csHigh entropy of concatenated method names: 'Dispose', 'gPxjxhEliC', 'Ft87eEtsyT', 'vM1OOMEmqN', 'D3hjhAK1OW', 'Umojz1CJPs', 'ProcessDialogKey', 'zpt7qprMtj', 'NjZ7jHvBy1', 'H1e774lvat'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, IalQVsoXW2uguJbXwL.csHigh entropy of concatenated method names: 'UfoZNYu9T', 'LmYiIHLoh', 'EX9y4SqrO', 'xr1wfaOWF', 'BuTANytUO', 'Sx2EMARek', 'UevhZGJSnCMPgTlwcy', 'gwrG7uk1RM5IhjM7Mw', 'lkEuZPa5j', 'FG8Ullk38'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, zm8M94O2ty4UIhePqx.csHigh entropy of concatenated method names: 'prKKbYLagH', 'fc7KsNvH8V', 'xRZKZLUm2t', 'nxOKiO2eEr', 'uH8KIjPl0P', 'FNJKyJt4Ea', 'NuPKwXXeH4', 'y1yK1xsKJp', 'SYEKASAAUn', 'TWcKE8kZGM'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, itB6mEiuYAhrSJUq77.csHigh entropy of concatenated method names: 'WVYurkZDfk', 'kZEueuEPeT', 'iQ3utGpMgM', 'coHugOmDF2', 'ODPu4ZAJmf', 'HfeuJGgpE9', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.Purchase Order.exe.6e80000.12.raw.unpack, cqZD1FH9amU9k1wEc9.csHigh entropy of concatenated method names: 'YyNc2Zm8PF', 'l2KcpOuMZE', 'UwOcDg7ZQV', 'HnycK4dOti', 'XUpcdfgAEa', 'A6eDGhDvtV', 'kNbDnFaP9F', 'dFWDVOvPEu', 'OrqDCPREJ8', 'RFkDx4nTVe'
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: Purchase Order.exe PID: 6368, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: E60000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 2A80000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 28A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 7720000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 6F20000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 8820000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 9820000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 1620000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 2EF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: 2CF0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exe TID: 3944Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: Amcache.hve.6.drBinary or memory string: VMware
            Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Purchase Order.exe, 00000003.00000002.2205222662.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: Amcache.hve.6.drBinary or memory string: vmci.sys
            Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
            Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.6.drBinary or memory string: VMware20,1
            Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\Purchase Order.exeMemory written: C:\Users\user\Desktop\Purchase Order.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeProcess created: C:\Users\user\Desktop\Purchase Order.exe "C:\Users\user\Desktop\Purchase Order.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Users\user\Desktop\Purchase Order.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Users\user\Desktop\Purchase Order.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Purchase Order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.Purchase Order.exe.3d4c3b8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.3d2bb98.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.3d4c3b8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.3d2bb98.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.2206030183.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order.exe PID: 6368, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Purchase Order.exe PID: 5744, type: MEMORYSTR
            Source: Yara matchFile source: 0.2.Purchase Order.exe.3d4c3b8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.3d2bb98.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.3d4c3b8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.3d2bb98.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order.exe PID: 6368, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Purchase Order.exe PID: 5744, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.Purchase Order.exe.3d4c3b8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.Purchase Order.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.3d2bb98.9.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.3d4c3b8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Purchase Order.exe.3d2bb98.9.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.2206030183.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Purchase Order.exe PID: 6368, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Purchase Order.exe PID: 5744, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
            DLL Side-Loading
            111
            Process Injection
            1
            Masquerading
            OS Credential Dumping21
            Security Software Discovery
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop ProtocolData from Removable Media1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
            Virtualization/Sandbox Evasion
            Security Account Manager41
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
            Process Injection
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object ModelInput Capture12
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets12
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Obfuscated Files or Information
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Purchase Order.exe29%ReversingLabsWin32.Trojan.Generic
            Purchase Order.exe34%VirustotalBrowse
            Purchase Order.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            checkip.dyndns.com0%VirustotalBrowse
            checkip.dyndns.org0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://checkip.dyndns.org0%URL Reputationsafe
            http://checkip.dyndns.org/0%URL Reputationsafe
            http://checkip.dyndns.com0%URL Reputationsafe
            http://checkip.dyndns.com0%URL Reputationsafe
            http://checkip.dyndns.org/q0%URL Reputationsafe
            https://reallyfreegeoip.org/xml/0%URL Reputationsafe
            https://reallyfreegeoip.org/xml/0%URL Reputationsafe
            http://tempuri.org/DataSet1.xsdCEscolha0%Avira URL Cloudsafe
            https://scratchdreams.tk100%Avira URL Cloudmalware
            http://tempuri.org/DataSet1.xsdCEscolha3%VirustotalBrowse
            https://scratchdreams.tk15%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            checkip.dyndns.com
            132.226.8.169
            truefalseunknown
            checkip.dyndns.org
            unknown
            unknowntrueunknown
            NameMaliciousAntivirus DetectionReputation
            http://checkip.dyndns.org/false
            • URL Reputation: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://upx.sf.netAmcache.hve.6.drfalse
              high
              http://checkip.dyndns.orgPurchase Order.exe, 00000003.00000002.2206030183.0000000002F9E000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000003.00000002.2206030183.0000000002FB1000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://checkip.dyndns.comPurchase Order.exe, 00000003.00000002.2206030183.0000000002FB1000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePurchase Order.exe, 00000003.00000002.2206030183.0000000002EF1000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://tempuri.org/DataSet1.xsdCEscolhaPurchase Order.exefalse
                • 3%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://checkip.dyndns.org/qPurchase Order.exe, 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://scratchdreams.tkPurchase Order.exe, 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000003.00000002.2206030183.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                • 15%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                https://reallyfreegeoip.org/xml/Purchase Order.exe, 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, Purchase Order.exe, 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                132.226.8.169
                checkip.dyndns.comUnited States
                16989UTMEMUSfalse
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1420781
                Start date and time:2024-04-05 11:51:08 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 40s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:11
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:Purchase Order.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@4/6@1/1
                EGA Information:
                • Successful, ratio: 50%
                HCA Information:
                • Successful, ratio: 98%
                • Number of executed functions: 44
                • Number of non-executed functions: 10
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 104.208.16.94
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                • Execution Graph export aborted for target Purchase Order.exe, PID 5744 because it is empty
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                • Report size getting too big, too many NtSetInformationFile calls found.
                TimeTypeDescription
                11:51:54API Interceptor1x Sleep call for process: Purchase Order.exe modified
                11:52:17API Interceptor1x Sleep call for process: WerFault.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                132.226.8.169FGT5000800000.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                • checkip.dyndns.org/
                z52OURO08765.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                • checkip.dyndns.org/
                23343100IM00270839_Dekont1.exeGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                SecuriteInfo.com.Trojan.PackedNET.2725.1552.3502.exeGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                vessel details.exeGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                42bgGNhDFs.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                • checkip.dyndns.org/
                SD09870GH.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                • checkip.dyndns.org/
                Ordine d'acquisto 9100033466 dal 14022024.iso.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                • checkip.dyndns.org/
                hesaphareketi-01.(170K).pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                rZiraatBankasSwiftMesaj.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                checkip.dyndns.comPurchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                • 158.101.44.242
                Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                • 132.226.247.73
                Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                • 132.226.247.73
                Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                • 193.122.130.0
                lxdriver_setup.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                • 158.101.44.242
                iCareFone.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                • 193.122.130.0
                Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                • 132.226.247.73
                109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                • 193.122.6.168
                1d4D5ndo0x.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                • 193.122.6.168
                FGT5000800000.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                • 132.226.8.169
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                UTMEMUSFuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                • 132.226.247.73
                Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                • 132.226.247.73
                Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                • 132.226.247.73
                FGT5000800000.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                • 132.226.8.169
                z52OURO08765.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                • 132.226.8.169
                8wvP84hzFu.exeGet hashmaliciousSnake KeyloggerBrowse
                • 132.226.247.73
                23343100IM00270839_Dekont1.exeGet hashmaliciousSnake KeyloggerBrowse
                • 132.226.8.169
                9NdabeH642.elfGet hashmaliciousMirai, MoobotBrowse
                • 132.240.147.214
                Payment_Draft_confirmation.xla.xlsxGet hashmaliciousSnake KeyloggerBrowse
                • 132.226.247.73
                xdd6BRIg0O.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                • 132.226.247.73
                No context
                No context
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):1.0901823636519925
                Encrypted:false
                SSDEEP:192:3BniCkDpuT0BU/6a6ce36izuiFJZ24IO8x:3BiCkDpuABU/6arVizuiFJY4IO8x
                MD5:DF0B8D5817B1DC12F76686AE93FAFAC5
                SHA1:7565FDFBEAE44C953D873691F91D2D0168B01C55
                SHA-256:AF5B21C7FDBC110E760A261516836CADFE84BF5D5E892FF052639485EE220A7A
                SHA-512:AA61527C5E023AF05402E1745B4786E08A64B85F5F448FB03A827BBCA1620D1E6085840E9288489FAABE515FDED5D7437AAF18116F11F2FEF913DAB02B33245B
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.6.7.8.4.3.2.4.0.8.2.3.8.0.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.6.7.8.4.3.2.4.5.9.8.0.0.6.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.8.1.4.2.1.a.5.-.7.6.5.5.-.4.4.c.6.-.9.3.1.c.-.f.e.9.8.2.a.3.4.b.8.4.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.c.4.3.c.3.4.1.-.1.8.1.3.-.4.a.8.1.-.8.6.c.0.-.8.4.c.c.f.0.0.1.5.9.c.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.P.u.r.c.h.a.s.e. .O.r.d.e.r...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.y.d.w.x...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.7.0.-.0.0.0.1.-.0.0.1.4.-.7.e.8.a.-.7.6.e.7.3.e.8.7.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.5.0.f.2.8.7.2.4.1.9.1.e.c.4.a.1.3.3.c.a.a.9.b.b.a.4.f.1.2.3.8.0.0.0.0.0.0.0.0.!.0.0.0.0.8.3.7.2.1.9.c.c.6.3.4.a.5.8.c.b.7.c.1.0.b.e.9.a.5.d.6.7.5.9.5.6.2.e.b.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Mini DuMP crash report, 15 streams, Fri Apr 5 09:52:04 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):268939
                Entropy (8bit):3.7363079556487633
                Encrypted:false
                SSDEEP:3072:ogwYQUA4uEq7yqLTgHlJjOCxChrFfllWF:obXUA4yyITgHlJjOHr
                MD5:06A26E2E0AE96FBA644B46D8A0AAA0A5
                SHA1:8220E19C43ADF9A24D5618B111CE04D3C3E00CF1
                SHA-256:AF95A82C7BDF097941546DC053CC95C283A14D72B8FD0DDC6F1982AF90D87202
                SHA-512:6F5A00A0D33A1F96348EA153635F0608F0A87E468F899BE37EB54E1209C23F7930ED4C939423DA0FC5D63A9D2558862217BADE37B16C3CB35AC08E0DCEC6216E
                Malicious:false
                Reputation:low
                Preview:MDMP..a..... ..........f............D...............X.......<....#......$%..6S..........`.......8...........T............;..............,$...........&..............................................................................eJ.......&......GenuineIntel............T.......p......f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):6332
                Entropy (8bit):3.722838099930757
                Encrypted:false
                SSDEEP:96:RSIU6o7wVetbP+66JYA4xuQE/JpggaM4UO89bNbsfSXvIGm:R6l7wVeJP+66JYA40xprO89bNbsfIvPm
                MD5:DD282D72B36807006BBC309B75865366
                SHA1:ACAEA7DB5BE9854CE1961F9EEC54A1B1511BE55F
                SHA-256:7D1202D9ECCC727E40434F165E7A21F7951812156B39A9CE411BD3D91EEA66B4
                SHA-512:1FA3EE8E8744C297458146D52193B24C3E5DA6D5D0A3600C17FD4294DFE89D7D06D63D5612CAF802F123E68443AA8BA1B4A406A12E9235BE2806016C9B4B87A7
                Malicious:false
                Reputation:low
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.7.4.4.<./.P.i.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4674
                Entropy (8bit):4.48108002064066
                Encrypted:false
                SSDEEP:48:cvIwWl8zsPtJg77aI9QiOWpW8VYeZYm8M4Jw+tjFwo+q8LaJXmXOhLo0d:uIjfPHI7zv7V1IJw+4oKy/hLo0d
                MD5:09FF61A0119CA4834417116263136B27
                SHA1:7E0206054B464785A87499C896B081C7D3B9DBF1
                SHA-256:DB0D8D4E3FF3A93CF07575CC902EBC9CB34CA4260A80B94ACD076D67441EEBF1
                SHA-512:F7695EA70448134F835526B7975345BFD06643A72294B70E823AF749750E17DCA16470A06653A862149EA05B889126BE91B50382DDD8A7C214F6D56CFA8396FA
                Malicious:false
                Reputation:low
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="266454" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Users\user\Desktop\Purchase Order.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1216
                Entropy (8bit):5.34331486778365
                Encrypted:false
                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                Malicious:false
                Reputation:high, very likely benign file
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:MS Windows registry file, NT/2000 or above
                Category:dropped
                Size (bytes):1835008
                Entropy (8bit):4.4218396381761815
                Encrypted:false
                SSDEEP:6144:9Svfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNa0uhiTw3:kvloTMW+EZMM6DFyc03w3
                MD5:B3063836AFA14682145AC07C0B1B4F60
                SHA1:A79970DC1003E64F49EE55285F71D062C27CF2EF
                SHA-256:5BAA1551E009234AACB9DF488FFF85E86D21AA70642BEE9CAE6CC1D2F2798787
                SHA-512:B86239DC920518A6322FDE36BE02701CE187A663B077219A18ECAE56E737AE557E37FE0FAAB59F2A4E4FDA2ED7ABAD4628B3263F7CE3032192D46BF9FC48CF92
                Malicious:false
                Reputation:low
                Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm~...>...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.930875275193581
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                • Win32 Executable (generic) a (10002005/4) 49.78%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                File name:Purchase Order.exe
                File size:536'576 bytes
                MD5:25a46527b42b425083fe4778768f2073
                SHA1:837219cc634a58cb7c10be9a5d6759562eb8d3f3
                SHA256:190504e991bb8bb608cf87db9ee7c7549999a17970251490ce85282f85cb49aa
                SHA512:afc0a18d8fc87168c144d274c7ffc39537a303d6fc02e6aa59d1ea3a116313a4fd6b4c32a91f33ceefcb33917447bd2c3eb2b962da67fffd339d7dee6bc67471
                SSDEEP:12288:JrLz6jG8UHRVVLHxjNFD04RUBFQG27TGS7oukJ0aSahC5ri78c5:0GTHhLB04uGTGOkGaHhCpi7R
                TLSH:C3B4120533A8DB27DCBC47F67016656403B2AABA39D2E1889DC2A0CB5F71F4096E5F47
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f..............0..&...........D... ...`....@.. ....................................@................................
                Icon Hash:00928e8e8686b000
                Entrypoint:0x4844f2
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x660FA8AB [Fri Apr 5 07:30:51 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                xor al, 38h
                xor eax, 38483446h
                xor al, 47h
                dec eax
                xor eax, 00003447h
                add byte ptr [edx], dh
                inc ebx
                inc edx
                push ebx
                aaa
                dec eax
                xor eax, 00003439h
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x8449f0x4f.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x860000x600.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x880000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x822400x54.text
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x825180x826008796a58a78fab8a8fe64e7035a63e67fFalse0.9418556747363375data7.939183932107505IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x860000x6000x6002e928705684918b55273aa480f3107d6False0.4381510416666667data4.210370842925874IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x880000xc0x200572f070a77c7de371edafcab2822a735False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_VERSION0x860900x370data0.425
                RT_MANIFEST0x864100x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                DLLImport
                mscoree.dll_CorExeMain
                TimestampSource PortDest PortSource IPDest IP
                Apr 5, 2024 11:52:01.492651939 CEST4970980192.168.2.5132.226.8.169
                Apr 5, 2024 11:52:01.777054071 CEST8049709132.226.8.169192.168.2.5
                Apr 5, 2024 11:52:01.777498960 CEST4970980192.168.2.5132.226.8.169
                Apr 5, 2024 11:52:01.777498960 CEST4970980192.168.2.5132.226.8.169
                Apr 5, 2024 11:52:02.062019110 CEST8049709132.226.8.169192.168.2.5
                Apr 5, 2024 11:52:04.634476900 CEST8049709132.226.8.169192.168.2.5
                Apr 5, 2024 11:52:04.690285921 CEST4970980192.168.2.5132.226.8.169
                Apr 5, 2024 11:52:18.478009939 CEST4970980192.168.2.5132.226.8.169
                TimestampSource PortDest PortSource IPDest IP
                Apr 5, 2024 11:52:01.362235069 CEST6122153192.168.2.51.1.1.1
                Apr 5, 2024 11:52:01.486613035 CEST53612211.1.1.1192.168.2.5
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Apr 5, 2024 11:52:01.362235069 CEST192.168.2.51.1.1.10xc226Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Apr 5, 2024 11:52:01.486613035 CEST1.1.1.1192.168.2.50xc226No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                Apr 5, 2024 11:52:01.486613035 CEST1.1.1.1192.168.2.50xc226No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                Apr 5, 2024 11:52:01.486613035 CEST1.1.1.1192.168.2.50xc226No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                Apr 5, 2024 11:52:01.486613035 CEST1.1.1.1192.168.2.50xc226No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                Apr 5, 2024 11:52:01.486613035 CEST1.1.1.1192.168.2.50xc226No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                Apr 5, 2024 11:52:01.486613035 CEST1.1.1.1192.168.2.50xc226No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                • checkip.dyndns.org
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.549709132.226.8.169805744C:\Users\user\Desktop\Purchase Order.exe
                TimestampBytes transferredDirectionData
                Apr 5, 2024 11:52:01.777498960 CEST151OUTGET / HTTP/1.1
                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                Host: checkip.dyndns.org
                Connection: Keep-Alive
                Apr 5, 2024 11:52:04.634476900 CEST730INHTTP/1.1 502 Bad Gateway
                Date: Fri, 05 Apr 2024 09:52:04 GMT
                Content-Type: text/html
                Content-Length: 547
                Connection: keep-alive
                X-Request-ID: 50d5d71fdb7c682628bf696a9055bf20
                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:11:51:54
                Start date:05/04/2024
                Path:C:\Users\user\Desktop\Purchase Order.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\Purchase Order.exe"
                Imagebase:0x550000
                File size:536'576 bytes
                MD5 hash:25A46527B42B425083FE4778768F2073
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.2036940365.0000000003C5E000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                Reputation:low
                Has exited:true

                Target ID:3
                Start time:11:52:00
                Start date:05/04/2024
                Path:C:\Users\user\Desktop\Purchase Order.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\Purchase Order.exe"
                Imagebase:0xaa0000
                File size:536'576 bytes
                MD5 hash:25A46527B42B425083FE4778768F2073
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000003.00000002.2204842642.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.2206030183.0000000002EF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low
                Has exited:true

                Target ID:6
                Start time:11:52:03
                Start date:05/04/2024
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5744 -s 1516
                Imagebase:0xb40000
                File size:483'680 bytes
                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:8.9%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:212
                  Total number of Limit Nodes:13
                  execution_graph 23141 6f17e20 23142 6f17fab 23141->23142 23144 6f17e46 23141->23144 23144->23142 23145 6f13a50 23144->23145 23146 6f180a0 PostMessageW 23145->23146 23147 6f1810c 23146->23147 23147->23144 22928 ea4668 22929 ea467a 22928->22929 22930 ea4686 22929->22930 22932 ea4778 22929->22932 22933 ea479d 22932->22933 22937 ea4888 22933->22937 22941 ea4878 22933->22941 22939 ea48af 22937->22939 22938 ea498c 22939->22938 22945 ea44e4 22939->22945 22942 ea48af 22941->22942 22943 ea498c 22942->22943 22944 ea44e4 CreateActCtxA 22942->22944 22943->22943 22944->22943 22946 ea5918 CreateActCtxA 22945->22946 22948 ea59db 22946->22948 22948->22948 23180 ead548 23181 ead54c DuplicateHandle 23180->23181 23182 ead5de 23181->23182 23183 6f16216 23185 6f1616e 23183->23185 23184 6f1629e 23185->23183 23185->23184 23186 6f16c10 12 API calls 23185->23186 23187 6f16c00 12 API calls 23185->23187 23188 6f16cbe 12 API calls 23185->23188 23186->23184 23187->23184 23188->23184 22949 6f19578 FindCloseChangeNotification 22950 6f195df 22949->22950 23148 eaaf70 23149 eaaf7f 23148->23149 23152 eab068 23148->23152 23160 eab059 23148->23160 23153 eab079 23152->23153 23154 eab09c 23152->23154 23153->23154 23168 eab2f0 23153->23168 23172 eab300 23153->23172 23154->23149 23155 eab094 23155->23154 23156 eab2a0 GetModuleHandleW 23155->23156 23157 eab2cd 23156->23157 23157->23149 23161 eab065 23160->23161 23162 eab09c 23161->23162 23166 eab2f0 LoadLibraryExW 23161->23166 23167 eab300 LoadLibraryExW 23161->23167 23162->23149 23163 eab094 23163->23162 23164 eab2a0 GetModuleHandleW 23163->23164 23165 eab2cd 23164->23165 23165->23149 23166->23163 23167->23163 23169 eab314 23168->23169 23171 eab339 23169->23171 23176 eaad1c 23169->23176 23171->23155 23173 eab314 23172->23173 23174 eaad1c LoadLibraryExW 23173->23174 23175 eab339 23173->23175 23174->23175 23175->23155 23177 eab4e0 LoadLibraryExW 23176->23177 23179 eab559 23177->23179 23179->23171 23189 ead300 23190 ead304 GetCurrentProcess 23189->23190 23192 ead398 GetCurrentThread 23190->23192 23193 ead391 23190->23193 23194 ead3ce 23192->23194 23195 ead3d5 GetCurrentProcess 23192->23195 23193->23192 23194->23195 23198 ead40b 23195->23198 23196 ead433 GetCurrentThreadId 23197 ead464 23196->23197 23198->23196 22951 6f1633c 22952 6f1629e 22951->22952 22953 6f1628e 22951->22953 22953->22952 22957 6f16c10 22953->22957 22975 6f16cbe 22953->22975 22994 6f16c00 22953->22994 22958 6f16c2a 22957->22958 22959 6f16c32 22958->22959 23012 6f17690 22958->23012 23018 6f17a4a 22958->23018 23022 6f173a9 22958->23022 23026 6f17529 22958->23026 23031 6f174e4 22958->23031 23035 6f17081 22958->23035 23040 6f173ff 22958->23040 23044 6f179fc 22958->23044 23048 6f1721d 22958->23048 23052 6f1757d 22958->23052 23057 6f1737b 22958->23057 23061 6f17735 22958->23061 23068 6f173f5 22958->23068 23073 6f170f2 22958->23073 23078 6f17930 22958->23078 22959->22952 22976 6f16c4c 22975->22976 22978 6f16cc1 22975->22978 22979 6f17690 2 API calls 22976->22979 22980 6f17930 2 API calls 22976->22980 22981 6f170f2 2 API calls 22976->22981 22982 6f173f5 2 API calls 22976->22982 22983 6f17735 2 API calls 22976->22983 22984 6f1737b 2 API calls 22976->22984 22985 6f1757d 2 API calls 22976->22985 22986 6f1721d 2 API calls 22976->22986 22987 6f179fc 2 API calls 22976->22987 22988 6f173ff 2 API calls 22976->22988 22989 6f17081 2 API calls 22976->22989 22990 6f174e4 2 API calls 22976->22990 22991 6f17529 2 API calls 22976->22991 22992 6f173a9 2 API calls 22976->22992 22993 6f17a4a 2 API calls 22976->22993 22977 6f16c32 22977->22952 22978->22952 22979->22977 22980->22977 22981->22977 22982->22977 22983->22977 22984->22977 22985->22977 22986->22977 22987->22977 22988->22977 22989->22977 22990->22977 22991->22977 22992->22977 22993->22977 22996 6f16c2a 22994->22996 22995 6f16c32 22995->22952 22996->22995 22997 6f17690 2 API calls 22996->22997 22998 6f17930 2 API calls 22996->22998 22999 6f170f2 2 API calls 22996->22999 23000 6f173f5 2 API calls 22996->23000 23001 6f17735 2 API calls 22996->23001 23002 6f1737b 2 API calls 22996->23002 23003 6f1757d 2 API calls 22996->23003 23004 6f1721d 2 API calls 22996->23004 23005 6f179fc 2 API calls 22996->23005 23006 6f173ff 2 API calls 22996->23006 23007 6f17081 2 API calls 22996->23007 23008 6f174e4 2 API calls 22996->23008 23009 6f17529 2 API calls 22996->23009 23010 6f173a9 2 API calls 22996->23010 23011 6f17a4a 2 API calls 22996->23011 22997->22995 22998->22995 22999->22995 23000->22995 23001->22995 23002->22995 23003->22995 23004->22995 23005->22995 23006->22995 23007->22995 23008->22995 23009->22995 23010->22995 23011->22995 23013 6f17540 23012->23013 23014 6f177e3 23013->23014 23083 6f15881 23013->23083 23087 6f15888 23013->23087 23014->22959 23015 6f17555 23015->22959 23091 6f15930 23018->23091 23095 6f15938 23018->23095 23019 6f17a64 23099 6f15ad0 23022->23099 23103 6f15ac8 23022->23103 23023 6f173cd 23027 6f1752f 23026->23027 23029 6f15881 ResumeThread 23027->23029 23030 6f15888 ResumeThread 23027->23030 23028 6f17555 23028->22959 23029->23028 23030->23028 23032 6f174ea 23031->23032 23032->22959 23107 6f15bc0 23032->23107 23111 6f15bb9 23032->23111 23036 6f1708f 23035->23036 23115 6f15d58 23036->23115 23119 6f15d4c 23036->23119 23123 6f17cf8 23040->23123 23128 6f17d08 23040->23128 23041 6f1741b 23041->22959 23046 6f15ad0 WriteProcessMemory 23044->23046 23047 6f15ac8 WriteProcessMemory 23044->23047 23045 6f17a2a 23046->23045 23047->23045 23049 6f17223 23048->23049 23049->22959 23050 6f15bc0 ReadProcessMemory 23049->23050 23051 6f15bb9 ReadProcessMemory 23049->23051 23050->23049 23051->23049 23053 6f17594 23052->23053 23055 6f15ad0 WriteProcessMemory 23053->23055 23056 6f15ac8 WriteProcessMemory 23053->23056 23054 6f17ae1 23055->23054 23056->23054 23058 6f17388 23057->23058 23058->22959 23059 6f15bc0 ReadProcessMemory 23058->23059 23060 6f15bb9 ReadProcessMemory 23058->23060 23059->23058 23060->23058 23062 6f1774a 23061->23062 23064 6f15bc0 ReadProcessMemory 23062->23064 23065 6f15bb9 ReadProcessMemory 23062->23065 23063 6f17673 23063->22959 23066 6f15bc0 ReadProcessMemory 23063->23066 23067 6f15bb9 ReadProcessMemory 23063->23067 23064->23063 23065->23063 23066->23063 23067->23063 23069 6f173f9 23068->23069 23071 6f15930 Wow64SetThreadContext 23069->23071 23072 6f15938 Wow64SetThreadContext 23069->23072 23070 6f17804 23071->23070 23072->23070 23074 6f17085 23073->23074 23076 6f15d58 CreateProcessA 23074->23076 23077 6f15d4c CreateProcessA 23074->23077 23075 6f171b2 23076->23075 23077->23075 23079 6f17673 23078->23079 23079->22959 23080 6f1793a 23079->23080 23081 6f15bc0 ReadProcessMemory 23079->23081 23082 6f15bb9 ReadProcessMemory 23079->23082 23081->23079 23082->23079 23084 6f158c8 ResumeThread 23083->23084 23086 6f158f9 23084->23086 23086->23015 23088 6f158c8 ResumeThread 23087->23088 23090 6f158f9 23088->23090 23090->23015 23092 6f15938 Wow64SetThreadContext 23091->23092 23094 6f159c5 23092->23094 23094->23019 23096 6f1597d Wow64SetThreadContext 23095->23096 23098 6f159c5 23096->23098 23098->23019 23100 6f15b18 WriteProcessMemory 23099->23100 23102 6f15b6f 23100->23102 23102->23023 23104 6f15ad0 WriteProcessMemory 23103->23104 23106 6f15b6f 23104->23106 23106->23023 23108 6f15c0b ReadProcessMemory 23107->23108 23110 6f15c4f 23108->23110 23110->23032 23112 6f15bc0 ReadProcessMemory 23111->23112 23114 6f15c4f 23112->23114 23114->23032 23116 6f15de1 CreateProcessA 23115->23116 23118 6f15fa3 23116->23118 23120 6f15d58 CreateProcessA 23119->23120 23122 6f15fa3 23120->23122 23124 6f17d08 23123->23124 23133 6f15a10 23124->23133 23137 6f15a08 23124->23137 23125 6f17d3c 23125->23041 23129 6f17d1d 23128->23129 23131 6f15a10 VirtualAllocEx 23129->23131 23132 6f15a08 VirtualAllocEx 23129->23132 23130 6f17d3c 23130->23041 23131->23130 23132->23130 23134 6f15a50 VirtualAllocEx 23133->23134 23136 6f15a8d 23134->23136 23136->23125 23138 6f15a10 VirtualAllocEx 23137->23138 23140 6f15a8d 23138->23140 23140->23125
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 83f20d5ada536bc318ba1d32121a6da5f9af663fa2a8956457946ab24816b6a2
                  • Instruction ID: ef4d90d958edf58c945ce51d574a42a7bb28ba2bf6e9ff33822f0aa1e067f89d
                  • Opcode Fuzzy Hash: 83f20d5ada536bc318ba1d32121a6da5f9af663fa2a8956457946ab24816b6a2
                  • Instruction Fuzzy Hash: 66315071C053588FDB19CF66C8553EEBFF6AF89300F04C56AD449AA265DB78098ACF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 296 ead2f0-ead2fe 297 ead300-ead303 296->297 298 ead304-ead38f GetCurrentProcess 296->298 297->298 302 ead398-ead3cc GetCurrentThread 298->302 303 ead391-ead397 298->303 304 ead3ce-ead3d4 302->304 305 ead3d5-ead409 GetCurrentProcess 302->305 303->302 304->305 307 ead40b-ead411 305->307 308 ead412-ead42d call ead4d1 305->308 307->308 311 ead433-ead462 GetCurrentThreadId 308->311 312 ead46b-ead4cd 311->312 313 ead464-ead46a 311->313 313->312
                  APIs
                  • GetCurrentProcess.KERNEL32 ref: 00EAD37E
                  • GetCurrentThread.KERNEL32 ref: 00EAD3BB
                  • GetCurrentProcess.KERNEL32 ref: 00EAD3F8
                  • GetCurrentThreadId.KERNEL32 ref: 00EAD451
                  Memory Dump Source
                  • Source File: 00000000.00000002.2036305698.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_ea0000_Purchase Order.jbxd
                  Similarity
                  • API ID: Current$ProcessThread
                  • String ID:
                  • API String ID: 2063062207-0
                  • Opcode ID: fcb0aab7bb4b9aec60513c986f544839507bb4e2f5f4946640387ecea4bba50f
                  • Instruction ID: 13df30f918a6cee0183dece130a15942f90c1e97726b073ad36d10a03d659590
                  • Opcode Fuzzy Hash: fcb0aab7bb4b9aec60513c986f544839507bb4e2f5f4946640387ecea4bba50f
                  • Instruction Fuzzy Hash: C65187B0900349CFDB14CFAAC948B9EBBF1EF8D314F208459E419BB250DB74A845CB62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 320 ead300-ead38f GetCurrentProcess 325 ead398-ead3cc GetCurrentThread 320->325 326 ead391-ead397 320->326 327 ead3ce-ead3d4 325->327 328 ead3d5-ead409 GetCurrentProcess 325->328 326->325 327->328 330 ead40b-ead411 328->330 331 ead412-ead42d call ead4d1 328->331 330->331 334 ead433-ead462 GetCurrentThreadId 331->334 335 ead46b-ead4cd 334->335 336 ead464-ead46a 334->336 336->335
                  APIs
                  • GetCurrentProcess.KERNEL32 ref: 00EAD37E
                  • GetCurrentThread.KERNEL32 ref: 00EAD3BB
                  • GetCurrentProcess.KERNEL32 ref: 00EAD3F8
                  • GetCurrentThreadId.KERNEL32 ref: 00EAD451
                  Memory Dump Source
                  • Source File: 00000000.00000002.2036305698.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_ea0000_Purchase Order.jbxd
                  Similarity
                  • API ID: Current$ProcessThread
                  • String ID:
                  • API String ID: 2063062207-0
                  • Opcode ID: fc782b5219197bddefa40bbe9a74cdc9032bcbeb95a009c7bcaf99b762bcb25c
                  • Instruction ID: bdff271b7d93a67d95a5d6d95c3ffd9f9dd0b2dae9617d54613b96409d5b21d9
                  • Opcode Fuzzy Hash: fc782b5219197bddefa40bbe9a74cdc9032bcbeb95a009c7bcaf99b762bcb25c
                  • Instruction Fuzzy Hash: 895155B1900349CFDB14CFAAD948B9EBBF1EF8D314F208459E419BB250DB74A984CB65
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 418 6f15d4c-6f15ded 421 6f15e26-6f15e46 418->421 422 6f15def-6f15df9 418->422 429 6f15e48-6f15e52 421->429 430 6f15e7f-6f15eae 421->430 422->421 423 6f15dfb-6f15dfd 422->423 424 6f15e20-6f15e23 423->424 425 6f15dff-6f15e09 423->425 424->421 427 6f15e0b 425->427 428 6f15e0d-6f15e1c 425->428 427->428 428->428 431 6f15e1e 428->431 429->430 432 6f15e54-6f15e56 429->432 436 6f15eb0-6f15eba 430->436 437 6f15ee7-6f15fa1 CreateProcessA 430->437 431->424 434 6f15e79-6f15e7c 432->434 435 6f15e58-6f15e62 432->435 434->430 438 6f15e64 435->438 439 6f15e66-6f15e75 435->439 436->437 440 6f15ebc-6f15ebe 436->440 450 6f15fa3-6f15fa9 437->450 451 6f15faa-6f16030 437->451 438->439 439->439 441 6f15e77 439->441 442 6f15ee1-6f15ee4 440->442 443 6f15ec0-6f15eca 440->443 441->434 442->437 445 6f15ecc 443->445 446 6f15ece-6f15edd 443->446 445->446 446->446 447 6f15edf 446->447 447->442 450->451 461 6f16040-6f16044 451->461 462 6f16032-6f16036 451->462 464 6f16054-6f16058 461->464 465 6f16046-6f1604a 461->465 462->461 463 6f16038 462->463 463->461 467 6f16068-6f1606c 464->467 468 6f1605a-6f1605e 464->468 465->464 466 6f1604c 465->466 466->464 469 6f1607e-6f16085 467->469 470 6f1606e-6f16074 467->470 468->467 471 6f16060 468->471 472 6f16087-6f16096 469->472 473 6f1609c 469->473 470->469 471->467 472->473 475 6f1609d 473->475 475->475
                  APIs
                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F15F8E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: fe0f3dc6f635f0c3071bc1764ea986b3d6bb537cfaff87554e0dcbd2bb7fb6a7
                  • Instruction ID: f00913495a059c276e7726088b381e7155152f79ed421d931e4ecd2040e1fde5
                  • Opcode Fuzzy Hash: fe0f3dc6f635f0c3071bc1764ea986b3d6bb537cfaff87554e0dcbd2bb7fb6a7
                  • Instruction Fuzzy Hash: 8CA16DB1D00619CFDB54CF68C881BEDBBB2FF48310F148569E819AB240DB759A85CF91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 476 6f15d58-6f15ded 478 6f15e26-6f15e46 476->478 479 6f15def-6f15df9 476->479 486 6f15e48-6f15e52 478->486 487 6f15e7f-6f15eae 478->487 479->478 480 6f15dfb-6f15dfd 479->480 481 6f15e20-6f15e23 480->481 482 6f15dff-6f15e09 480->482 481->478 484 6f15e0b 482->484 485 6f15e0d-6f15e1c 482->485 484->485 485->485 488 6f15e1e 485->488 486->487 489 6f15e54-6f15e56 486->489 493 6f15eb0-6f15eba 487->493 494 6f15ee7-6f15fa1 CreateProcessA 487->494 488->481 491 6f15e79-6f15e7c 489->491 492 6f15e58-6f15e62 489->492 491->487 495 6f15e64 492->495 496 6f15e66-6f15e75 492->496 493->494 497 6f15ebc-6f15ebe 493->497 507 6f15fa3-6f15fa9 494->507 508 6f15faa-6f16030 494->508 495->496 496->496 498 6f15e77 496->498 499 6f15ee1-6f15ee4 497->499 500 6f15ec0-6f15eca 497->500 498->491 499->494 502 6f15ecc 500->502 503 6f15ece-6f15edd 500->503 502->503 503->503 504 6f15edf 503->504 504->499 507->508 518 6f16040-6f16044 508->518 519 6f16032-6f16036 508->519 521 6f16054-6f16058 518->521 522 6f16046-6f1604a 518->522 519->518 520 6f16038 519->520 520->518 524 6f16068-6f1606c 521->524 525 6f1605a-6f1605e 521->525 522->521 523 6f1604c 522->523 523->521 526 6f1607e-6f16085 524->526 527 6f1606e-6f16074 524->527 525->524 528 6f16060 525->528 529 6f16087-6f16096 526->529 530 6f1609c 526->530 527->526 528->524 529->530 532 6f1609d 530->532 532->532
                  APIs
                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F15F8E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: 5fa5ea464dd35bbbf8b978f74c26775ae6988ab6444abc7a732b67ff2564f5ea
                  • Instruction ID: 7711fdca960b3ac7970592cb5d92b215c2403112ec89dcf6ffa5d6576f524296
                  • Opcode Fuzzy Hash: 5fa5ea464dd35bbbf8b978f74c26775ae6988ab6444abc7a732b67ff2564f5ea
                  • Instruction Fuzzy Hash: B4917CB1D00619CFDB54CF68C881BEDBBB2FF48310F148569E819AB240DB759A85CF91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 533 eab068-eab077 534 eab079-eab086 call ea9ad4 533->534 535 eab0a3-eab0a7 533->535 541 eab088 534->541 542 eab09c 534->542 537 eab0bb-eab0fc 535->537 538 eab0a9-eab0b3 535->538 544 eab109-eab117 537->544 545 eab0fe-eab106 537->545 538->537 588 eab08e call eab2f0 541->588 589 eab08e call eab300 541->589 542->535 546 eab13b-eab13d 544->546 547 eab119-eab11e 544->547 545->544 552 eab140-eab147 546->552 549 eab129 547->549 550 eab120-eab127 call eaacd0 547->550 548 eab094-eab096 548->542 551 eab1d8-eab298 548->551 554 eab12b-eab139 549->554 550->554 583 eab29a-eab29d 551->583 584 eab2a0-eab2cb GetModuleHandleW 551->584 555 eab149-eab151 552->555 556 eab154-eab15b 552->556 554->552 555->556 559 eab168-eab171 call eaace0 556->559 560 eab15d-eab165 556->560 564 eab17e-eab183 559->564 565 eab173-eab17b 559->565 560->559 566 eab1a1-eab1ae 564->566 567 eab185-eab18c 564->567 565->564 574 eab1b0-eab1ce 566->574 575 eab1d1-eab1d7 566->575 567->566 569 eab18e-eab19e call eaacf0 call eaad00 567->569 569->566 574->575 583->584 585 eab2cd-eab2d3 584->585 586 eab2d4-eab2e8 584->586 585->586 588->548 589->548
                  APIs
                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00EAB2BE
                  Memory Dump Source
                  • Source File: 00000000.00000002.2036305698.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_ea0000_Purchase Order.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: 564cf418ef316844a00a1fa3274937e33f9f5274b121eae0c92e0a5394ae0f42
                  • Instruction ID: 793a8b353c232ba3500a895e6ac15b6b73b6f783a627d794cc7c125394f37959
                  • Opcode Fuzzy Hash: 564cf418ef316844a00a1fa3274937e33f9f5274b121eae0c92e0a5394ae0f42
                  • Instruction Fuzzy Hash: 967123B0A00B058FD724DF2AD45575ABBF1FF89304F008A2AE48AABA51D775F945CB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 699 ea590d-ea59d9 CreateActCtxA 701 ea59db-ea59e1 699->701 702 ea59e2-ea5a3c 699->702 701->702 709 ea5a4b-ea5a4f 702->709 710 ea5a3e-ea5a41 702->710 711 ea5a60 709->711 712 ea5a51-ea5a5d 709->712 710->709 714 ea5a61 711->714 712->711 714->714
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 00EA59C9
                  Memory Dump Source
                  • Source File: 00000000.00000002.2036305698.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_ea0000_Purchase Order.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: 09bb402a881d480281f7077c6e650c0aab2637a91d42d653319987795f44c86e
                  • Instruction ID: e6f4c335d6111883a9b652573738e7695dc524a8c22c55660971f28aebae8d52
                  • Opcode Fuzzy Hash: 09bb402a881d480281f7077c6e650c0aab2637a91d42d653319987795f44c86e
                  • Instruction Fuzzy Hash: 4141EFB1C00719CEDB24CFA9C885ADEBBF5BF49304F20815AD809AB251DB71694ACF50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 715 ea44e4-ea59d9 CreateActCtxA 718 ea59db-ea59e1 715->718 719 ea59e2-ea5a3c 715->719 718->719 726 ea5a4b-ea5a4f 719->726 727 ea5a3e-ea5a41 719->727 728 ea5a60 726->728 729 ea5a51-ea5a5d 726->729 727->726 731 ea5a61 728->731 729->728 731->731
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 00EA59C9
                  Memory Dump Source
                  • Source File: 00000000.00000002.2036305698.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_ea0000_Purchase Order.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: 39e8194b52712802c277f4ca1665132659b453497a906346815b820149a9997e
                  • Instruction ID: bacd465bebbed9402158b2f071bf16d9ab99e24e51cf601154d50abf9e27a94d
                  • Opcode Fuzzy Hash: 39e8194b52712802c277f4ca1665132659b453497a906346815b820149a9997e
                  • Instruction Fuzzy Hash: AF41DFB1D00719CBDB24CFA9C884BDEBBF5BF89304F20816AD409AB251DB756949CF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 732 6f15ac8-6f15b1e 735 6f15b20-6f15b2c 732->735 736 6f15b2e-6f15b6d WriteProcessMemory 732->736 735->736 738 6f15b76-6f15ba6 736->738 739 6f15b6f-6f15b75 736->739 739->738
                  APIs
                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06F15B60
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: MemoryProcessWrite
                  • String ID:
                  • API String ID: 3559483778-0
                  • Opcode ID: c50b13252bd7944302893ce7ce1ab55a605429aa0504d470547830ec58f42b5f
                  • Instruction ID: 37b5ce6c11f9f16ee718b52bc6f6991bb45565afde9170e7d512faa09c289420
                  • Opcode Fuzzy Hash: c50b13252bd7944302893ce7ce1ab55a605429aa0504d470547830ec58f42b5f
                  • Instruction Fuzzy Hash: A12137B5D003199FCB10CFAAC885BEEBBF5FF88310F108429E918A7240D7789940CBA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 743 6f15ad0-6f15b1e 745 6f15b20-6f15b2c 743->745 746 6f15b2e-6f15b6d WriteProcessMemory 743->746 745->746 748 6f15b76-6f15ba6 746->748 749 6f15b6f-6f15b75 746->749 749->748
                  APIs
                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06F15B60
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: MemoryProcessWrite
                  • String ID:
                  • API String ID: 3559483778-0
                  • Opcode ID: 944f59dbf91d03a03a0145aedbc42b9a1a69dd4143d2ed8772f4702c7e5f4302
                  • Instruction ID: 90cbed8ffda133e0b48a4fe97fe32e27be3088a353757e4823802db53e7ee46b
                  • Opcode Fuzzy Hash: 944f59dbf91d03a03a0145aedbc42b9a1a69dd4143d2ed8772f4702c7e5f4302
                  • Instruction Fuzzy Hash: 7B2127B5D003499FDB10CFA9C885BEEBBF5FF88310F14842AE919A7240C7789944DBA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 753 ead540-ead546 754 ead548-ead54b 753->754 755 ead54c-ead5dc DuplicateHandle 753->755 754->755 756 ead5de-ead5e4 755->756 757 ead5e5-ead602 755->757 756->757
                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EAD5CF
                  Memory Dump Source
                  • Source File: 00000000.00000002.2036305698.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_ea0000_Purchase Order.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: c8dcd8bdeca997f9e1d8e2251f61841df6260008909b5dee689da1d715b047d7
                  • Instruction ID: 033191e0538fd0ac2a81db7b8420245b2eb9bb75878cd45a6533a90afc6515d2
                  • Opcode Fuzzy Hash: c8dcd8bdeca997f9e1d8e2251f61841df6260008909b5dee689da1d715b047d7
                  • Instruction Fuzzy Hash: DF21F2B5C00208DFDB10CFAAD984AEEBFF8EB48314F14841AE919A7210C374A945CFA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06F159B6
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: 754aaf48d23af22ee7450b28c528546f1cc4aca280308e767781273eccc7471f
                  • Instruction ID: b644fbadbd321f583e49174ab7547affa832f965a7aecc29fdae77eefcc30cf5
                  • Opcode Fuzzy Hash: 754aaf48d23af22ee7450b28c528546f1cc4aca280308e767781273eccc7471f
                  • Instruction Fuzzy Hash: 882157B1D003098FDB10DFAAC8857EEBFF5EF88324F54842AD459A7241DB789945CBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06F15C40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: MemoryProcessRead
                  • String ID:
                  • API String ID: 1726664587-0
                  • Opcode ID: 2ed8a06d59c90b7a0539feca27d82f7c077fd939ed1e243c5ae7645fc98d4ab4
                  • Instruction ID: 4c5ce0685ae9b30596417f1fefc6b90d5e196e25c5daf961b5f4960788ac960c
                  • Opcode Fuzzy Hash: 2ed8a06d59c90b7a0539feca27d82f7c077fd939ed1e243c5ae7645fc98d4ab4
                  • Instruction Fuzzy Hash: 7D212AB1D003499FDB10CFA9C885AEEFBF5FF88320F548829E959A7250DB349541DB64
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06F15C40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: MemoryProcessRead
                  • String ID:
                  • API String ID: 1726664587-0
                  • Opcode ID: d358c553138849dda4040326c728617deda128f864723363cf7cdc3876aa2d5c
                  • Instruction ID: f3f42f55b4279ccfe8fc8d268ae6eaf8cee5572d301f0dfd547de773787cd3b7
                  • Opcode Fuzzy Hash: d358c553138849dda4040326c728617deda128f864723363cf7cdc3876aa2d5c
                  • Instruction Fuzzy Hash: FF2139B1D003499FCB10CFAAC885AEEFBF5FF88320F10842AE519A7240C7349940DBA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06F159B6
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: 8cf167f8f51db96a5982b1df0fcb229665ae35f1bf0fcf7a0ab22f7f32064f16
                  • Instruction ID: 904f1330716b8a1cc314476ef4bde741959eabb9093c309fb7b929e82dd64f28
                  • Opcode Fuzzy Hash: 8cf167f8f51db96a5982b1df0fcb229665ae35f1bf0fcf7a0ab22f7f32064f16
                  • Instruction Fuzzy Hash: C92149B1D003098FDB10DFAAC8857EEBBF4EF88320F54842AD459A7241CB789944CFA5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00EAD5CF
                  Memory Dump Source
                  • Source File: 00000000.00000002.2036305698.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_ea0000_Purchase Order.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: 77969b39b94471abd9e2f91c7bd40922a3513eae4c4d609e23d48f7e1f264455
                  • Instruction ID: ece337ce8967c46be43bbc87a92f6627119d8b632c0dde3ca7bf72bb48642bd9
                  • Opcode Fuzzy Hash: 77969b39b94471abd9e2f91c7bd40922a3513eae4c4d609e23d48f7e1f264455
                  • Instruction Fuzzy Hash: 5F21E2B5D00248DFDB10CFAAD984ADEBBF8EB48320F14841AE918A7310D374A940CFA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06F15A7E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: f390b95a0a2b38943b7493346b3d33ac571f33a1dd3e83e0a77934678c16e191
                  • Instruction ID: 22bbc66f286db8946256c1017cc10253620f7ba8d31f9d8b357493b1214ee4c5
                  • Opcode Fuzzy Hash: f390b95a0a2b38943b7493346b3d33ac571f33a1dd3e83e0a77934678c16e191
                  • Instruction Fuzzy Hash: 071159729002499FCB10CFAAC885ADEBFF5EF88324F148819E519A7250CB359541CBA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00EAB339,00000800,00000000,00000000), ref: 00EAB54A
                  Memory Dump Source
                  • Source File: 00000000.00000002.2036305698.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_ea0000_Purchase Order.jbxd
                  Similarity
                  • API ID: LibraryLoad
                  • String ID:
                  • API String ID: 1029625771-0
                  • Opcode ID: b65fab716b85da5bb36a252a918326df14f1ed9cd51b25d89050d1b7b07fe270
                  • Instruction ID: 44635e0605baee562d66bd7ed628b90f1fdb1e62e0290faa05f5b8cc894fcb7f
                  • Opcode Fuzzy Hash: b65fab716b85da5bb36a252a918326df14f1ed9cd51b25d89050d1b7b07fe270
                  • Instruction Fuzzy Hash: A31114B6D003098FCB10CF9AD484ADEFBF5EB89310F14842AE919BB201C375A945CFA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00EAB339,00000800,00000000,00000000), ref: 00EAB54A
                  Memory Dump Source
                  • Source File: 00000000.00000002.2036305698.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_ea0000_Purchase Order.jbxd
                  Similarity
                  • API ID: LibraryLoad
                  • String ID:
                  • API String ID: 1029625771-0
                  • Opcode ID: 26045bee28ff5d2001746726a8ad1b17e85a809dd1a88587bdb3935c550fde96
                  • Instruction ID: 07587478fb43e2ab898c4253cb0261d59b1e9210ce8fe3a0b36f8aa00140679c
                  • Opcode Fuzzy Hash: 26045bee28ff5d2001746726a8ad1b17e85a809dd1a88587bdb3935c550fde96
                  • Instruction Fuzzy Hash: A61114B6D002098FCB20CF9AC484ADEFBF9EB89314F14841AE519BB201C375A945CFA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06F15A7E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: a00d70684224f1bd1a09f5b7004d0e14d322e7f69f1a54fd31e2a0d10d12dec5
                  • Instruction ID: 9b3bd9758966ca400492f9ee195f3513c58574c79b3a6ec82cdad7b83a0fd82e
                  • Opcode Fuzzy Hash: a00d70684224f1bd1a09f5b7004d0e14d322e7f69f1a54fd31e2a0d10d12dec5
                  • Instruction Fuzzy Hash: 62113A719002499FCB10DFAAC885ADEBFF5EF88320F148419E519A7250CB759540DFA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • FindCloseChangeNotification.KERNELBASE(?), ref: 06F195D0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: ChangeCloseFindNotification
                  • String ID:
                  • API String ID: 2591292051-0
                  • Opcode ID: dd53f6bf90fe82a4af2f16a4fc8ba2d1b8bc547556fdc05115a9d4b8beeb1d83
                  • Instruction ID: ca4b05a62db41c28a96ce3072745c79a51788cafdd40ec05c6fe27fc6e0c1553
                  • Opcode Fuzzy Hash: dd53f6bf90fe82a4af2f16a4fc8ba2d1b8bc547556fdc05115a9d4b8beeb1d83
                  • Instruction Fuzzy Hash: 931128B6C002498FCB20CF9AC985BDEBBF4EB48360F14841AD958A7240D778A944CFA5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: ResumeThread
                  • String ID:
                  • API String ID: 947044025-0
                  • Opcode ID: 1d0a966424920794db89a001a5adce927cef6b6525dd80a181940bb479113189
                  • Instruction ID: b1aebbff610e1f75f0c8b99536b821efae38756c5893f7f6295e2de8ab9307d3
                  • Opcode Fuzzy Hash: 1d0a966424920794db89a001a5adce927cef6b6525dd80a181940bb479113189
                  • Instruction Fuzzy Hash: 30115BB1D002498FDB24DFA9C8857EEBBF4EF88324F148819D419A7240CB355544CB94
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: ResumeThread
                  • String ID:
                  • API String ID: 947044025-0
                  • Opcode ID: 33c14f6be0eae11941a5d0f23918cd6fc949a9b4baa275804d506536be445c3f
                  • Instruction ID: 406f02d8e2603d6602f8dda5faa8635025a684aa89874c08be5e2eced83f448f
                  • Opcode Fuzzy Hash: 33c14f6be0eae11941a5d0f23918cd6fc949a9b4baa275804d506536be445c3f
                  • Instruction Fuzzy Hash: 12110DB1D003498FDB14DFAAC88579EFBF9EF88324F148419D519A7240CB756544CB95
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00EAB2BE
                  Memory Dump Source
                  • Source File: 00000000.00000002.2036305698.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_ea0000_Purchase Order.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: a861bc74e35c8dacb651d1582816ba5f52518890882ce2e29b69176596619444
                  • Instruction ID: 34712164eb53fd9581dacc3a038b6500a5a7ed75bb306783b86e1e77dc017e6c
                  • Opcode Fuzzy Hash: a861bc74e35c8dacb651d1582816ba5f52518890882ce2e29b69176596619444
                  • Instruction Fuzzy Hash: 0D11CDB68006498FCB10CF9AC884ADEFBF4EB89324F14841AD429A7611C379A545CFA5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • FindCloseChangeNotification.KERNELBASE(?), ref: 06F195D0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: ChangeCloseFindNotification
                  • String ID:
                  • API String ID: 2591292051-0
                  • Opcode ID: 9ad3a268d3eb4c93a740220643857f5952425bd5cf720992012a79422be12a18
                  • Instruction ID: 0f19692573d246bfc8b11d84f94b4534a20374aec8bd153cf12f13df6ec15ff8
                  • Opcode Fuzzy Hash: 9ad3a268d3eb4c93a740220643857f5952425bd5cf720992012a79422be12a18
                  • Instruction Fuzzy Hash: 141103B6800349CFCB20DF9AC589BDEBBF4EB48360F14841AD959A7240D779A944CFA5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 06F180FD
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: 431954e7d2fd85663c762d5316005662205999fdf5c7bc42df492f082a59cc6c
                  • Instruction ID: 94f4d5d350a9ce8c17578be7d5671fa38580a3ec0fc5dd39d5f7e024386aedae
                  • Opcode Fuzzy Hash: 431954e7d2fd85663c762d5316005662205999fdf5c7bc42df492f082a59cc6c
                  • Instruction Fuzzy Hash: FB1106B6804349DFDB60DF99C989BDEBBF8EB48350F108419E514A7201C375A944CFA5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 06F180FD
                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: f18e5fccf7229749571739544830d092abf9037e9aa8426837d37258e973efb1
                  • Instruction ID: 94d2d0dcc34aec51bf3067c885c67db93df09e8be86429f4b8ba51a6c2c4e69e
                  • Opcode Fuzzy Hash: f18e5fccf7229749571739544830d092abf9037e9aa8426837d37258e973efb1
                  • Instruction Fuzzy Hash: 5511F5B58003499FDB20CF9AC989BDEBFF8EB48320F108459E555A7241C375A544CFA5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2034600490.0000000000AED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AED000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_aed000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6c03deaa43afcc2a2bdfa14ad412710a7d500db9346e03f3d392fd85fcc3e08b
                  • Instruction ID: 489fa43a260a9320370bada8fa41eacd6f251a26f5e2d78d8788531e8706ffd9
                  • Opcode Fuzzy Hash: 6c03deaa43afcc2a2bdfa14ad412710a7d500db9346e03f3d392fd85fcc3e08b
                  • Instruction Fuzzy Hash: 8621F2B2504280EFDB15DF15D9C0B26BF65FB98328F24C96DE9090B256C336D856CAB2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2034600490.0000000000AED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AED000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_aed000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7b059a9ecaafb1fc32a5495f0f60675aed48878b54d1d6dcb73a6acb9ea69a84
                  • Instruction ID: a23b78a75fd54d3d2b0a4a5051358a75e99ea884ea408e0b956106b645ce11b9
                  • Opcode Fuzzy Hash: 7b059a9ecaafb1fc32a5495f0f60675aed48878b54d1d6dcb73a6acb9ea69a84
                  • Instruction Fuzzy Hash: 12212875504284DFDB05DF14D9C0B16BF65FBA8324F24C569E9090F296C336E856C6A2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2034738211.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_afd000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: df2f0e5f1916b82eb5c94305637b4c66edd63e983a44b3b8dea4f205654aaaae
                  • Instruction ID: 93a245a27cb3007670f1262dbb2d5eabdf8f23259c32213fdcd772681f8ac5b3
                  • Opcode Fuzzy Hash: df2f0e5f1916b82eb5c94305637b4c66edd63e983a44b3b8dea4f205654aaaae
                  • Instruction Fuzzy Hash: 5121F575504208DFDB16DF54D984B26BB66FB84314F24C96DEA0A4B246CB3AD807CA61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2034738211.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_afd000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b26119cbf436db2eee893455970b89d52145ff431572ea79851b4ec64676d429
                  • Instruction ID: a1872ceaf5157ee0f9b9fda80eaf4bb42629d717401fd85991346ecaea1095a0
                  • Opcode Fuzzy Hash: b26119cbf436db2eee893455970b89d52145ff431572ea79851b4ec64676d429
                  • Instruction Fuzzy Hash: 66212971504208EFDB06DF94D9C0B36BB76FB84314F24C96DFA094B256C336D806CAA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2034738211.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_afd000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9462182a731bee1676ba432cce8e88ffe8fb0a7c41b78674f1944e4528e702b6
                  • Instruction ID: 4d1b1ffa55f5597acb749da24d12d2f3b7eade77fb142a003326727a87e61298
                  • Opcode Fuzzy Hash: 9462182a731bee1676ba432cce8e88ffe8fb0a7c41b78674f1944e4528e702b6
                  • Instruction Fuzzy Hash: 1D218E755093848FCB03CF24D994715BF72EB46314F28C5EAD9498B6A7C33A980ACB62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2034600490.0000000000AED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AED000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_aed000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                  • Instruction ID: 5b870389b974ce7f1879f03ac12a1021125e03544a019024d4b3800b8eb61895
                  • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                  • Instruction Fuzzy Hash: 0D11E676504280CFCB16CF14D9C4B16BF71FB94324F24C6ADD8490B656C33AD85ACBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2034600490.0000000000AED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AED000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_aed000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                  • Instruction ID: d2f4127275b4dc0befa31433aa2a52c7e80d469e0dbc576c83abd30446f29b84
                  • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                  • Instruction Fuzzy Hash: F911E676504280DFDB16CF14D5C4B16BF71FBA4324F24C6A9D9090B656C33AE85ACBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2034738211.0000000000AFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AFD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_afd000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                  • Instruction ID: 3b15e81e426faa6f0cdf68c5af83cdf9f001478042413541de6d9aa278c42f74
                  • Opcode Fuzzy Hash: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                  • Instruction Fuzzy Hash: 6911DD76504284DFCB02CF50C5C4B25FBB2FB84314F24C6AEE9494B296C33AD80ACBA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 49fbe711b0aa8a9f7eedbc75d02ebf931873d127286ec28389d620df6bd2be8e
                  • Instruction ID: b23e3ffc567d5ccc1c6b00168f9d73fe384b2fcb407f497518a47b33b821dddf
                  • Opcode Fuzzy Hash: 49fbe711b0aa8a9f7eedbc75d02ebf931873d127286ec28389d620df6bd2be8e
                  • Instruction Fuzzy Hash: 7AD1BE70B017008FDBA9DB75C860BAE77E6AF8A740F1484ADE156DF2A1CB35E901CB51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 064e7af59bbf4f40493d8a087585bd4c66dc291d265cdf187d06c12ca7a637ca
                  • Instruction ID: 28a751b3b1b22f7b3478e6764610105181b9e8dd9b657cdcce968ee44ec4d84f
                  • Opcode Fuzzy Hash: 064e7af59bbf4f40493d8a087585bd4c66dc291d265cdf187d06c12ca7a637ca
                  • Instruction Fuzzy Hash: 5EE11974E042598FCB14DFA9C5909AEFBF2FF89304F248169E415AB359D731A942CFA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9d41de12aab179dff60279137554c514a2fce027ac6f9853cca0e717598ff85e
                  • Instruction ID: 0f42138ef1ae8eef0a37f4123b733ddba7bc22d1b5bcad6e584edd173e6ee1b0
                  • Opcode Fuzzy Hash: 9d41de12aab179dff60279137554c514a2fce027ac6f9853cca0e717598ff85e
                  • Instruction Fuzzy Hash: 27E11774E001598FCB54DFA9C5809AEFBF2FF89304F248169E415AB355D731AA82CFA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1ee7faadb36e3313f484b7e4ca1230a000a6c90d58666b89c00299c45b0d0b6c
                  • Instruction ID: c659d231f8741462564c9cae6f84e0a7fcb0a8f529cb5d2f8d3d124779e7bf80
                  • Opcode Fuzzy Hash: 1ee7faadb36e3313f484b7e4ca1230a000a6c90d58666b89c00299c45b0d0b6c
                  • Instruction Fuzzy Hash: 05E116B4E001598FCB54DFA9C5909AEFBF2FF89304F248169E415AB356D731A942CFA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 07af7869c0b0b806feec33798ca44c72429460091c46dcdb1721ebe886721150
                  • Instruction ID: ddb6c340d73ff969db2c89dc8eba974b3faedbf94ca26f443c9f3030e92ff9b3
                  • Opcode Fuzzy Hash: 07af7869c0b0b806feec33798ca44c72429460091c46dcdb1721ebe886721150
                  • Instruction Fuzzy Hash: 68E11975E041598FCB14DFA9C5809AEFBB2FF89300F248169E415AB356DB31A942CFA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 65150218e18bef344b503ea1ddbbb66a8e0bba13a49f6c8ba53ac4d1fddb1c6a
                  • Instruction ID: 59ea43278915824558692654361e50170c94fec79a2f693dba3a7a4835e35a61
                  • Opcode Fuzzy Hash: 65150218e18bef344b503ea1ddbbb66a8e0bba13a49f6c8ba53ac4d1fddb1c6a
                  • Instruction Fuzzy Hash: 84E117B4E002598FCB54DFA9C5909AEFBF2FF89304F248169E415AB359D731A942CF60
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2036305698.0000000000EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_ea0000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cd362aa82584715b832e36d64385dfcf3ebb53f660d41657cb103c21e69ace4d
                  • Instruction ID: 65c3fa0de5f6e6a0f830c79b518145d8171a193c038c7ea622db1b22c39c3440
                  • Opcode Fuzzy Hash: cd362aa82584715b832e36d64385dfcf3ebb53f660d41657cb103c21e69ace4d
                  • Instruction Fuzzy Hash: 3EA13932E002058FCF05DFA5C88459EB7B2BF8A304B15956AE806BF265DB71ED56CB80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4555cdd2ac1acd75951e093b381f2cd520c618a5629fac1f0424cc05d0ee751c
                  • Instruction ID: 763f40b80f172deb395a8f1ee21fc8d804cb2628890035a3810061c4bcf34962
                  • Opcode Fuzzy Hash: 4555cdd2ac1acd75951e093b381f2cd520c618a5629fac1f0424cc05d0ee751c
                  • Instruction Fuzzy Hash: 79511871E042598FDB54DFA9C5805AEFBF2FF89300F248169D418AB356DB31A942CFA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 17e8601cbd8faf835b134ec7088ca17fb8c2bbbd19b1740e5645f260713de61a
                  • Instruction ID: 019dedbe3603bf81d151e2c691b6ac8ad895811defb7f734a02cc7a246a430c2
                  • Opcode Fuzzy Hash: 17e8601cbd8faf835b134ec7088ca17fb8c2bbbd19b1740e5645f260713de61a
                  • Instruction Fuzzy Hash: 0D5128B4E042198FCB14DFA9C9809AEFBF2FF89304F248169D418AB355D7359942CFA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.2039225305.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2838578adaa413882fc24743fc31330d10fb8e1a534c1fae1e07b6d7106ddc17
                  • Instruction ID: a114c731e44d9eb054d7fb6611606c28eabee44e6cf1f83d6447de81e10b63d5
                  • Opcode Fuzzy Hash: 2838578adaa413882fc24743fc31330d10fb8e1a534c1fae1e07b6d7106ddc17
                  • Instruction Fuzzy Hash: CB511974E042598FCB54CFA9C5909AEFBF2FF89304F248169D418AB355D7319942CFA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2205728285.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1620000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID: Xiq$Xiq$Xiq$Xiq
                  • API String ID: 0-4026295062
                  • Opcode ID: f5064a9c8586cb56f5d6915800edad8b1347f9d8c9925fc446b60c537d1e2503
                  • Instruction ID: 7eb442f4037a2a1d362659dfd1d70f36ba7645111ac319c026b73730882e7798
                  • Opcode Fuzzy Hash: f5064a9c8586cb56f5d6915800edad8b1347f9d8c9925fc446b60c537d1e2503
                  • Instruction Fuzzy Hash: 9E127F3B448685AFC711CFB8D8D679577B4FF2B304B289ADDD0608B121DB3AA441CBA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2205728285.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1620000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID: Xiq$$eq
                  • API String ID: 0-3760103188
                  • Opcode ID: e54371b6ceed9a099557b4a0fc9a568a846e8a77bb22c325124d49fa5b3fbc87
                  • Instruction ID: a86b77ac28ae15d155d9ed7a2661ae031a077594a2265b6d9efe22cc375a8a25
                  • Opcode Fuzzy Hash: e54371b6ceed9a099557b4a0fc9a568a846e8a77bb22c325124d49fa5b3fbc87
                  • Instruction Fuzzy Hash: 45919574F002289BDB18DB75995467EBBB3BFC8740B15856DE406EB388DF39D8028B91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2205728285.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1620000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID: Xiq$Xiq
                  • API String ID: 0-733771754
                  • Opcode ID: b7a74d1e90ecc3487abfecdd547e7122b9f967ab3719c7e5c1d12ef2214cea25
                  • Instruction ID: af22f198712755f3782a53a25dab53c00b5d4690f4a82866029b52558f375329
                  • Opcode Fuzzy Hash: b7a74d1e90ecc3487abfecdd547e7122b9f967ab3719c7e5c1d12ef2214cea25
                  • Instruction Fuzzy Hash: 3B312679B00A348BDB1A09698D9437F66A6FBC8310F14413DD90AD7384DB7CC8468BA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2205728285.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1620000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID: LReq
                  • API String ID: 0-2687900687
                  • Opcode ID: 779c9106a9314db6e86b12172e943129497783e16406c0901ac4297a1cb08dc6
                  • Instruction ID: 4b52f115312577bf691cc74e21eacd5d579ba435b9f226afc327efd83a501fed
                  • Opcode Fuzzy Hash: 779c9106a9314db6e86b12172e943129497783e16406c0901ac4297a1cb08dc6
                  • Instruction Fuzzy Hash: 9C22117890122ACFCB55EF65E894A9DBBB1FF88300F108BA9D509A7359DB706D85CF40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.2205728285.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1620000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID: LReq
                  • API String ID: 0-2687900687
                  • Opcode ID: c125b791d81f11051325dd1f481c8d8615c646af88c1c1fc4d57a3c16b17730d
                  • Instruction ID: 3040671bbf166bd3e45cfe122c92adce179495e2022ec91edfc85d590eaf7b25
                  • Opcode Fuzzy Hash: c125b791d81f11051325dd1f481c8d8615c646af88c1c1fc4d57a3c16b17730d
                  • Instruction Fuzzy Hash: 8922F17890122ACFCB55EF65E894A9DBBB1FF88300F108BA9D509A7359DB706D85CF40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000003.00000002.2205728285.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1620000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cb9f543900ae8d174c6af793eac8c1f7305d20103439de1eff763c1615ce3296
                  • Instruction ID: 608806e9df6fcdeffd64857c43cc59e11b99922fb56e867ababbffe09f8b9fa8
                  • Opcode Fuzzy Hash: cb9f543900ae8d174c6af793eac8c1f7305d20103439de1eff763c1615ce3296
                  • Instruction Fuzzy Hash: 4C21C439A006269FCB15DF24C850DAE77A5EFC9351B60C51DEA099B354DB30EA46CF80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000003.00000002.2205728285.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1620000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 576a304a397dc4ad580b7ecece4d209c34c366f74c59d90b54c3cf15bce70bc0
                  • Instruction ID: 9ec9e40543c2fe7e15bbb05c5498d8c39df1b46b703e57227171a774a7501828
                  • Opcode Fuzzy Hash: 576a304a397dc4ad580b7ecece4d209c34c366f74c59d90b54c3cf15bce70bc0
                  • Instruction Fuzzy Hash: A521E0B4C0560A8FCB41EFA8D9555EEBFF0FF59300F20466AD905B2210EB301A85CFA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000003.00000002.2205728285.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1620000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0a296b8b3e0fe4f59219dae0ebc4a33892427831acea19f919e81d93ea22aa1d
                  • Instruction ID: 7f8099d75be82c69e6415216b6c78fae649dda2584aaffd2b0fefb8b71deacb6
                  • Opcode Fuzzy Hash: 0a296b8b3e0fe4f59219dae0ebc4a33892427831acea19f919e81d93ea22aa1d
                  • Instruction Fuzzy Hash: 2BE0D876D2036A4BCB129BB498525FDBF34ADD2120B5A4663D050B7052E730164FC771
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000003.00000002.2205728285.0000000001620000.00000040.00000800.00020000.00000000.sdmp, Offset: 01620000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1620000_Purchase Order.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a03f3fa756d98859a89643e90076f62774f114eba71877c6d1589a719d0d730f
                  • Instruction ID: 029bc0a622d6c8ecf8e7d7f29d452ea5785f4d4c389dded27e885aa293771617
                  • Opcode Fuzzy Hash: a03f3fa756d98859a89643e90076f62774f114eba71877c6d1589a719d0d730f
                  • Instruction Fuzzy Hash: AFD05E32D2032B97CB00EBA5EC048EFFB38EED6261B958626D52437154FB702659C6E1
                  Uniqueness

                  Uniqueness Score: -1.00%