Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PURCHASE ORDER.exe

Overview

General Information

Sample Name:PURCHASE ORDER.exe
Analysis ID:755961
MD5:a55b4bb09398659d69f1b8b37541e621
SHA1:975f7c38780d00ae497fcb6addf31f5ad8cdb090
SHA256:ea45a2032eebe69d32b15d3ea505330eb00b5026107e8e123fb9fb9e2bf87496
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Sigma detected: Scheduled temp file as task from temp location
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • PURCHASE ORDER.exe (PID: 5196 cmdline: C:\Users\user\Desktop\PURCHASE ORDER.exe MD5: A55B4BB09398659D69F1B8B37541E621)
    • schtasks.exe (PID: 1948 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PAyWOGoRT" /XML "C:\Users\user\AppData\Local\Temp\tmpF89B.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 2040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 4212 cmdline: {path} MD5: 2867A3817C9245F7CF518524DFD18F28)
  • PAyWOGoRT.exe (PID: 1520 cmdline: C:\Users\user\AppData\Roaming\PAyWOGoRT.exe MD5: A55B4BB09398659D69F1B8B37541E621)
    • schtasks.exe (PID: 1240 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PAyWOGoRT" /XML "C:\Users\user\AppData\Local\Temp\tmp6AED.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • RegSvcs.exe (PID: 5292 cmdline: {path} MD5: 2867A3817C9245F7CF518524DFD18F28)
    • RegSvcs.exe (PID: 3836 cmdline: {path} MD5: 2867A3817C9245F7CF518524DFD18F28)
  • yGbzOMp.exe (PID: 1604 cmdline: "C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe" MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 5188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • yGbzOMp.exe (PID: 4184 cmdline: "C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe" MD5: 2867A3817C9245F7CF518524DFD18F28)
    • conhost.exe (PID: 3720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"Exfil Mode": "SMTP", "Host": "mail.orogenicgroup-bd.com", "Username": "amir.hossain@orogenicgroup-bd.com", "Password": "Hossain$3400"}
SourceRuleDescriptionAuthorStrings
00000003.00000000.337559814.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000003.00000000.337559814.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000003.00000000.337559814.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x31d44:$a13: get_DnsResolver
      • 0x3043b:$a20: get_LastAccessed
      • 0x32772:$a27: set_InternalServerPort
      • 0x32aa7:$a30: set_GuidMasterKey
      • 0x3054d:$a33: get_Clipboard
      • 0x3055b:$a34: get_Keyboard
      • 0x31928:$a35: get_ShiftKeyDown
      • 0x31939:$a36: get_AltKeyDown
      • 0x30568:$a37: get_Password
      • 0x31083:$a38: get_PasswordHash
      • 0x321a6:$a39: get_DefaultCredentials
      00000000.00000002.341336847.0000000003297000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        00000003.00000002.412448960.00000000028F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Click to see the 15 entries
          SourceRuleDescriptionAuthorStrings
          3.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            3.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              0.2.PURCHASE ORDER.exe.43a0ee0.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.PURCHASE ORDER.exe.43a0ee0.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  3.0.RegSvcs.exe.400000.0.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                  • 0x34a83:$s10: logins
                  • 0x344fd:$s11: credential
                  • 0x3074d:$g1: get_Clipboard
                  • 0x3075b:$g2: get_Keyboard
                  • 0x30768:$g3: get_Password
                  • 0x31b18:$g4: get_CtrlKeyDown
                  • 0x31b28:$g5: get_ShiftKeyDown
                  • 0x31b39:$g6: get_AltKeyDown
                  Click to see the 7 entries

                  Persistence and Installation Behavior

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PAyWOGoRT" /XML "C:\Users\user\AppData\Local\Temp\tmpF89B.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PAyWOGoRT" /XML "C:\Users\user\AppData\Local\Temp\tmpF89B.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\PURCHASE ORDER.exe, ParentImage: C:\Users\user\Desktop\PURCHASE ORDER.exe, ParentProcessId: 5196, ParentProcessName: PURCHASE ORDER.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PAyWOGoRT" /XML "C:\Users\user\AppData\Local\Temp\tmpF89B.tmp, ProcessId: 1948, ProcessName: schtasks.exe
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: PURCHASE ORDER.exeReversingLabs: Detection: 60%
                  Source: PURCHASE ORDER.exeVirustotal: Detection: 47%Perma Link
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeReversingLabs: Detection: 60%
                  Source: PURCHASE ORDER.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeJoe Sandbox ML: detected
                  Source: 3.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: 0.2.PURCHASE ORDER.exe.43a0ee0.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.orogenicgroup-bd.com", "Username": "amir.hossain@orogenicgroup-bd.com", "Password": "Hossain$3400"}
                  Source: PURCHASE ORDER.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  Source: PURCHASE ORDER.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: RegSvcs.pdb, source: yGbzOMp.exe, 00000005.00000000.371961562.0000000000902000.00000002.00000001.01000000.0000000A.sdmp, RegSvcs.exe, 0000000C.00000003.462171566.000000000600D000.00000004.00000800.00020000.00000000.sdmp, yGbzOMp.exe.3.dr
                  Source: Binary string: RegSvcs.pdb source: yGbzOMp.exe, 00000005.00000000.371961562.0000000000902000.00000002.00000001.01000000.0000000A.sdmp, RegSvcs.exe, 0000000C.00000003.462171566.000000000600D000.00000004.00000800.00020000.00000000.sdmp, yGbzOMp.exe.3.dr
                  Source: global trafficTCP traffic: 192.168.2.4:49695 -> 119.148.27.3:587
                  Source: global trafficTCP traffic: 192.168.2.4:49695 -> 119.148.27.3:587
                  Source: RegSvcs.exe, 00000003.00000002.412448960.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.570378772.0000000002A5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                  Source: RegSvcs.exe, 0000000C.00000002.570378772.0000000002A5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                  Source: RegSvcs.exe, 0000000C.00000002.570378772.0000000002A5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://JXqRNJ.com
                  Source: RegSvcs.exe, 00000003.00000002.417544241.0000000002C7D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.422933643.0000000005D81000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.574204192.0000000002E19000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.577522128.0000000006045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: RegSvcs.exe, 00000003.00000002.423143006.0000000005DBC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.577522128.0000000006045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: RegSvcs.exe, 00000003.00000002.417544241.0000000002C7D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.422933643.0000000005D81000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.574204192.0000000002E19000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.577522128.0000000006045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                  Source: RegSvcs.exe, 00000003.00000002.417544241.0000000002C7D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.422933643.0000000005D81000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.422762374.0000000005D62000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.574204192.0000000002E19000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.577522128.0000000006045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: RegSvcs.exe, 00000003.00000002.417544241.0000000002C7D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.574204192.0000000002E19000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.orogenicgroup-bd.com
                  Source: RegSvcs.exe, 00000003.00000002.417544241.0000000002C7D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.422933643.0000000005D81000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.422762374.0000000005D62000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.574204192.0000000002E19000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.577522128.0000000006045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: PURCHASE ORDER.exe, 00000000.00000002.341153865.0000000003251000.00000004.00000800.00020000.00000000.sdmp, PAyWOGoRT.exe, 00000004.00000002.405112701.0000000003001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: RegSvcs.exe, 0000000C.00000002.570378772.0000000002A5C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.574175039.0000000002E13000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.574144305.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://0boQaB1sN6dM.org
                  Source: RegSvcs.exe, 00000003.00000002.417544241.0000000002C7D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.422933643.0000000005D81000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.422762374.0000000005D62000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.574204192.0000000002E19000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.577522128.0000000006045000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                  Source: RegSvcs.exe, 00000003.00000002.412448960.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.570378772.0000000002A5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                  Source: unknownDNS traffic detected: queries for: mail.orogenicgroup-bd.com

                  System Summary

                  barindex
                  Source: 3.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.PURCHASE ORDER.exe.43a0ee0.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 3.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.PURCHASE ORDER.exe.43a0ee0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.PURCHASE ORDER.exe.43a0ee0.0.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.PURCHASE ORDER.exe.43a0ee0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 00000003.00000000.337559814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 00000000.00000002.342927901.0000000004279000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: Process Memory Space: PURCHASE ORDER.exe PID: 5196, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 4212, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: initial sampleStatic PE information: Filename: PURCHASE ORDER.exe
                  Source: 3.0.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b1A51FE34u002d102Bu002d4B81u002dB647u002d9B5BFE7FC3FBu007d/u00339A8F051u002d32C9u002d4CC9u002dBC08u002dBE27BEFD88F4.csLarge array initialization: .cctor: array initializer size 10971
                  Source: PURCHASE ORDER.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  Source: 3.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.PURCHASE ORDER.exe.43a0ee0.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 3.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.PURCHASE ORDER.exe.43a0ee0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.PURCHASE ORDER.exe.43a0ee0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.PURCHASE ORDER.exe.43a0ee0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 00000003.00000000.337559814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 00000000.00000002.342927901.0000000004279000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: Process Memory Space: PURCHASE ORDER.exe PID: 5196, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: Process Memory Space: RegSvcs.exe PID: 4212, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_01553D9D0_2_01553D9D
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_01551C400_2_01551C40
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_01550EB00_2_01550EB0
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_015518F00_2_015518F0
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_015518E00_2_015518E0
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_015565080_2_01556508
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_01551C310_2_01551C31
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_01556F180_2_01556F18
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_01553F9B0_2_01553F9B
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_01551ED80_2_01551ED8
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_01551EC90_2_01551EC9
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_01550EA00_2_01550EA0
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_0160E2C80_2_0160E2C8
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_0160E2D80_2_0160E2D8
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_0160BFC40_2_0160BFC4
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_031C65B80_2_031C65B8
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeCode function: 0_2_031C65A90_2_031C65A9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00DEE16B3_2_00DEE16B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00DEDA013_2_00DEDA01
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D7F7803_2_04D7F780
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D7B5203_2_04D7B520
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_04D7FAC83_2_04D7FAC8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05D305483_2_05D30548
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05D3C5083_2_05D3C508
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05D326383_2_05D32638
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05D3CB403_2_05D3CB40
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E6A5A43_2_05E6A5A4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E6F9103_2_05E6F910
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E6CD193_2_05E6CD19
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E6F4CF3_2_05E6F4CF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E600403_2_05E60040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E654283_2_05E65428
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E67E403_2_05E67E40
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E61F883_2_05E61F88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E885B83_2_05E885B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E819583_2_05E81958
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E8A4C03_2_05E8A4C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E8E7703_2_05E8E770
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E84E283_2_05E84E28
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E8D5783_2_05E8D578
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E8D5183_2_05E8D518
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E873D03_2_05E873D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 05D36F60 appears 52 times
                  Source: PURCHASE ORDER.exe, 00000000.00000002.341336847.0000000003297000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs PURCHASE ORDER.exe
                  Source: PURCHASE ORDER.exe, 00000000.00000002.348745127.00000000078A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs PURCHASE ORDER.exe
                  Source: PURCHASE ORDER.exe, 00000000.00000002.343797180.0000000004468000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs PURCHASE ORDER.exe
                  Source: PURCHASE ORDER.exe, 00000000.00000002.343797180.0000000004468000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameqyB5isNZ.exe8 vs PURCHASE ORDER.exe
                  Source: PURCHASE ORDER.exe, 00000000.00000002.346074250.00000000056D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCassa.dll< vs PURCHASE ORDER.exe
                  Source: PURCHASE ORDER.exe, 00000000.00000002.342927901.0000000004279000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename98c82298-36d2-4e7e-8ae3-4950e4f51184.exe4 vs PURCHASE ORDER.exe
                  Source: PURCHASE ORDER.exe, 00000000.00000002.341153865.0000000003251000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename98c82298-36d2-4e7e-8ae3-4950e4f51184.exe4 vs PURCHASE ORDER.exe
                  Source: PURCHASE ORDER.exeBinary or memory string: OriginalFilenameqyB5isNZ.exe8 vs PURCHASE ORDER.exe
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe 43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                  Source: PURCHASE ORDER.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: PAyWOGoRT.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: PURCHASE ORDER.exeReversingLabs: Detection: 60%
                  Source: PURCHASE ORDER.exeVirustotal: Detection: 47%
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeFile read: C:\Users\user\Desktop\PURCHASE ORDER.exeJump to behavior
                  Source: PURCHASE ORDER.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\PURCHASE ORDER.exe C:\Users\user\Desktop\PURCHASE ORDER.exe
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PAyWOGoRT" /XML "C:\Users\user\AppData\Local\Temp\tmpF89B.tmp
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\PAyWOGoRT.exe C:\Users\user\AppData\Roaming\PAyWOGoRT.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe "C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe"
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe "C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe"
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PAyWOGoRT" /XML "C:\Users\user\AppData\Local\Temp\tmp6AED.tmp
                  Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PAyWOGoRT" /XML "C:\Users\user\AppData\Local\Temp\tmpF89B.tmpJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PAyWOGoRT" /XML "C:\Users\user\AppData\Local\Temp\tmp6AED.tmpJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeFile created: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF89B.tmpJump to behavior
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@18/9@2/1
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: RegSvcs.exe, 00000003.00000002.417165095.0000000002C40000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.573889145.0000000002DDB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: PURCHASE ORDER.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeMutant created: \Sessions\1\BaseNamedObjects\nnVWvWgWBznoFzzQRNsbxIAQxt
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2040:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6096:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3720:120:WilError_01
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5188:120:WilError_01
                  Source: 3.0.RegSvcs.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 3.0.RegSvcs.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: PURCHASE ORDER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: PURCHASE ORDER.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: RegSvcs.pdb, source: yGbzOMp.exe, 00000005.00000000.371961562.0000000000902000.00000002.00000001.01000000.0000000A.sdmp, RegSvcs.exe, 0000000C.00000003.462171566.000000000600D000.00000004.00000800.00020000.00000000.sdmp, yGbzOMp.exe.3.dr
                  Source: Binary string: RegSvcs.pdb source: yGbzOMp.exe, 00000005.00000000.371961562.0000000000902000.00000002.00000001.01000000.0000000A.sdmp, RegSvcs.exe, 0000000C.00000003.462171566.000000000600D000.00000004.00000800.00020000.00000000.sdmp, yGbzOMp.exe.3.dr
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05D3F488 push esp; retf 3_2_05D3F5A1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05D3E11E push ecx; iretd 3_2_05D3E11F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05D3E123 push eax; iretd 3_2_05D3E124
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E63F21 push E904DDD4h; retf 0001h3_2_05E63F26
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.897447602261709
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.897447602261709
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeFile created: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeJump to dropped file
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PAyWOGoRT" /XML "C:\Users\user\AppData\Local\Temp\tmpF89B.tmp
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run yGbzOMpJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run yGbzOMpJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: 00000000.00000002.341336847.0000000003297000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: PURCHASE ORDER.exe PID: 5196, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: PAyWOGoRT.exe PID: 1520, type: MEMORYSTR
                  Source: PURCHASE ORDER.exe, 00000000.00000002.341336847.0000000003297000.00000004.00000800.00020000.00000000.sdmp, PAyWOGoRT.exe, 00000004.00000002.405112701.0000000003001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                  Source: PURCHASE ORDER.exe, 00000000.00000002.341336847.0000000003297000.00000004.00000800.00020000.00000000.sdmp, PAyWOGoRT.exe, 00000004.00000002.405112701.0000000003001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exe TID: 2168Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exe TID: 6064Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe TID: 2032Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe TID: 5168Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9777Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9736
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99843Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99717Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99607Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99499Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99390Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99172Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99047Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98923Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98800Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98640Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98531Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98421Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98312Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98199Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98076Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97937Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97825Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97593Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97483Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97265Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97156Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97042Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96937Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96827Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96715Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96608Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96375Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96265Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96156Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96044Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95937Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95826Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95716Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95609Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95499Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95390Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95172Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95046Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94933Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94828Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94718Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94609Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94500Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94390Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99874
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99749
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99625
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99515
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99404
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99295
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99186
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99067
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98906
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98795
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98687
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98577
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98465
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98343
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98234
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98124
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98015
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97887
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97761
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97625
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97515
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97406
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97295
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97186
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97078
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96962
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96843
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96734
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96607
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96499
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96386
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96280
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96164
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95984
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95874
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95760
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95656
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95546
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95437
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95321
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95218
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95109
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94999
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94874
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94765
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94655
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94546
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94436
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94327
                  Source: PAyWOGoRT.exe, 00000004.00000002.405112701.0000000003001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                  Source: PAyWOGoRT.exe, 00000004.00000002.405112701.0000000003001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: PAyWOGoRT.exe, 00000004.00000002.405112701.0000000003001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: PAyWOGoRT.exe, 00000004.00000002.405112701.0000000003001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                  Source: PAyWOGoRT.exe, 00000004.00000002.405112701.0000000003001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                  Source: PAyWOGoRT.exe, 00000004.00000002.405112701.0000000003001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: PAyWOGoRT.exe, 00000004.00000002.405112701.0000000003001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                  Source: PAyWOGoRT.exe, 00000004.00000002.405112701.0000000003001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: PAyWOGoRT.exe, 00000004.00000002.405112701.0000000003001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                  Source: RegSvcs.exe, 0000000C.00000002.577267438.0000000006000000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05E86BF8 LdrInitializeThunk,3_2_05E86BF8
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 438000Jump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43A000Jump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 80A008Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 438000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43A000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 872008Jump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PAyWOGoRT" /XML "C:\Users\user\AppData\Local\Temp\tmpF89B.tmpJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PAyWOGoRT" /XML "C:\Users\user\AppData\Local\Temp\tmp6AED.tmpJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Users\user\Desktop\PURCHASE ORDER.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeQueries volume information: C:\Users\user\AppData\Roaming\PAyWOGoRT.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\PAyWOGoRT.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeQueries volume information: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeQueries volume information: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\PURCHASE ORDER.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_05D354C0 GetUserNameW,3_2_05D354C0

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 3.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.PURCHASE ORDER.exe.43a0ee0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.PURCHASE ORDER.exe.43a0ee0.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.337559814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.342927901.0000000004279000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.412448960.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.570378772.0000000002A5C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: PURCHASE ORDER.exe PID: 5196, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4212, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3836, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: Yara matchFile source: 00000003.00000002.412448960.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.570378772.0000000002A5C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4212, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3836, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 3.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.PURCHASE ORDER.exe.43a0ee0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.PURCHASE ORDER.exe.43a0ee0.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.337559814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.342927901.0000000004279000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.412448960.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.570378772.0000000002A5C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: PURCHASE ORDER.exe PID: 5196, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4212, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3836, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts211
                  Windows Management Instrumentation
                  1
                  Scheduled Task/Job
                  211
                  Process Injection
                  1
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  1
                  Account Discovery
                  Remote Services11
                  Archive Collected Data
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default Accounts1
                  Scheduled Task/Job
                  1
                  Registry Run Keys / Startup Folder
                  1
                  Scheduled Task/Job
                  11
                  Deobfuscate/Decode Files or Information
                  1
                  Credentials in Registry
                  1
                  File and Directory Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  Exfiltration Over Bluetooth1
                  Non-Standard Port
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)1
                  Registry Run Keys / Startup Folder
                  3
                  Obfuscated Files or Information
                  Security Account Manager114
                  System Information Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  Automated Exfiltration1
                  Non-Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)3
                  Software Packing
                  NTDS311
                  Security Software Discovery
                  Distributed Component Object ModelInput CaptureScheduled Transfer11
                  Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Masquerading
                  LSA Secrets1
                  Process Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common131
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials131
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items211
                  Process Injection
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                  Hidden Files and Directories
                  Proc Filesystem1
                  System Owner/User Discovery
                  Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                  Remote System Discovery
                  Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 755961 Sample: PURCHASE ORDER.exe Startdate: 29/11/2022 Architecture: WINDOWS Score: 100 48 Malicious sample detected (through community Yara rule) 2->48 50 Sigma detected: Scheduled temp file as task from temp location 2->50 52 Multi AV Scanner detection for submitted file 2->52 54 7 other signatures 2->54 7 PURCHASE ORDER.exe 6 2->7         started        11 PAyWOGoRT.exe 5 2->11         started        13 yGbzOMp.exe 2 2->13         started        15 yGbzOMp.exe 1 2->15         started        process3 file4 40 C:\Users\user\AppData\Roaming\PAyWOGoRT.exe, PE32 7->40 dropped 42 C:\Users\user\AppData\Local\...\tmpF89B.tmp, XML 7->42 dropped 44 C:\Users\user\...\PURCHASE ORDER.exe.log, ASCII 7->44 dropped 70 Writes to foreign memory regions 7->70 72 Injects a PE file into a foreign processes 7->72 17 RegSvcs.exe 2 5 7->17         started        22 schtasks.exe 1 7->22         started        74 Multi AV Scanner detection for dropped file 11->74 76 Machine Learning detection for dropped file 11->76 24 RegSvcs.exe 4 11->24         started        26 schtasks.exe 1 11->26         started        28 RegSvcs.exe 11->28         started        30 conhost.exe 13->30         started        32 conhost.exe 15->32         started        signatures5 process6 dnsIp7 46 mail.orogenicgroup-bd.com 119.148.27.3, 49695, 49696, 587 AGNI-ASAgniSystemsLimitedBD Bangladesh 17->46 38 C:\Users\user\AppData\Roaming\...\yGbzOMp.exe, PE32 17->38 dropped 56 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 17->56 58 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 17->58 60 Tries to steal Mail credentials (via file / registry access) 17->60 62 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 17->62 34 conhost.exe 22->34         started        64 Tries to harvest and steal ftp login credentials 24->64 66 Tries to harvest and steal browser information (history, passwords, etc) 24->66 68 Hides that the sample has been downloaded from the Internet (zone.identifier) 24->68 36 conhost.exe 26->36         started        file8 signatures9 process10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  PURCHASE ORDER.exe61%ReversingLabsByteCode-MSIL.Trojan.Taskun
                  PURCHASE ORDER.exe48%VirustotalBrowse
                  PURCHASE ORDER.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\PAyWOGoRT.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\PAyWOGoRT.exe61%ReversingLabsByteCode-MSIL.Trojan.Taskun
                  C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe0%ReversingLabs
                  SourceDetectionScannerLabelLinkDownload
                  3.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://sectigo.com/CPS00%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                  https://0boQaB1sN6dM.org0%Avira URL Cloudsafe
                  http://mail.orogenicgroup-bd.com0%Avira URL Cloudsafe
                  http://JXqRNJ.com0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  mail.orogenicgroup-bd.com
                  119.148.27.3
                  truefalse
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000003.00000002.412448960.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.570378772.0000000002A5C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.apache.org/licenses/LICENSE-2.0PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designersGPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://sectigo.com/CPS0RegSvcs.exe, 00000003.00000002.417544241.0000000002C7D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.422933643.0000000005D81000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.422762374.0000000005D62000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.574204192.0000000002E19000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.577522128.0000000006045000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/?PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/bThePURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers?PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://mail.orogenicgroup-bd.comRegSvcs.exe, 00000003.00000002.417544241.0000000002C7D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.574204192.0000000002E19000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwRegSvcs.exe, 00000003.00000002.412448960.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.570378772.0000000002A5C000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.tiro.comPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designersPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.goodfont.co.krPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comlPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sajatypeworks.comPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.typography.netDPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/cThePURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/staff/dennis.htmPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://fontfabrik.comPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cnPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-user.htmlPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.jiyu-kobo.co.jp/PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://DynDns.comDynDNSnamejidpasswordPsi/PsiRegSvcs.exe, 0000000C.00000002.570378772.0000000002A5C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://JXqRNJ.comRegSvcs.exe, 0000000C.00000002.570378772.0000000002A5C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.galapagosdesign.com/DPleasePURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8PURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fonts.comPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.sandoll.co.krPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.urwpp.deDPleasePURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.zhongyicts.com.cnPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePURCHASE ORDER.exe, 00000000.00000002.341153865.0000000003251000.00000004.00000800.00020000.00000000.sdmp, PAyWOGoRT.exe, 00000004.00000002.405112701.0000000003001000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.sakkal.comPURCHASE ORDER.exe, 00000000.00000002.346776635.0000000007212000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://0boQaB1sN6dM.orgRegSvcs.exe, 0000000C.00000002.570378772.0000000002A5C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.574175039.0000000002E13000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.574144305.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          119.148.27.3
                                          mail.orogenicgroup-bd.comBangladesh
                                          23923AGNI-ASAgniSystemsLimitedBDfalse
                                          Joe Sandbox Version:36.0.0 Rainbow Opal
                                          Analysis ID:755961
                                          Start date and time:2022-11-29 11:23:06 +01:00
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 8m 24s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Sample file name:PURCHASE ORDER.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:18
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.evad.winEXE@18/9@2/1
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HDC Information:Failed
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 145
                                          • Number of non-executed functions: 9
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          TimeTypeDescription
                                          11:24:07API Interceptor1x Sleep call for process: PURCHASE ORDER.exe modified
                                          11:24:17Task SchedulerRun new task: PAyWOGoRT path: C:\Users\user\AppData\Roaming\PAyWOGoRT.exe
                                          11:24:22AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run yGbzOMp C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe
                                          11:24:31AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run yGbzOMp C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe
                                          11:24:35API Interceptor447x Sleep call for process: RegSvcs.exe modified
                                          11:24:36API Interceptor1x Sleep call for process: PAyWOGoRT.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                          119.148.27.3SWIFT REFERENCE.exeGet hashmaliciousBrowse
                                            PAYMENT COPY.exeGet hashmaliciousBrowse
                                              STATEMENT OF ACCOUNT OCT.exeGet hashmaliciousBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                mail.orogenicgroup-bd.comSWIFT REFERENCE.exeGet hashmaliciousBrowse
                                                • 119.148.27.3
                                                PAYMENT COPY.exeGet hashmaliciousBrowse
                                                • 119.148.27.3
                                                STATEMENT OF ACCOUNT OCT.exeGet hashmaliciousBrowse
                                                • 119.148.27.3
                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                AGNI-ASAgniSystemsLimitedBDSWIFT REFERENCE.exeGet hashmaliciousBrowse
                                                • 119.148.27.3
                                                PAYMENT COPY.exeGet hashmaliciousBrowse
                                                • 119.148.27.3
                                                STATEMENT OF ACCOUNT OCT.exeGet hashmaliciousBrowse
                                                • 119.148.27.3
                                                gMDLARX9GI.elfGet hashmaliciousBrowse
                                                • 119.148.55.237
                                                fVlHtUkKPO.elfGet hashmaliciousBrowse
                                                • 119.148.55.224
                                                Hb8GD7pr7ZGet hashmaliciousBrowse
                                                • 119.148.55.231
                                                GRse5xOyWS.dllGet hashmaliciousBrowse
                                                • 182.252.103.223
                                                bkryx2aoJMGet hashmaliciousBrowse
                                                • 182.252.103.235
                                                gBHjepWUd8Get hashmaliciousBrowse
                                                • 119.148.55.248
                                                lDBBhuxCmiGet hashmaliciousBrowse
                                                • 182.252.76.52
                                                yg5NmwTscpGet hashmaliciousBrowse
                                                • 119.148.55.215
                                                ZYXESmYwdxGet hashmaliciousBrowse
                                                • 119.148.24.124
                                                OpwoeuJ0eFGet hashmaliciousBrowse
                                                • 119.148.55.211
                                                armGet hashmaliciousBrowse
                                                • 182.252.66.208
                                                BKyU0T5xcwGet hashmaliciousBrowse
                                                • 119.148.55.225
                                                Xb1sM3W7BKGet hashmaliciousBrowse
                                                • 119.148.55.215
                                                b3astmode.armGet hashmaliciousBrowse
                                                • 182.252.66.204
                                                qKxXZuMvtPGet hashmaliciousBrowse
                                                • 182.252.66.208
                                                5whlj6MewkGet hashmaliciousBrowse
                                                • 119.148.55.250
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exemonkey.scr.exeGet hashmaliciousBrowse
                                                  Overdue_account letter.exeGet hashmaliciousBrowse
                                                    SecuriteInfo.com.MSIL.GenKryptik.FYGA.tr.21466.8076.exeGet hashmaliciousBrowse
                                                      8vP60HbFlryaXUJ.exeGet hashmaliciousBrowse
                                                        Guia_6007241440032929258904227461816514046515369236897929361847432942837799.exeGet hashmaliciousBrowse
                                                          Guia_6007241440032929258904227461816514046515369236897929361847432942837799.exeGet hashmaliciousBrowse
                                                            Shipping documents.PDF.exeGet hashmaliciousBrowse
                                                              SWIFT REFERENCE.exeGet hashmaliciousBrowse
                                                                Bank TT copy.exeGet hashmaliciousBrowse
                                                                  Shipping documents and BL. PDF.exeGet hashmaliciousBrowse
                                                                    invoice.exeGet hashmaliciousBrowse
                                                                      mko.exeGet hashmaliciousBrowse
                                                                        PAYMENT COPY.exeGet hashmaliciousBrowse
                                                                          SecuriteInfo.com.Win32.PWSX-gen.23719.26078.exeGet hashmaliciousBrowse
                                                                            TT COPY.exeGet hashmaliciousBrowse
                                                                              Draft.exeGet hashmaliciousBrowse
                                                                                SecuriteInfo.com.Win32.CrypterX-gen.14630.22885.exeGet hashmaliciousBrowse
                                                                                  82105269.exeGet hashmaliciousBrowse
                                                                                    Bank letter.exeGet hashmaliciousBrowse
                                                                                      STATEMENT OF ACCOUNT OCT.exeGet hashmaliciousBrowse
                                                                                        Process:C:\Users\user\AppData\Roaming\PAyWOGoRT.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1216
                                                                                        Entropy (8bit):5.355304211458859
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                                                        MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                                                        SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                                                        SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                                                        SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                                                        Malicious:false
                                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                                        Process:C:\Users\user\Desktop\PURCHASE ORDER.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1216
                                                                                        Entropy (8bit):5.355304211458859
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                                                        MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                                                        SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                                                        SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                                                        SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                                                        Malicious:true
                                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                                        Process:C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:modified
                                                                                        Size (bytes):142
                                                                                        Entropy (8bit):5.090621108356562
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                                                        MD5:8C0458BB9EA02D50565175E38D577E35
                                                                                        SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                                                        SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                                                        SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                                                        Malicious:false
                                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                        Process:C:\Users\user\AppData\Roaming\PAyWOGoRT.exe
                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1642
                                                                                        Entropy (8bit):5.177923914853658
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGQBtn:cbhK79lNQR/rydbz9I3YODOLNdq31
                                                                                        MD5:80E675E5B2A240D5A633F826B64E2CF7
                                                                                        SHA1:A690D2C5FB99B392615E75E68CE86972910D28AE
                                                                                        SHA-256:4F6FD6CEF34AAFE00144F440C2AE385364AB808F5B9FCEF4E7EB5105066B0302
                                                                                        SHA-512:3DA27B4BBD5C37247809800B67C0EE0DB05272AE56674AF3CDEE6D95226A7C22E3341CB5200021559C6AAE9240AF3B6A5581333D7A92543D56DA679C32EFF8DD
                                                                                        Malicious:false
                                                                                        Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                                        Process:C:\Users\user\Desktop\PURCHASE ORDER.exe
                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1642
                                                                                        Entropy (8bit):5.177923914853658
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGQBtn:cbhK79lNQR/rydbz9I3YODOLNdq31
                                                                                        MD5:80E675E5B2A240D5A633F826B64E2CF7
                                                                                        SHA1:A690D2C5FB99B392615E75E68CE86972910D28AE
                                                                                        SHA-256:4F6FD6CEF34AAFE00144F440C2AE385364AB808F5B9FCEF4E7EB5105066B0302
                                                                                        SHA-512:3DA27B4BBD5C37247809800B67C0EE0DB05272AE56674AF3CDEE6D95226A7C22E3341CB5200021559C6AAE9240AF3B6A5581333D7A92543D56DA679C32EFF8DD
                                                                                        Malicious:true
                                                                                        Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                                                        Process:C:\Users\user\Desktop\PURCHASE ORDER.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):600576
                                                                                        Entropy (8bit):7.888370004294712
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:7gkzrbETClvHskFgFwIyXCD1vmAMDfJ0/IegnS1onhj6W4ytrRpMf:/76CVskFgqIyXFhS/ngSWhxROf
                                                                                        MD5:A55B4BB09398659D69F1B8B37541E621
                                                                                        SHA1:975F7C38780D00AE497FCB6ADDF31F5AD8CDB090
                                                                                        SHA-256:EA45A2032EEBE69D32B15D3EA505330EB00B5026107E8E123FB9FB9E2BF87496
                                                                                        SHA-512:A5EB89B7B07AD51B747BA5C003D50AE8AA53C11ADB23034DA977E8AB25373A81C3C7216CDA025C25A0D55F9CAB989F93794D2512FB16A8998DFA8D58C5210590
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        • Antivirus: ReversingLabs, Detection: 61%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c.............................5... ...@....@.. ....................................@.................................x5..W....@..4....................`....................................................... ............... ..H............text........ ...................... ..`.rsrc...4....@......................@..@.reloc.......`.......(..............@..B.................5......H............T......4........E..........................................z.(......}.....( ...o!...}....*..0...........{............3.....(.....*..................0...........{......,....f.........}......}......}.......s....o....}.......}....8......{....o....}......{....}......}.............}.....{........Y}.....{....-...+H.{........{....X.{....X .;.|.{....Xa}......}.....{....o....:q....(....+..(........}.........(......*................n..}.....{....,..{....o....*..{....*.s".
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):45152
                                                                                        Entropy (8bit):6.149629800481177
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:bBbSoy+SdIBf0k2dsYyV6Iq87PiU9FViaLmf:EoOIBf0ddsYy8LUjVBC
                                                                                        MD5:2867A3817C9245F7CF518524DFD18F28
                                                                                        SHA1:D7BA2A111CEDD5BF523224B3F1CFE58EEC7C2FDC
                                                                                        SHA-256:43026DCFF238F20CFF0419924486DEE45178119CFDD0D366B79D67D950A9BF50
                                                                                        SHA-512:7D3D3DBB42B7966644D716AA9CBC75327B2ACB02E43C61F1DAD4AFE5521F9FE248B33347DFE15B637FB33EB97CDB322BCAEAE08BAE3F2FD863A9AD9B3A4D6B42
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Joe Sandbox View:
                                                                                        • Filename: monkey.scr.exe, Detection: malicious, Browse
                                                                                        • Filename: Overdue_account letter.exe, Detection: malicious, Browse
                                                                                        • Filename: SecuriteInfo.com.MSIL.GenKryptik.FYGA.tr.21466.8076.exe, Detection: malicious, Browse
                                                                                        • Filename: 8vP60HbFlryaXUJ.exe, Detection: malicious, Browse
                                                                                        • Filename: Guia_6007241440032929258904227461816514046515369236897929361847432942837799.exe, Detection: malicious, Browse
                                                                                        • Filename: Guia_6007241440032929258904227461816514046515369236897929361847432942837799.exe, Detection: malicious, Browse
                                                                                        • Filename: Shipping documents.PDF.exe, Detection: malicious, Browse
                                                                                        • Filename: SWIFT REFERENCE.exe, Detection: malicious, Browse
                                                                                        • Filename: Bank TT copy.exe, Detection: malicious, Browse
                                                                                        • Filename: Shipping documents and BL. PDF.exe, Detection: malicious, Browse
                                                                                        • Filename: invoice.exe, Detection: malicious, Browse
                                                                                        • Filename: mko.exe, Detection: malicious, Browse
                                                                                        • Filename: PAYMENT COPY.exe, Detection: malicious, Browse
                                                                                        • Filename: SecuriteInfo.com.Win32.PWSX-gen.23719.26078.exe, Detection: malicious, Browse
                                                                                        • Filename: TT COPY.exe, Detection: malicious, Browse
                                                                                        • Filename: Draft.exe, Detection: malicious, Browse
                                                                                        • Filename: SecuriteInfo.com.Win32.CrypterX-gen.14630.22885.exe, Detection: malicious, Browse
                                                                                        • Filename: 82105269.exe, Detection: malicious, Browse
                                                                                        • Filename: Bank letter.exe, Detection: malicious, Browse
                                                                                        • Filename: STATEMENT OF ACCOUNT OCT.exe, Detection: malicious, Browse
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...zX.Z..............0..d..........V.... ........@.. ..............................."....`.....................................O.......8............r..`>.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                                                        Process:C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1141
                                                                                        Entropy (8bit):4.44831826838854
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:zKLXkb4DObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0b4DQntKKH1MqJC
                                                                                        MD5:1AEB3A784552CFD2AEDEDC1D43A97A4F
                                                                                        SHA1:804286AB9F8B3DE053222826A69A7CDA3492411A
                                                                                        SHA-256:0BC438F4B1208E1390C12D375B6CBB08BF47599D1F24BD07799BB1DF384AA293
                                                                                        SHA-512:5305059BA86D5C2185E590EC036044B2A17ED9FD9863C2E3C7E7D8035EF0C79E53357AF5AE735F7D432BC70156D4BD3ACB42D100CFB05C2FB669EA22368F1415
                                                                                        Malicious:false
                                                                                        Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Entropy (8bit):7.888370004294712
                                                                                        TrID:
                                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                        • DOS Executable Generic (2002/1) 0.01%
                                                                                        File name:PURCHASE ORDER.exe
                                                                                        File size:600576
                                                                                        MD5:a55b4bb09398659d69f1b8b37541e621
                                                                                        SHA1:975f7c38780d00ae497fcb6addf31f5ad8cdb090
                                                                                        SHA256:ea45a2032eebe69d32b15d3ea505330eb00b5026107e8e123fb9fb9e2bf87496
                                                                                        SHA512:a5eb89b7b07ad51b747ba5c003d50ae8aa53c11adb23034da977e8ab25373a81c3c7216cda025c25a0d55f9cab989f93794d2512fb16a8998dfa8d58c5210590
                                                                                        SSDEEP:12288:7gkzrbETClvHskFgFwIyXCD1vmAMDfJ0/IegnS1onhj6W4ytrRpMf:/76CVskFgqIyXFhS/ngSWhxROf
                                                                                        TLSH:98D4023C1B457F2BC27D88F595D24E017FF18D19A021EA1AACDE66D803C67781B90ED5
                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c.............................5... ...@....@.. ....................................@................................
                                                                                        Icon Hash:0969696949097961
                                                                                        Entrypoint:0x4935d2
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows gui
                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                        Time Stamp:0x63841E09 [Mon Nov 28 02:33:45 2022 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:4
                                                                                        OS Version Minor:0
                                                                                        File Version Major:4
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:4
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                        Instruction
                                                                                        jmp dword ptr [00402000h]
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x935780x57.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x940000xf34.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x960000xc.reloc
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x20000x915d80x91600False0.8968941449914015data7.897447602261709IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                        .rsrc0x940000xf340x1000False0.674072265625data6.343221929180967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .reloc0x960000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                        NameRVASizeTypeLanguageCountry
                                                                                        RT_ICON0x941180xa75PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                                        RT_GROUP_ICON0x94b900x14data
                                                                                        RT_GROUP_ICON0x94ba40x14data
                                                                                        RT_VERSION0x94bb80x37cdata
                                                                                        DLLImport
                                                                                        mscoree.dll_CorExeMain
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Nov 29, 2022 11:24:36.287166119 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:36.589534998 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:36.589658976 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:38.225836039 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:38.226146936 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:38.523627043 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:38.523865938 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:38.826832056 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:38.889180899 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:39.213813066 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:39.213850975 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:39.213881016 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:39.213903904 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:39.213943005 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:39.213980913 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:39.217195988 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:39.264162064 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:39.562028885 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:39.623230934 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:39.920614004 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:39.944987059 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:40.242274046 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:40.251883984 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:40.587641954 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:40.821350098 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:40.822257996 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:41.119117975 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:41.119190931 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:41.119870901 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:41.424794912 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:41.425214052 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:41.724648952 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:41.726552963 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:41.730971098 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:41.731875896 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:41.731961966 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:42.029700041 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:42.035222054 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:42.035703897 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:42.035804033 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:42.120207071 CET58749695119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:24:42.164433956 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:24:57.036175013 CET49695587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:15.563796043 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:15.861283064 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:15.861886024 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:17.602075100 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:17.602732897 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:17.901496887 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:17.902745962 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:18.200984001 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:18.215336084 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:18.529184103 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:18.529251099 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:18.529294968 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:18.529333115 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:18.529411077 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:18.529882908 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:18.531244040 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:18.541455984 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:18.841746092 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:18.886261940 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:18.943299055 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:19.239828110 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:19.242074013 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:19.538795948 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:19.540328979 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:19.875647068 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:19.899672031 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:19.900697947 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:20.196681023 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:20.196717978 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:20.197648048 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:20.502088070 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:20.502681017 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:20.798707008 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:20.803905010 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:20.804018974 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:20.804094076 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:20.804167986 CET49696587192.168.2.4119.148.27.3
                                                                                        Nov 29, 2022 11:25:21.100074053 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:21.100131035 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:21.101542950 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:21.140907049 CET58749696119.148.27.3192.168.2.4
                                                                                        Nov 29, 2022 11:25:21.183245897 CET49696587192.168.2.4119.148.27.3
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Nov 29, 2022 11:24:36.029767036 CET5657253192.168.2.48.8.8.8
                                                                                        Nov 29, 2022 11:24:36.203140020 CET53565728.8.8.8192.168.2.4
                                                                                        Nov 29, 2022 11:25:15.366661072 CET5091153192.168.2.48.8.8.8
                                                                                        Nov 29, 2022 11:25:15.530844927 CET53509118.8.8.8192.168.2.4
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                        Nov 29, 2022 11:24:36.029767036 CET192.168.2.48.8.8.80x2672Standard query (0)mail.orogenicgroup-bd.comA (IP address)IN (0x0001)false
                                                                                        Nov 29, 2022 11:25:15.366661072 CET192.168.2.48.8.8.80x3968Standard query (0)mail.orogenicgroup-bd.comA (IP address)IN (0x0001)false
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                        Nov 29, 2022 11:24:36.203140020 CET8.8.8.8192.168.2.40x2672No error (0)mail.orogenicgroup-bd.com119.148.27.3A (IP address)IN (0x0001)false
                                                                                        Nov 29, 2022 11:25:15.530844927 CET8.8.8.8192.168.2.40x3968No error (0)mail.orogenicgroup-bd.com119.148.27.3A (IP address)IN (0x0001)false
                                                                                        TimestampSource PortDest PortSource IPDest IPCommands
                                                                                        Nov 29, 2022 11:24:38.225836039 CET58749695119.148.27.3192.168.2.4220-panel2.agni.com ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 16:24:38 +0600
                                                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                                                        220 and/or bulk e-mail.
                                                                                        Nov 29, 2022 11:24:38.226146936 CET49695587192.168.2.4119.148.27.3EHLO 549163
                                                                                        Nov 29, 2022 11:24:38.523627043 CET58749695119.148.27.3192.168.2.4250-panel2.agni.com Hello 549163 [102.129.143.49]
                                                                                        250-SIZE 52428800
                                                                                        250-8BITMIME
                                                                                        250-PIPELINING
                                                                                        250-PIPE_CONNECT
                                                                                        250-STARTTLS
                                                                                        250 HELP
                                                                                        Nov 29, 2022 11:24:38.523865938 CET49695587192.168.2.4119.148.27.3STARTTLS
                                                                                        Nov 29, 2022 11:24:38.826832056 CET58749695119.148.27.3192.168.2.4220 TLS go ahead
                                                                                        Nov 29, 2022 11:25:17.602075100 CET58749696119.148.27.3192.168.2.4220-panel2.agni.com ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 16:25:17 +0600
                                                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                                                        220 and/or bulk e-mail.
                                                                                        Nov 29, 2022 11:25:17.602732897 CET49696587192.168.2.4119.148.27.3EHLO 549163
                                                                                        Nov 29, 2022 11:25:17.901496887 CET58749696119.148.27.3192.168.2.4250-panel2.agni.com Hello 549163 [102.129.143.49]
                                                                                        250-SIZE 52428800
                                                                                        250-8BITMIME
                                                                                        250-PIPELINING
                                                                                        250-PIPE_CONNECT
                                                                                        250-STARTTLS
                                                                                        250 HELP
                                                                                        Nov 29, 2022 11:25:17.902745962 CET49696587192.168.2.4119.148.27.3STARTTLS
                                                                                        Nov 29, 2022 11:25:18.200984001 CET58749696119.148.27.3192.168.2.4220 TLS go ahead

                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:11:23:57
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Users\user\Desktop\PURCHASE ORDER.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\Desktop\PURCHASE ORDER.exe
                                                                                        Imagebase:0xc10000
                                                                                        File size:600576 bytes
                                                                                        MD5 hash:A55B4BB09398659D69F1B8B37541E621
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.341336847.0000000003297000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.342927901.0000000004279000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.342927901.0000000004279000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.342927901.0000000004279000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                        Reputation:low

                                                                                        Target ID:1
                                                                                        Start time:11:24:14
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PAyWOGoRT" /XML "C:\Users\user\AppData\Local\Temp\tmpF89B.tmp
                                                                                        Imagebase:0x2f0000
                                                                                        File size:185856 bytes
                                                                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        Target ID:2
                                                                                        Start time:11:24:15
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7c72c0000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        Target ID:3
                                                                                        Start time:11:24:15
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:{path}
                                                                                        Imagebase:0x610000
                                                                                        File size:45152 bytes
                                                                                        MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000000.337559814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000000.337559814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000003.00000000.337559814.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.412448960.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.412448960.00000000028F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:high

                                                                                        Target ID:4
                                                                                        Start time:11:24:17
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Users\user\AppData\Roaming\PAyWOGoRT.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\AppData\Roaming\PAyWOGoRT.exe
                                                                                        Imagebase:0xb40000
                                                                                        File size:600576 bytes
                                                                                        MD5 hash:A55B4BB09398659D69F1B8B37541E621
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Antivirus matches:
                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                        • Detection: 61%, ReversingLabs
                                                                                        Reputation:low

                                                                                        Target ID:5
                                                                                        Start time:11:24:31
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe"
                                                                                        Imagebase:0x900000
                                                                                        File size:45152 bytes
                                                                                        MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Antivirus matches:
                                                                                        • Detection: 0%, ReversingLabs
                                                                                        Reputation:high

                                                                                        Target ID:6
                                                                                        Start time:11:24:32
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7c72c0000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        Target ID:7
                                                                                        Start time:11:24:40
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\AppData\Roaming\yGbzOMp\yGbzOMp.exe"
                                                                                        Imagebase:0x5c0000
                                                                                        File size:45152 bytes
                                                                                        MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Reputation:high

                                                                                        Target ID:8
                                                                                        Start time:11:24:41
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7c72c0000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        Target ID:9
                                                                                        Start time:11:24:43
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PAyWOGoRT" /XML "C:\Users\user\AppData\Local\Temp\tmp6AED.tmp
                                                                                        Imagebase:0x2f0000
                                                                                        File size:185856 bytes
                                                                                        MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        Target ID:10
                                                                                        Start time:11:24:43
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7c72c0000
                                                                                        File size:625664 bytes
                                                                                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high

                                                                                        Target ID:11
                                                                                        Start time:11:24:44
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:{path}
                                                                                        Imagebase:0x1b0000
                                                                                        File size:45152 bytes
                                                                                        MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language

                                                                                        Target ID:12
                                                                                        Start time:11:24:44
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:{path}
                                                                                        Imagebase:0x640000
                                                                                        File size:45152 bytes
                                                                                        MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.570378772.0000000002A5C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.570378772.0000000002A5C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security

                                                                                        Reset < >

                                                                                          Execution Graph

                                                                                          Execution Coverage:13.6%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:11.5%
                                                                                          Total number of Nodes:312
                                                                                          Total number of Limit Nodes:22
                                                                                          execution_graph 27082 160b530 GetCurrentProcess 27083 160b5a3 27082->27083 27084 160b5aa GetCurrentThread 27082->27084 27083->27084 27085 160b5e0 27084->27085 27086 160b5e7 GetCurrentProcess 27084->27086 27085->27086 27087 160b61d 27086->27087 27088 160b645 GetCurrentThreadId 27087->27088 27089 160b676 27088->27089 27090 16099b0 27091 16099f2 27090->27091 27092 16099f8 LoadLibraryExW 27090->27092 27091->27092 27093 1609a29 27092->27093 26971 1550616 26975 1551829 26971->26975 26980 1551838 26971->26980 26972 155062f 26977 1551838 26975->26977 26976 155188c 26976->26972 26977->26976 26985 1551c31 26977->26985 26996 1551c40 26977->26996 26982 1551855 26980->26982 26981 155188c 26981->26972 26982->26981 26983 1551c31 10 API calls 26982->26983 26984 1551c40 10 API calls 26982->26984 26983->26982 26984->26982 26986 1551c67 26985->26986 26987 1551cc0 26986->26987 27007 1552b0f 26986->27007 27012 15526ec 26986->27012 27016 1552ac6 26986->27016 27021 15523c6 26986->27021 27025 15520c7 26986->27025 27030 15529ca 26986->27030 27034 1552ca9 26986->27034 27038 1552139 26986->27038 26987->26977 26997 1551c67 26996->26997 26998 1551cc0 26997->26998 26999 15520c7 2 API calls 26997->26999 27000 15523c6 2 API calls 26997->27000 27001 1552ac6 2 API calls 26997->27001 27002 15526ec 2 API calls 26997->27002 27003 1552b0f 2 API calls 26997->27003 27004 1552139 2 API calls 26997->27004 27005 1552ca9 2 API calls 26997->27005 27006 15529ca 2 API calls 26997->27006 26998->26977 26999->26997 27000->26997 27001->26997 27002->26997 27003->26997 27004->26997 27005->26997 27006->26997 27008 1552b1b 27007->27008 27043 1553820 27008->27043 27046 1553819 27008->27046 27009 1552b46 27049 1553990 27012->27049 27053 1553998 27012->27053 27013 1552706 27017 1552acc 27016->27017 27057 1553760 27017->27057 27061 1553759 27017->27061 27018 1552ad9 27023 1553990 WriteProcessMemory 27021->27023 27024 1553998 WriteProcessMemory 27021->27024 27022 15523de 27023->27022 27024->27022 27026 15520cd 27025->27026 27028 1553990 WriteProcessMemory 27026->27028 27029 1553998 WriteProcessMemory 27026->27029 27027 1552102 27028->27027 27029->27027 27032 1553760 SetThreadContext 27030->27032 27033 1553759 SetThreadContext 27030->27033 27031 15529de 27032->27031 27033->27031 27065 15533e5 27034->27065 27069 15533f0 27034->27069 27039 155213f 27038->27039 27073 15538f0 27039->27073 27076 15538e8 27039->27076 27040 1552165 27044 155386b ReadProcessMemory 27043->27044 27045 15538ae 27044->27045 27045->27009 27047 155386b ReadProcessMemory 27046->27047 27048 15538ae 27047->27048 27048->27009 27050 15539e3 WriteProcessMemory 27049->27050 27052 1553a34 27050->27052 27052->27013 27055 15539e3 WriteProcessMemory 27053->27055 27056 1553a34 27055->27056 27056->27013 27058 15537a8 SetThreadContext 27057->27058 27060 15537e6 27058->27060 27060->27018 27062 15537a8 SetThreadContext 27061->27062 27064 15537e6 27062->27064 27064->27018 27066 15533f0 CreateProcessW 27065->27066 27068 1553558 27066->27068 27070 155346f CreateProcessW 27069->27070 27072 1553558 27070->27072 27074 1553933 VirtualAllocEx 27073->27074 27075 155396a 27074->27075 27075->27040 27077 1553933 VirtualAllocEx 27076->27077 27078 155396a 27077->27078 27078->27040 27094 31c65b8 27095 31c65e3 27094->27095 27118 31c4af8 27095->27118 27097 31c65ec 27098 31c4af8 3 API calls 27097->27098 27099 31c660e 27098->27099 27100 31c4af8 3 API calls 27099->27100 27101 31c6630 27100->27101 27102 31c4af8 3 API calls 27101->27102 27103 31c6652 27102->27103 27104 31c4af8 3 API calls 27103->27104 27105 31c6674 27104->27105 27106 31c4af8 3 API calls 27105->27106 27107 31c6696 27106->27107 27123 31c6120 27107->27123 27110 31c6120 3 API calls 27111 31c66da 27110->27111 27112 31c6120 3 API calls 27111->27112 27113 31c66fc 27112->27113 27114 31c6120 3 API calls 27113->27114 27115 31c671e 27114->27115 27116 31c4af8 3 API calls 27115->27116 27117 31c6850 27116->27117 27119 31c4b03 27118->27119 27127 1606c40 27119->27127 27134 16053bc 27119->27134 27120 31c891b 27120->27097 27124 31c612b 27123->27124 27268 31c62f4 27124->27268 27126 31c66b8 27126->27110 27128 1606c7b 27127->27128 27130 1606ede 27128->27130 27141 1609020 27128->27141 27145 31c90f8 27128->27145 27129 1606f1c 27129->27120 27130->27129 27149 160b151 27130->27149 27135 16053c7 27134->27135 27137 1606ede 27135->27137 27138 1609020 3 API calls 27135->27138 27139 31c90f8 3 API calls 27135->27139 27136 1606f1c 27136->27120 27137->27136 27140 160b151 3 API calls 27137->27140 27138->27137 27139->27137 27140->27136 27154 1609050 27141->27154 27158 160903f 27141->27158 27142 160902e 27142->27130 27147 1609137 2 API calls 27145->27147 27148 1609148 2 API calls 27145->27148 27146 31c9106 27146->27130 27147->27146 27148->27146 27151 160b158 27149->27151 27150 160b1a5 27150->27129 27151->27150 27188 160b408 27151->27188 27192 160b418 27151->27192 27163 1609137 27154->27163 27172 1609148 27154->27172 27155 160905f 27155->27142 27159 160904c 27158->27159 27160 160905f 27159->27160 27161 1609137 2 API calls 27159->27161 27162 1609148 2 API calls 27159->27162 27160->27142 27161->27160 27162->27160 27164 1609144 27163->27164 27165 160915b 27164->27165 27180 1606c34 27164->27180 27167 1609173 27165->27167 27184 16097c0 27165->27184 27167->27155 27168 160916b 27168->27167 27169 1609370 GetModuleHandleW 27168->27169 27170 160939d 27169->27170 27170->27155 27173 1606c34 GetModuleHandleW 27172->27173 27174 160915b 27173->27174 27175 1609173 27174->27175 27179 16097c0 GetModuleHandleW 27174->27179 27175->27155 27176 160916b 27176->27175 27177 1609370 GetModuleHandleW 27176->27177 27178 160939d 27177->27178 27178->27155 27179->27176 27181 1609328 GetModuleHandleW 27180->27181 27183 160939d 27181->27183 27183->27165 27185 16097cc 27184->27185 27186 1606c34 GetModuleHandleW 27185->27186 27187 16097e4 27186->27187 27187->27168 27189 160b40c 27188->27189 27190 160b45f 27189->27190 27196 16096d0 27189->27196 27190->27150 27194 160b419 27192->27194 27193 160b45f 27193->27150 27194->27193 27195 16096d0 3 API calls 27194->27195 27195->27193 27197 16096db 27196->27197 27199 160c158 27197->27199 27200 160bcf4 27197->27200 27201 160bcff 27200->27201 27202 16053bc 3 API calls 27201->27202 27203 160c1c7 27201->27203 27202->27203 27207 160df48 27203->27207 27216 160df39 27203->27216 27204 160c200 27204->27199 27209 160df79 27207->27209 27210 160e06b 27207->27210 27208 160df85 27208->27204 27209->27208 27224 160e280 27209->27224 27228 160e290 27209->27228 27210->27204 27211 160dfc6 27211->27210 27231 160ec48 27211->27231 27237 160ec58 27211->27237 27217 160df3c 27216->27217 27218 160df85 27217->27218 27222 160e280 2 API calls 27217->27222 27223 160e290 2 API calls 27217->27223 27218->27204 27219 160dfc6 27219->27218 27220 160ec48 GetModuleHandleW 27219->27220 27221 160ec58 GetModuleHandleW 27219->27221 27220->27218 27221->27218 27222->27219 27223->27219 27225 160e285 27224->27225 27226 1609148 2 API calls 27225->27226 27227 160e299 27226->27227 27227->27211 27229 1609148 2 API calls 27228->27229 27230 160e299 27228->27230 27229->27230 27230->27211 27232 160ec4c 27231->27232 27243 160f130 27232->27243 27233 160ed00 27234 1606c34 GetModuleHandleW 27233->27234 27235 160ed29 27233->27235 27234->27235 27238 160ec82 27237->27238 27242 160f130 GetModuleHandleW 27238->27242 27239 160ed00 27240 1606c34 GetModuleHandleW 27239->27240 27241 160ed29 27239->27241 27240->27241 27242->27239 27244 160f134 27243->27244 27244->27233 27245 160f10f 27244->27245 27248 160f2d0 27244->27248 27258 160f2c1 27244->27258 27245->27233 27249 160f2e5 27248->27249 27250 1606c34 GetModuleHandleW 27249->27250 27251 160f309 27249->27251 27250->27251 27252 1606c34 GetModuleHandleW 27251->27252 27254 160f4c5 27251->27254 27253 160f44b 27252->27253 27253->27254 27255 1606c34 GetModuleHandleW 27253->27255 27254->27245 27256 160f499 27255->27256 27256->27254 27257 1606c34 GetModuleHandleW 27256->27257 27257->27254 27259 160f2c4 27258->27259 27260 1606c34 GetModuleHandleW 27259->27260 27261 160f309 27259->27261 27260->27261 27262 1606c34 GetModuleHandleW 27261->27262 27267 160f4c5 27261->27267 27263 160f44b 27262->27263 27264 1606c34 GetModuleHandleW 27263->27264 27263->27267 27265 160f499 27264->27265 27266 1606c34 GetModuleHandleW 27265->27266 27265->27267 27266->27267 27267->27245 27269 31c62ff 27268->27269 27270 31c9912 27269->27270 27271 1606c40 3 API calls 27269->27271 27272 16053bc 3 API calls 27269->27272 27270->27126 27271->27270 27272->27270 27079 1553b50 27080 1553b91 ResumeThread 27079->27080 27081 1553bbe 27080->27081 27273 160b758 DuplicateHandle 27274 160b7ee 27273->27274 27275 1606518 27276 1606519 27275->27276 27279 160532c 27276->27279 27278 1606526 27280 1605337 27279->27280 27283 160535c 27280->27283 27282 16065fd 27282->27278 27284 1605367 27283->27284 27287 160538c 27284->27287 27286 16066da 27286->27282 27288 1605397 27287->27288 27289 16053bc 3 API calls 27288->27289 27290 16067ca 27289->27290 27290->27286 27291 124d01c 27292 124d034 27291->27292 27293 124d08e 27292->27293 27296 31c0bd8 27292->27296 27301 31c0be8 27292->27301 27297 31c0c15 27296->27297 27298 31c0c47 27297->27298 27306 31c0e3c 27297->27306 27312 31c0d70 27297->27312 27302 31c0c15 27301->27302 27303 31c0c47 27302->27303 27304 31c0e3c 2 API calls 27302->27304 27305 31c0d70 2 API calls 27302->27305 27304->27303 27305->27303 27307 31c0e4a 27306->27307 27308 31c0dfa 27306->27308 27317 31c0e28 27308->27317 27320 31c0e27 27308->27320 27309 31c0e10 27309->27298 27314 31c0d84 27312->27314 27313 31c0e10 27313->27298 27315 31c0e28 2 API calls 27314->27315 27316 31c0e27 2 API calls 27314->27316 27315->27313 27316->27313 27318 31c0e39 27317->27318 27323 31c22c0 27317->27323 27318->27309 27321 31c0e39 27320->27321 27322 31c22c0 2 API calls 27320->27322 27321->27309 27322->27321 27327 31c22eb 27323->27327 27331 31c22f0 27323->27331 27324 31c22da 27324->27318 27328 31c2332 27327->27328 27330 31c2339 27327->27330 27329 31c238a CallWindowProcW 27328->27329 27328->27330 27329->27330 27330->27324 27332 31c2332 27331->27332 27334 31c2339 27331->27334 27333 31c238a CallWindowProcW 27332->27333 27332->27334 27333->27334 27334->27324 27335 160fa58 27336 160fac0 CreateWindowExW 27335->27336 27338 160fb7c 27336->27338 27339 1554228 27340 15543b3 27339->27340 27341 155424e 27339->27341 27341->27340 27346 160fca0 SetWindowLongW 27341->27346 27348 160fc99 27341->27348 27352 15544a0 27341->27352 27356 15544a8 PostMessageW 27341->27356 27347 160fd0c 27346->27347 27347->27341 27349 160fc9c 27348->27349 27350 160fc9d SetWindowLongW 27348->27350 27349->27350 27351 160fd0c 27350->27351 27351->27341 27353 15544a7 PostMessageW 27352->27353 27354 1554435 27352->27354 27355 1554514 27353->27355 27354->27352 27355->27341 27357 1554514 27356->27357 27357->27341

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 31c65a9-31c65d9 1 31c65e3-31c65e7 call 31c4af8 0->1 3 31c65ec-31c65fb 1->3 5 31c6605-31c6609 call 31c4af8 3->5 7 31c660e-31c672d call 31c4af8 * 4 call 31c6120 * 4 5->7 41 31c6737-31c673b call 31c6130 7->41 43 31c6740-31c6771 call 31c6130 41->43 49 31c677b-31c677f call 31c6140 43->49 51 31c6784-31c681b call 31c6150 * 4 49->51 69 31c6825-31c6829 call 31c6160 51->69 71 31c682e-31c687f call 31c4af8 69->71 80 31c6888-31c6897 71->80 81 31c689d-31c68ad 80->81 83 31c68b7-31c68b9 81->83 84 31c68c4-31c68d9 call 31c6170 83->84 86 31c68de-31c68e5 84->86 87 31c68eb-31c68f9 86->87 88 31c6902-31c6927 call 31c6180 87->88 90 31c692c-31c6967 call 31c6190 88->90 95 31c6970-31c6995 call 31c61a8 90->95 97 31c699a-31c744f call 31c61b8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6180 95->97 266 31c7458-31c7467 97->266 267 31c7470-31c751b call 31c6190 call 31c61a8 call 31c61b8 266->267 278 31c7524-31c7533 267->278 279 31c7539-31c7918 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c61c8 call 31c61d8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c61c8 call 31c61d8 call 31c6170 278->279 344 31c7921-31c7930 call 31c61e8 279->344 346 31c7935-31c7939 344->346 347 31c7942-31c7951 346->347 348 31c795a-31c7a05 call 31c61f8 call 31c6208 347->348 364 31c7a0e-31c7a42 call 31c6180 348->364 366 31c7a47-31c8173 call 31c6190 call 31c61a8 call 31c61b8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c61d8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c61d8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c61d8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c61d8 364->366 477 31c817c-31c818b call 31c6218 366->477 479 31c8190-31c81a1 477->479 480 31c81aa-31c81de call 31c6180 479->480 482 31c81e3-31c821a call 31c6190 480->482 487 31c8223-31c8232 call 31c6228 482->487 489 31c8237-31c8273 call 31c6238 487->489 494 31c827c-31c82b0 call 31c61a8 489->494 496 31c82b5-31c835d call 31c61b8 call 31c6170 494->496 508 31c8366-31c839a call 31c6180 496->508 510 31c839f-31c850c call 31c6190 call 31c61a8 call 31c61b8 call 31c6248 call 31c6258 call 31c6268 call 31c6278 508->510 533 31c8515-31c8525 510->533 534 31c852b-31c862b call 31c6278 * 6 533->534 557 31c8634-31c8644 534->557 558 31c864a-31c8771 call 31c6278 * 7 557->558 585 31c877a-31c878a 558->585 586 31c8790-31c88b9 call 31c6278 * 5 call 31c6190 585->586 612 31c88c2-31c88da call 31c6288 586->612 617 31c88e5-31c88f3 612->617
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.340847239.00000000031C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031C0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_31c0000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $ $ $ $'$'$'$*$8$>$B$C$J$K$L$N$P$T$U$V$X$[$c$n$p$p$w$x$y
                                                                                          • API String ID: 0-2341653528
                                                                                          • Opcode ID: 132c604ff488d0063bb9373ece0af6126a85171e47d9c7f36a58159aeb45cc5c
                                                                                          • Instruction ID: a394dccf6d71f67d30b6a9e83f015e7ce8c0bc6e8696e99796d17fcea82c9b67
                                                                                          • Opcode Fuzzy Hash: 132c604ff488d0063bb9373ece0af6126a85171e47d9c7f36a58159aeb45cc5c
                                                                                          • Instruction Fuzzy Hash: DA33F034A606158FCB54EF38C858AACB7F6AF89701F1541E9E10AEB361DB71AD81CF41
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 619 31c65b8-31c88da call 31c4af8 * 6 call 31c6120 * 4 call 31c6130 * 2 call 31c6140 call 31c6150 * 4 call 31c6160 call 31c4af8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c61c8 call 31c61d8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c61c8 call 31c61d8 call 31c6170 call 31c61e8 call 31c61f8 call 31c6208 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c61d8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c61d8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c61d8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c61d8 call 31c6218 call 31c6180 call 31c6190 call 31c6228 call 31c6238 call 31c61a8 call 31c61b8 call 31c6170 call 31c6180 call 31c6190 call 31c61a8 call 31c61b8 call 31c6248 call 31c6258 call 31c6268 call 31c6278 * 19 call 31c6190 call 31c6288 1236 31c88e5-31c88f3 619->1236
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.340847239.00000000031C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031C0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_31c0000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $ $ $ $'$'$'$*$8$>$B$C$J$K$L$N$P$T$U$V$X$[$c$n$p$p$w$x$y
                                                                                          • API String ID: 0-2341653528
                                                                                          • Opcode ID: 87ad27cf744e0bc8384e821dfac67ded3f8393986a9e05e6f82fbfc8a4cecf3d
                                                                                          • Instruction ID: 3206606d7d6c18487fa6ae43e7e7e893cf9528e7486f04680af11b65783e18f5
                                                                                          • Opcode Fuzzy Hash: 87ad27cf744e0bc8384e821dfac67ded3f8393986a9e05e6f82fbfc8a4cecf3d
                                                                                          • Instruction Fuzzy Hash: 3F33F034A606158FCB54EF38C858AACB7F6AF89701F1541E9E10AEB361DB71AD81CF41
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1276 1553d9d-1553d9e 1277 1553da0 1276->1277 1278 1553d2d-1553d2e 1276->1278 1281 1553d26-1553d37 1277->1281 1282 1553da2-1553db2 1277->1282 1279 1553d30-1553d37 1278->1279 1280 1553d4a-1553d6d 1278->1280 1283 1553d3f-1553d45 1279->1283 1284 1553d74-1553d77 1280->1284 1285 1553d6f 1280->1285 1281->1283 1286 1553db4 1282->1286 1287 1553db9-1553e00 1282->1287 1290 1553d7e-1553d82 1284->1290 1285->1284 1286->1287 1289 1553e03 1287->1289 1292 1553e0a-1553e26 1289->1292 1293 1553e2f-1553e30 1292->1293 1294 1553e28 1292->1294 1295 1553eb5-1553eb6 1293->1295 1294->1289 1294->1293 1294->1295 1296 1553e55-1553e56 1294->1296 1297 1553f55-1553f68 1294->1297 1298 1553f97-1553f99 1294->1298 1299 1553e91-1553e9a 1294->1299 1300 1553fd3-1553fe6 1294->1300 1301 1554119-1554122 1294->1301 1302 1553f18-1553f22 1294->1302 1303 1553e5b 1294->1303 1304 155414d-155414e 1294->1304 1305 155408f-15540a2 1294->1305 1306 15540c8-15540dd 1294->1306 1307 1553e4a-1553e50 1294->1307 1308 1553e35-1553e48 1294->1308 1309 1554135-1554148 1294->1309 1310 1553eb7 1294->1310 1311 1553ff1 1294->1311 1312 1553f73-1553f92 1294->1312 1313 1553e7e-1553e8c 1294->1313 1314 1554078-155407d call 1550cc0 1294->1314 1315 1553fa4 1294->1315 1316 15540a7-15540c3 1294->1316 1317 1554023-155403a 1294->1317 1318 1554063-1554076 1294->1318 1319 15540e2-1554114 call 1550a98 call 1550ad8 1294->1319 1320 1553f6d-1553f6e 1294->1320 1321 1553ee9-1553f16 1294->1321 1322 1553fe8-1553fee 1294->1322 1295->1310 1296->1304 1328 1553ebe-1553eda 1297->1328 1331 1553ff0 1298->1331 1326 1553ea1-1553eb0 1299->1326 1327 1553e9c 1299->1327 1332 1553fab-1553fc7 1300->1332 1301->1299 1325 1554128-1554130 1301->1325 1329 1553f35-1553f3c 1302->1329 1330 1553f24-1553f33 1302->1330 1343 1553e61-1553e7c 1303->1343 1323 1553ff8-1554014 1305->1323 1306->1323 1307->1301 1308->1292 1309->1323 1310->1328 1311->1323 1312->1328 1313->1292 1349 1554082-155408a 1314->1349 1315->1332 1316->1323 1333 155404d-1554054 1317->1333 1334 155403c-155404b 1317->1334 1318->1323 1319->1323 1320->1317 1321->1328 1322->1331 1344 1554016 1323->1344 1345 155401d-155401e 1323->1345 1325->1323 1326->1292 1327->1326 1347 1553ee3-1553ee4 1328->1347 1348 1553edc 1328->1348 1338 1553f43-1553f50 1329->1338 1330->1338 1331->1311 1340 1553fd0-1553fd1 1332->1340 1341 1553fc9 1332->1341 1346 155405b-1554061 1333->1346 1334->1346 1338->1328 1340->1322 1341->1300 1341->1301 1341->1304 1341->1305 1341->1306 1341->1309 1341->1311 1341->1314 1341->1315 1341->1316 1341->1317 1341->1318 1341->1319 1341->1322 1341->1340 1343->1292 1344->1301 1344->1304 1344->1305 1344->1306 1344->1309 1344->1311 1344->1314 1344->1316 1344->1317 1344->1318 1344->1319 1344->1345 1345->1304 1346->1323 1347->1298 1348->1297 1348->1298 1348->1300 1348->1301 1348->1302 1348->1304 1348->1305 1348->1306 1348->1309 1348->1310 1348->1311 1348->1312 1348->1314 1348->1315 1348->1316 1348->1317 1348->1318 1348->1319 1348->1320 1348->1321 1348->1322 1348->1347 1349->1323
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ?^y+$xol
                                                                                          • API String ID: 0-3609532666
                                                                                          • Opcode ID: 27a63b2312e1588317d773aca8e2e8d8122e7f332a0f85786a8b1a02d62ea382
                                                                                          • Instruction ID: 65e6d8e87f56e1f7ec8d864aa15f901397dcf6715ce82490d4ea7bc5b49c113e
                                                                                          • Opcode Fuzzy Hash: 27a63b2312e1588317d773aca8e2e8d8122e7f332a0f85786a8b1a02d62ea382
                                                                                          • Instruction Fuzzy Hash: 4DC16A74E19209DFCB84CFE5E5906ADFBF2BF89380F24942AD819AB254D7389945CF10
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: L)/4
                                                                                          • API String ID: 0-4105341230
                                                                                          • Opcode ID: 938ee4f496b69cd7cebc5542d2fc4498e25115b7b28bc55cd88f39097ecafd6a
                                                                                          • Instruction ID: 4793a8a511fc89ab26bc432d769a214f59f0a76576c61f8d2aac4f6e9645f2c4
                                                                                          • Opcode Fuzzy Hash: 938ee4f496b69cd7cebc5542d2fc4498e25115b7b28bc55cd88f39097ecafd6a
                                                                                          • Instruction Fuzzy Hash: D7710474E10209DFCB14DFA5D9955AEBBB2FF89301F20842AE815AB394DB746902CF50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: L)/4
                                                                                          • API String ID: 0-4105341230
                                                                                          • Opcode ID: 8175857e184fd451cb9fdfb11783725fa708a1dd7ea0cf541a5568a418453e88
                                                                                          • Instruction ID: e77e54404f501e8908af3a1d4847abf952597e5f72e378e6777dee04c177c55c
                                                                                          • Opcode Fuzzy Hash: 8175857e184fd451cb9fdfb11783725fa708a1dd7ea0cf541a5568a418453e88
                                                                                          • Instruction Fuzzy Hash: 46710474E11209DFCB44DFE5D9955AEBBB2FF89301F20842AE815AB354DB746902CF50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: ?^y+
                                                                                          • API String ID: 0-3178172334
                                                                                          • Opcode ID: e2273a9a043d4382b907d4e69dad7cabc8fe159a2317bb43f779f9e0701f301d
                                                                                          • Instruction ID: a34e3582c2c813c5b02f8dc3f527142db39052a57faeb69550ad2506a8139f38
                                                                                          • Opcode Fuzzy Hash: e2273a9a043d4382b907d4e69dad7cabc8fe159a2317bb43f779f9e0701f301d
                                                                                          • Instruction Fuzzy Hash: A9412C74E15249DFCB84CFE4D59119DFBF2BF89350F20981AD81ABF258D33899858B14
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 49fdb0873c904112cbeb741b7e0233bbebf3c2ff6a7061a51d7d0b71ee58889d
                                                                                          • Instruction ID: 627060639739eb4bd2d50840cc9a95e0b3aa37a9defac583efa09c79bf006fb0
                                                                                          • Opcode Fuzzy Hash: 49fdb0873c904112cbeb741b7e0233bbebf3c2ff6a7061a51d7d0b71ee58889d
                                                                                          • Instruction Fuzzy Hash: 7B614870E06618DFDB44CFA9D6947EDBFF2BB89350F24942AE406BB218D73499418B14
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6c4b41c2c11bdedcbb30d79b5ed789b852834429b8739c31a451a0b4ac172030
                                                                                          • Instruction ID: 353ceee0fc5b3367fb3a8175da06bad1b771235184dd398af923ca5ae45d7465
                                                                                          • Opcode Fuzzy Hash: 6c4b41c2c11bdedcbb30d79b5ed789b852834429b8739c31a451a0b4ac172030
                                                                                          • Instruction Fuzzy Hash: 36515974E066189FCB44CFA9D5D47EDBFF2BB89350F24942AE806BB218D73499418B14
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1238 160b528-160b5a1 GetCurrentProcess 1239 160b5a3-160b5a9 1238->1239 1240 160b5aa-160b5de GetCurrentThread 1238->1240 1239->1240 1241 160b5e0-160b5e6 1240->1241 1242 160b5e7-160b61b GetCurrentProcess 1240->1242 1241->1242 1244 160b624-160b63f call 160b6e0 1242->1244 1245 160b61d-160b623 1242->1245 1248 160b645-160b674 GetCurrentThreadId 1244->1248 1245->1244 1249 160b676-160b67c 1248->1249 1250 160b67d-160b6df 1248->1250 1249->1250
                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32 ref: 0160B590
                                                                                          • GetCurrentThread.KERNEL32 ref: 0160B5CD
                                                                                          • GetCurrentProcess.KERNEL32 ref: 0160B60A
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 0160B663
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339982500.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1600000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: Current$ProcessThread
                                                                                          • String ID:
                                                                                          • API String ID: 2063062207-0
                                                                                          • Opcode ID: ce6a4540afe578496cb63e8ad3e1ba46f069a4e45030afa926894bc97905b955
                                                                                          • Instruction ID: e5118a26287aa9f2267bc6d67798aac75287d4b9542ef8b63fd5857bf827d11a
                                                                                          • Opcode Fuzzy Hash: ce6a4540afe578496cb63e8ad3e1ba46f069a4e45030afa926894bc97905b955
                                                                                          • Instruction Fuzzy Hash: 5D5156B49042488FEB14CFA9D948BEEBBF0BF88314F248559E019A7390C7745944CF65
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1257 160b530-160b5a1 GetCurrentProcess 1258 160b5a3-160b5a9 1257->1258 1259 160b5aa-160b5de GetCurrentThread 1257->1259 1258->1259 1260 160b5e0-160b5e6 1259->1260 1261 160b5e7-160b61b GetCurrentProcess 1259->1261 1260->1261 1263 160b624-160b63f call 160b6e0 1261->1263 1264 160b61d-160b623 1261->1264 1267 160b645-160b674 GetCurrentThreadId 1263->1267 1264->1263 1268 160b676-160b67c 1267->1268 1269 160b67d-160b6df 1267->1269 1268->1269
                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32 ref: 0160B590
                                                                                          • GetCurrentThread.KERNEL32 ref: 0160B5CD
                                                                                          • GetCurrentProcess.KERNEL32 ref: 0160B60A
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 0160B663
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339982500.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1600000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: Current$ProcessThread
                                                                                          • String ID:
                                                                                          • API String ID: 2063062207-0
                                                                                          • Opcode ID: 052790db7be31c41f77f5c8b42036eb6dfc8aa0b59f4a4edb429cca19e02a792
                                                                                          • Instruction ID: e8cdde72fa23debc94976a65fc37af001509a9cc992e82382b28eeacaa8b51f4
                                                                                          • Opcode Fuzzy Hash: 052790db7be31c41f77f5c8b42036eb6dfc8aa0b59f4a4edb429cca19e02a792
                                                                                          • Instruction Fuzzy Hash: 4D5156B49042488FEB18CFA9D948B9EBBF0EF48314F248559E419A7390C774A844CF65
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1417 1609148-160915d call 1606c34 1420 1609173-1609177 1417->1420 1421 160915f-160916d call 16097c0 1417->1421 1422 1609179-1609183 1420->1422 1423 160918b-16091cc 1420->1423 1421->1420 1425 16092a8-1609368 1421->1425 1422->1423 1428 16091d9-16091e7 1423->1428 1429 16091ce-16091d6 1423->1429 1465 1609370-160939b GetModuleHandleW 1425->1465 1466 160936a-160936d 1425->1466 1431 16091e9-16091ee 1428->1431 1432 160920b-160920d 1428->1432 1429->1428 1434 16091f0-16091f7 call 16084ec 1431->1434 1435 16091f9 1431->1435 1433 1609210-1609217 1432->1433 1437 1609224-160922b 1433->1437 1438 1609219-1609221 1433->1438 1436 16091fb-1609209 1434->1436 1435->1436 1436->1433 1441 1609238-1609241 call 16084fc 1437->1441 1442 160922d-1609235 1437->1442 1438->1437 1447 1609243-160924b 1441->1447 1448 160924e-1609253 1441->1448 1442->1441 1447->1448 1450 1609271-1609275 1448->1450 1451 1609255-160925c 1448->1451 1470 1609278 call 1609ac8 1450->1470 1471 1609278 call 1609ab9 1450->1471 1451->1450 1453 160925e-160926e call 160850c call 160851c 1451->1453 1453->1450 1454 160927b-160927e 1457 1609280-160929e 1454->1457 1458 16092a1-16092a7 1454->1458 1457->1458 1467 16093a4-16093b8 1465->1467 1468 160939d-16093a3 1465->1468 1466->1465 1468->1467 1470->1454 1471->1454
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339982500.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1600000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule
                                                                                          • String ID:
                                                                                          • API String ID: 4139908857-0
                                                                                          • Opcode ID: f335222c4d7913be41756fdc32a22a6d8fe503ffc0df4bbe7cd775102a17ff9c
                                                                                          • Instruction ID: 2de766e7a2b1167b1dfe6a08ff0db211f0912f054b62f1a8372e51b7b949459f
                                                                                          • Opcode Fuzzy Hash: f335222c4d7913be41756fdc32a22a6d8fe503ffc0df4bbe7cd775102a17ff9c
                                                                                          • Instruction Fuzzy Hash: BC711470A10B058FDB29DF29D44475BBBF2BF88304F00892DD48ADBA91D775E8458F91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1473 15533e5-155347b 1476 1553486-155348d 1473->1476 1477 155347d-1553483 1473->1477 1478 155348f-1553495 1476->1478 1479 1553498-15534ae 1476->1479 1477->1476 1478->1479 1480 15534b0-15534b6 1479->1480 1481 15534b9-1553556 CreateProcessW 1479->1481 1480->1481 1483 155355f-15535d3 1481->1483 1484 1553558-155355e 1481->1484 1492 15535e5-15535ec 1483->1492 1493 15535d5-15535db 1483->1493 1484->1483 1494 1553603 1492->1494 1495 15535ee-15535fd 1492->1495 1493->1492 1497 1553604 1494->1497 1495->1494 1497->1497
                                                                                          APIs
                                                                                          • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 01553543
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateProcess
                                                                                          • String ID:
                                                                                          • API String ID: 963392458-0
                                                                                          • Opcode ID: 36390587f224875eb4cb0fe4dd5a73f0c67c9fd4c2e92ce6e85534e961a366ca
                                                                                          • Instruction ID: 00790816d2a3edeb37c045d8843b824e5a76550a6361f94b64e7e3ba57b2da60
                                                                                          • Opcode Fuzzy Hash: 36390587f224875eb4cb0fe4dd5a73f0c67c9fd4c2e92ce6e85534e961a366ca
                                                                                          • Instruction Fuzzy Hash: 44511871905319DFDB60CF99C884BDDBBB1BF88304F15849AE90CA7250DB759A88CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1498 15533f0-155347b 1500 1553486-155348d 1498->1500 1501 155347d-1553483 1498->1501 1502 155348f-1553495 1500->1502 1503 1553498-15534ae 1500->1503 1501->1500 1502->1503 1504 15534b0-15534b6 1503->1504 1505 15534b9-1553556 CreateProcessW 1503->1505 1504->1505 1507 155355f-15535d3 1505->1507 1508 1553558-155355e 1505->1508 1516 15535e5-15535ec 1507->1516 1517 15535d5-15535db 1507->1517 1508->1507 1518 1553603 1516->1518 1519 15535ee-15535fd 1516->1519 1517->1516 1521 1553604 1518->1521 1519->1518 1521->1521
                                                                                          APIs
                                                                                          • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 01553543
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateProcess
                                                                                          • String ID:
                                                                                          • API String ID: 963392458-0
                                                                                          • Opcode ID: 1e930aa0fa88ba01475cc26d4ef526b5fca859ff0f6e4f60ae9a4c77965ddc14
                                                                                          • Instruction ID: 48568bb0d49da3e785e83ab20f527ab4ddc4ab8113f0ae3443bb88f9e91143f0
                                                                                          • Opcode Fuzzy Hash: 1e930aa0fa88ba01475cc26d4ef526b5fca859ff0f6e4f60ae9a4c77965ddc14
                                                                                          • Instruction Fuzzy Hash: A2511871905318DFDB60CF99C884BDDBBB1BF88304F15849AE90CA7250DB759A88CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1522 160fa4d-160fa4e 1523 160fa50 1522->1523 1524 160fa51-160fa52 1522->1524 1523->1524 1525 160fa53-160fa54 1524->1525 1526 160fa55-160fabe 1524->1526 1525->1526 1527 160fac0-160fac6 1526->1527 1528 160fac9-160fad0 1526->1528 1527->1528 1529 160fad2-160fad8 1528->1529 1530 160fadb-160fb13 1528->1530 1529->1530 1531 160fb1b-160fb7a CreateWindowExW 1530->1531 1532 160fb83-160fbbb 1531->1532 1533 160fb7c-160fb82 1531->1533 1537 160fbc8 1532->1537 1538 160fbbd-160fbc0 1532->1538 1533->1532 1539 160fbc9 1537->1539 1538->1537 1539->1539
                                                                                          APIs
                                                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0160FB6A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339982500.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1600000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateWindow
                                                                                          • String ID:
                                                                                          • API String ID: 716092398-0
                                                                                          • Opcode ID: 2f079bd2112ddae014940ead51f03c930d756970bfc525363356e096b3137b28
                                                                                          • Instruction ID: cb42d1292f328cbd2d4ed4feabe5d59f2df775d11d4293a7e6ca8ab5830fb4cf
                                                                                          • Opcode Fuzzy Hash: 2f079bd2112ddae014940ead51f03c930d756970bfc525363356e096b3137b28
                                                                                          • Instruction Fuzzy Hash: 4451B2B1D00309DFDF15CFA9C884ADEBBB5BF88314F24856AE819AB250D7749985CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1540 160fa58-160fabe 1541 160fac0-160fac6 1540->1541 1542 160fac9-160fad0 1540->1542 1541->1542 1543 160fad2-160fad8 1542->1543 1544 160fadb-160fb7a CreateWindowExW 1542->1544 1543->1544 1546 160fb83-160fbbb 1544->1546 1547 160fb7c-160fb82 1544->1547 1551 160fbc8 1546->1551 1552 160fbbd-160fbc0 1546->1552 1547->1546 1553 160fbc9 1551->1553 1552->1551 1553->1553
                                                                                          APIs
                                                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0160FB6A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339982500.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1600000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateWindow
                                                                                          • String ID:
                                                                                          • API String ID: 716092398-0
                                                                                          • Opcode ID: 53b7997d428145afb387ee357d03f7aeb8d8907034bc6ca4c5e45f7c4cdfba57
                                                                                          • Instruction ID: bd6223c592d5dc78158bed1f87746328377db1feeccd34db456cc1c73a7f53f0
                                                                                          • Opcode Fuzzy Hash: 53b7997d428145afb387ee357d03f7aeb8d8907034bc6ca4c5e45f7c4cdfba57
                                                                                          • Instruction Fuzzy Hash: E841AFB1D00309DFDB15CF9AC884ADEBBB5BF88314F24852AE819AB250D7749885CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1554 31c22f0-31c232c 1555 31c23dc-31c23fc 1554->1555 1556 31c2332-31c2337 1554->1556 1562 31c23ff-31c240c 1555->1562 1557 31c2339-31c2370 1556->1557 1558 31c238a-31c23c2 CallWindowProcW 1556->1558 1565 31c2379-31c2388 1557->1565 1566 31c2372-31c2378 1557->1566 1560 31c23cb-31c23da 1558->1560 1561 31c23c4-31c23ca 1558->1561 1560->1562 1561->1560 1565->1562 1566->1565
                                                                                          APIs
                                                                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 031C23B1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.340847239.00000000031C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031C0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_31c0000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: CallProcWindow
                                                                                          • String ID:
                                                                                          • API String ID: 2714655100-0
                                                                                          • Opcode ID: b54defac7402253daee71326ef5ed8f95cdf7dae5753b6a075757914f3175f15
                                                                                          • Instruction ID: 3c27f8eede5f6343167aec9453a9a2d0c6d127ffead48b29c5002980e9c2ed8d
                                                                                          • Opcode Fuzzy Hash: b54defac7402253daee71326ef5ed8f95cdf7dae5753b6a075757914f3175f15
                                                                                          • Instruction Fuzzy Hash: 114117B4914345CFDB14CF99C848AAABBF5FB9C314F15895DD419AB321D374A841CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0160B7DF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339982500.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1600000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: DuplicateHandle
                                                                                          • String ID:
                                                                                          • API String ID: 3793708945-0
                                                                                          • Opcode ID: 78c2006b2ad4f71bcb0816007cbfabcbb6c1fd2900e3c65cd1a5b90df27cc2e5
                                                                                          • Instruction ID: 014623bb29fe662184f858d56ed6fae5eb0d090bf4a6a0a6f680a25ff522506c
                                                                                          • Opcode Fuzzy Hash: 78c2006b2ad4f71bcb0816007cbfabcbb6c1fd2900e3c65cd1a5b90df27cc2e5
                                                                                          • Instruction Fuzzy Hash: D121F2B59012089FDB10CFA9D884AEEBBF4EF48324F14851AE954A3350D378A945CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 01553A25
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: MemoryProcessWrite
                                                                                          • String ID:
                                                                                          • API String ID: 3559483778-0
                                                                                          • Opcode ID: f2eb587e4269e079124fddca3d9c981cb93770ad3ca94fa8bc5ea57eed7baa6f
                                                                                          • Instruction ID: 4b2160f20135f296cc133b775da40ca1d015cbcb66378618fcdb318ed12de864
                                                                                          • Opcode Fuzzy Hash: f2eb587e4269e079124fddca3d9c981cb93770ad3ca94fa8bc5ea57eed7baa6f
                                                                                          • Instruction Fuzzy Hash: 232103B5900259DFDB50CF9AD985BDEBBF4FB48354F00852AE958A7240D378A940CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 01553A25
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: MemoryProcessWrite
                                                                                          • String ID:
                                                                                          • API String ID: 3559483778-0
                                                                                          • Opcode ID: 4827713454d5ea8b751b9edf94313620d5ae6f1d6ea938497a59037f427b27dd
                                                                                          • Instruction ID: eef7a2066b665433d29d5717a85cd12ad232e5fc79aa1d1debed80e2959f381f
                                                                                          • Opcode Fuzzy Hash: 4827713454d5ea8b751b9edf94313620d5ae6f1d6ea938497a59037f427b27dd
                                                                                          • Instruction Fuzzy Hash: E821E4B1900259DFDB50CF9AD885BDEBBF4FB48314F00852AE958A7240D778A944CBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0160B7DF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339982500.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1600000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: DuplicateHandle
                                                                                          • String ID:
                                                                                          • API String ID: 3793708945-0
                                                                                          • Opcode ID: 52807b0b9b4a6e1371c2fcf1062bd1cf78750bfbd1e19ce06c9d61089a823270
                                                                                          • Instruction ID: 6ecacb087037ffb3265c25fef73dd8607d9eebbb749c91942b19d253f1fcfa49
                                                                                          • Opcode Fuzzy Hash: 52807b0b9b4a6e1371c2fcf1062bd1cf78750bfbd1e19ce06c9d61089a823270
                                                                                          • Instruction Fuzzy Hash: 0521F5B5D00209DFDB10CF9AD884AEEBBF4FB48324F14801AE914A3350D374A944CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0155389F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: MemoryProcessRead
                                                                                          • String ID:
                                                                                          • API String ID: 1726664587-0
                                                                                          • Opcode ID: 7d5c65b2b1f152977943c9e1da710f899e2d9fc65a4c9d3963951dac9ab8a079
                                                                                          • Instruction ID: 3b7b1ddc235786d022f603a7d21488ff99f299ec8bc47c654b002eb4b82ca3ad
                                                                                          • Opcode Fuzzy Hash: 7d5c65b2b1f152977943c9e1da710f899e2d9fc65a4c9d3963951dac9ab8a079
                                                                                          • Instruction Fuzzy Hash: 732102B6D01219DFDB10CF9AC984BDEBBF4FB48320F04842AE958A7240D378A544CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0155389F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: MemoryProcessRead
                                                                                          • String ID:
                                                                                          • API String ID: 1726664587-0
                                                                                          • Opcode ID: 7ad08e7f84c24f3c1c5bc93f1984b867f1097f2facaf3a219a2d41a99b88eb1d
                                                                                          • Instruction ID: d8e182ee71f41df0a47eea29a38e9a3fdf7b1a467a5ba78b59965afaaef85227
                                                                                          • Opcode Fuzzy Hash: 7ad08e7f84c24f3c1c5bc93f1984b867f1097f2facaf3a219a2d41a99b88eb1d
                                                                                          • Instruction Fuzzy Hash: A621E2B5905259DFDB10CF9AD884BDEBBF4FB48320F14842AE958A7250D378A544CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • SetThreadContext.KERNELBASE(?,00000000), ref: 015537D7
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: ContextThread
                                                                                          • String ID:
                                                                                          • API String ID: 1591575202-0
                                                                                          • Opcode ID: 7cf9a872b3e35389ca86cbbb742f5a134973dadb884d921a5f9fdd5e9cf7dd15
                                                                                          • Instruction ID: c2b40f1e3550074ba2db04aac53ab325c7d3a839f486f0b8b5d0cd4fe342546b
                                                                                          • Opcode Fuzzy Hash: 7cf9a872b3e35389ca86cbbb742f5a134973dadb884d921a5f9fdd5e9cf7dd15
                                                                                          • Instruction Fuzzy Hash: B42133B5D102199FDB40CF9AC9857EEFBF4BB48224F05812AD818B7740D378AA448FA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • SetThreadContext.KERNELBASE(?,00000000), ref: 015537D7
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: ContextThread
                                                                                          • String ID:
                                                                                          • API String ID: 1591575202-0
                                                                                          • Opcode ID: c511ca6b1a39439f1bfbc4eb5135bc3d6d0c0d5b8bea38947feed66b87949607
                                                                                          • Instruction ID: 4bb65966045292a0c718b81c8d0b7217cb3d57e5bb9183afe7a32f9c61b95775
                                                                                          • Opcode Fuzzy Hash: c511ca6b1a39439f1bfbc4eb5135bc3d6d0c0d5b8bea38947feed66b87949607
                                                                                          • Instruction Fuzzy Hash: 832106B1D142199FDB50CF9AC985BEEFBF4BB48324F44812AD818B7740D778A9448FA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 01609A1A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339982500.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1600000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID:
                                                                                          • API String ID: 1029625771-0
                                                                                          • Opcode ID: 8e6a76caa5772f867d45c07d6dd3688ac5e2e9607c27f836a431d0253e6fc226
                                                                                          • Instruction ID: f5241e7ad7745d0eda9a0ce1f59af255b2de8cf7d4ee8413aadb5f869ad97df0
                                                                                          • Opcode Fuzzy Hash: 8e6a76caa5772f867d45c07d6dd3688ac5e2e9607c27f836a431d0253e6fc226
                                                                                          • Instruction Fuzzy Hash: E92138B18042498FDB10CF9AC884BDEFBF5EB88314F14811ED419A7600C374A546CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 01609A1A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339982500.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1600000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID:
                                                                                          • API String ID: 1029625771-0
                                                                                          • Opcode ID: 9c646e78d5b2e08cdc468161f1f797ad1bb3233dafae1555bfc79e48241c7354
                                                                                          • Instruction ID: 53b8745916206b35b35ddaaf6d195ad8f864e22937256cf5242b4d5f30207e3d
                                                                                          • Opcode Fuzzy Hash: 9c646e78d5b2e08cdc468161f1f797ad1bb3233dafae1555bfc79e48241c7354
                                                                                          • Instruction Fuzzy Hash: 561123B6C042498FDB14CF9AC848BDEFBF5AB88324F04842AE919A7340C374A545CFA5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,0160915B), ref: 0160938E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339982500.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1600000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule
                                                                                          • String ID:
                                                                                          • API String ID: 4139908857-0
                                                                                          • Opcode ID: b99b24f903009702b5ebf0f0bcacc6f02237ad3a9315cf2dae03f988243cf295
                                                                                          • Instruction ID: 70949292b2124d7b1a2e43d4ce20442c2a0687a1577a84e57d0fb86894017d1f
                                                                                          • Opcode Fuzzy Hash: b99b24f903009702b5ebf0f0bcacc6f02237ad3a9315cf2dae03f988243cf295
                                                                                          • Instruction Fuzzy Hash: 3511E2B58042498BDB18CF9AD848B9FFBF5EB88324F14841AD419A7240C374A545CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • SetWindowLongW.USER32(?,?,?), ref: 0160FCFD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339982500.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1600000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: LongWindow
                                                                                          • String ID:
                                                                                          • API String ID: 1378638983-0
                                                                                          • Opcode ID: 69b5dcb2e4ed609473a7a1e2221ac7b33958a27fa3f094b2f3f4b64639df73cf
                                                                                          • Instruction ID: 7f1202b404b4512a6ddbe344f4111bf397f4427ee831b19c6409d17fe261e2b6
                                                                                          • Opcode Fuzzy Hash: 69b5dcb2e4ed609473a7a1e2221ac7b33958a27fa3f094b2f3f4b64639df73cf
                                                                                          • Instruction Fuzzy Hash: 451158B5804248CFDB20CF99D888BEFBBF4EB88324F108559D854A7340C374A941CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0155395B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 4275171209-0
                                                                                          • Opcode ID: ac19050d1876f0cfacd62af1cf1edad7ab6ca00d7f77f40ac3b11e345afbc8e0
                                                                                          • Instruction ID: bfe72f4afa3f84c2d461525326153ff4b4671c2ee70aac9eaec297b881888a74
                                                                                          • Opcode Fuzzy Hash: ac19050d1876f0cfacd62af1cf1edad7ab6ca00d7f77f40ac3b11e345afbc8e0
                                                                                          • Instruction Fuzzy Hash: 9F1113B6804259DFDB10CF99C988BDEBBF4FB48324F14841AE928A7650C375A940CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0155395B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 4275171209-0
                                                                                          • Opcode ID: 4198e5e448a9e258f18c8e8073f630b2ab4b44d4021884c7195e809c67d9346b
                                                                                          • Instruction ID: a9ab385ea39741ca85d87b77a854b195d01692658261cc699dde17d16d56ff43
                                                                                          • Opcode Fuzzy Hash: 4198e5e448a9e258f18c8e8073f630b2ab4b44d4021884c7195e809c67d9346b
                                                                                          • Instruction Fuzzy Hash: 1B11F5B5904249DFDB10CF9AD888BDEBFF4FB88324F14841AE969A7250C375A544CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • PostMessageW.USER32(?,?,?,?), ref: 01554505
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessagePost
                                                                                          • String ID:
                                                                                          • API String ID: 410705778-0
                                                                                          • Opcode ID: 10de37fd41a2409dbfc97b32240890a639fa4a5d7276a60a49426045f5fb1039
                                                                                          • Instruction ID: ce4b897fba5ff951e680d3d4b6cf0997e8a2a0b1ef970f3c29eb9dea3ddb9ab0
                                                                                          • Opcode Fuzzy Hash: 10de37fd41a2409dbfc97b32240890a639fa4a5d7276a60a49426045f5fb1039
                                                                                          • Instruction Fuzzy Hash: 5111F8B5800249CFDB10DF99C989BEEBBF4FB48324F14841AD954A7640E374A584CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • SetWindowLongW.USER32(?,?,?), ref: 0160FCFD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339982500.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1600000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: LongWindow
                                                                                          • String ID:
                                                                                          • API String ID: 1378638983-0
                                                                                          • Opcode ID: 4289ef16d8ef52e8d1ee3fd26fe14705136bf219f5d911514105ec23c2654c69
                                                                                          • Instruction ID: 2d40a0b8fd969c7591d2c202bc0c2cd1b63175bbb7bff1425d986abe4372c684
                                                                                          • Opcode Fuzzy Hash: 4289ef16d8ef52e8d1ee3fd26fe14705136bf219f5d911514105ec23c2654c69
                                                                                          • Instruction Fuzzy Hash: 4C1103B58002499FDB20CF99D888BDFBBF8EB48324F10851AD914A7340C374A944CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: ResumeThread
                                                                                          • String ID:
                                                                                          • API String ID: 947044025-0
                                                                                          • Opcode ID: faa8685abf2eb4fea2761394ca28b40999de5815b0d373423e5e538c29139716
                                                                                          • Instruction ID: d735ba4ee7f41ea8ddebe4682b1d580758caea8e9f21dab86ea9418ef18418d6
                                                                                          • Opcode Fuzzy Hash: faa8685abf2eb4fea2761394ca28b40999de5815b0d373423e5e538c29139716
                                                                                          • Instruction Fuzzy Hash: BA1100B58042098FDB60CF9AD989BDEBBF4BB48324F14881AD958A7240D374A944CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • PostMessageW.USER32(?,?,?,?), ref: 01554505
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessagePost
                                                                                          • String ID:
                                                                                          • API String ID: 410705778-0
                                                                                          • Opcode ID: 2021eacf1992fe9c1951f0b2a2445e3b3e98a49884c66337a4046ceb3ded0eb3
                                                                                          • Instruction ID: 33b73e22d24df30d39d8d897a15675d40105efddc04e1c182ae866b7e7624df0
                                                                                          • Opcode Fuzzy Hash: 2021eacf1992fe9c1951f0b2a2445e3b3e98a49884c66337a4046ceb3ded0eb3
                                                                                          • Instruction Fuzzy Hash: 0911E5B5804349DFDB10CF99D888BDEBBF8FB48324F14841AD958A7600D374A584CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID: ResumeThread
                                                                                          • String ID:
                                                                                          • API String ID: 947044025-0
                                                                                          • Opcode ID: 0e47cf2592a6ad37196582125295fdf2e0ce7d721b973cb472ab238239565b0d
                                                                                          • Instruction ID: a6a0232ce73c77babec135bf8f75809d67cedc2b1e68afbaf572b81789a64c75
                                                                                          • Opcode Fuzzy Hash: 0e47cf2592a6ad37196582125295fdf2e0ce7d721b973cb472ab238239565b0d
                                                                                          • Instruction Fuzzy Hash: 781112B18042498FDB60CF9AD888BDEBBF4FB48324F10841AD958A7240C774A944CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339155852.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_123d000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ae7afd81be35e191ca0a199127bb20ab81161ced476aed6431e7d29d9647407b
                                                                                          • Instruction ID: 204a43b1dfc3401d92e48054ab6438971458fabe9e924e4258ff590cc940ee70
                                                                                          • Opcode Fuzzy Hash: ae7afd81be35e191ca0a199127bb20ab81161ced476aed6431e7d29d9647407b
                                                                                          • Instruction Fuzzy Hash: 632148F1518245DFDB01CF88E8C0B26BF65FBC8328F608568EA094B247C336D805C7A1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339187507.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_124d000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0efaf7d87cbad3a65b08307d8d356079211858e663f7b75d51ce50de49119ef8
                                                                                          • Instruction ID: 8c7d83c68e22fe0ed062f71888bc8a5fa315ac7d93f57731fc2b4939c2bf2a9c
                                                                                          • Opcode Fuzzy Hash: 0efaf7d87cbad3a65b08307d8d356079211858e663f7b75d51ce50de49119ef8
                                                                                          • Instruction Fuzzy Hash: D1216E71518204DFDB09CF94C9C0B25BBA1FB98724F20C96DE9094B343C376D806CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339187507.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_124d000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e840db0f9b03982363ed3b6bc53828f8cedfef7440286270398e11b6e1a59480
                                                                                          • Instruction ID: 8faf9989e3fbaf88afa7a8ade62e9f5308ff081fdffc2dbacc41ee05a43c2437
                                                                                          • Opcode Fuzzy Hash: e840db0f9b03982363ed3b6bc53828f8cedfef7440286270398e11b6e1a59480
                                                                                          • Instruction Fuzzy Hash: 83213771518248DFDB19CF94D8C4B26BB61FB98754F20C96DD9094B346C377D807CA61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339187507.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_124d000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d2be6af8e78911ef4f05817b2aa34286044ebf7da615301eec9dc59f7f855057
                                                                                          • Instruction ID: 26848af3f2a14628d6fb87b21c529f52d5579a5c65f6d033adadb997ac86aa38
                                                                                          • Opcode Fuzzy Hash: d2be6af8e78911ef4f05817b2aa34286044ebf7da615301eec9dc59f7f855057
                                                                                          • Instruction Fuzzy Hash: 46218E754083849FDB06CF64D994B11BF71EB46314F28C5EAD9498B2A7C33A984ACB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339155852.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_123d000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f3cb3e44370515572fb733351235636ff71e6e31c7d1222fc57b3ac88bc4a795
                                                                                          • Instruction ID: f2e1afa7d9a3ad1eec3eb180f9c6654fa5da9741782c85716978f3772be350b0
                                                                                          • Opcode Fuzzy Hash: f3cb3e44370515572fb733351235636ff71e6e31c7d1222fc57b3ac88bc4a795
                                                                                          • Instruction Fuzzy Hash: A111E1B2804284CFDF12CF48D9C4B16BF72FB84324F2486A9D9050B257C336D45ACBA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339187507.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_124d000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 363af4797271886f9a9a785279a90f4a175c74c994b233d3b912b101d7110f26
                                                                                          • Instruction ID: d2379380a12aa4d1ba83dde6971012cbf818b647821076f8e327c71e9111d67e
                                                                                          • Opcode Fuzzy Hash: 363af4797271886f9a9a785279a90f4a175c74c994b233d3b912b101d7110f26
                                                                                          • Instruction Fuzzy Hash: 5211BB75904284DFDB06CF54C5C4B15BBB1FB84224F28C6A9D9494B657C33AD44ACB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339155852.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_123d000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b96d1cee188900ba73ffa6616c9bc8564556cad23ad9a86373bdfb8eec162e93
                                                                                          • Instruction ID: ce9f55fa0d5523eebf2c3ff65b9cecb4a2cdf9fba37df9ff7c3ae40af7ec5df4
                                                                                          • Opcode Fuzzy Hash: b96d1cee188900ba73ffa6616c9bc8564556cad23ad9a86373bdfb8eec162e93
                                                                                          • Instruction Fuzzy Hash: 2301F7B141C3C89AEB164E6ACC84B66BB98EF85268F48851AEF084B246C3789440C6B1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339155852.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_123d000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b822a4d238980843d44ccf4e9a8dcce2874150234a954bdcd619f19fedf20506
                                                                                          • Instruction ID: a01fc582c3e3d40170146051e776d6fd7af785340e52f68911ce943172e10128
                                                                                          • Opcode Fuzzy Hash: b822a4d238980843d44ccf4e9a8dcce2874150234a954bdcd619f19fedf20506
                                                                                          • Instruction Fuzzy Hash: DEF062714082849AFB158E5ACCC8B62FF98EB81674F18C45AEE085B286C3799844CAB1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 69cddd0c72bd16729585fec1503ab5d39d8b84709daf1667762d84a1adb0dfb1
                                                                                          • Instruction ID: 3a41f19a4d09e23768f37578df6d5bcbf279c0bfd8a3b1dd00f850e0d418cad6
                                                                                          • Opcode Fuzzy Hash: 69cddd0c72bd16729585fec1503ab5d39d8b84709daf1667762d84a1adb0dfb1
                                                                                          • Instruction Fuzzy Hash: C5D19A70B006068FEB6ADB79C86076FB7FBBF88200F54446ED9468B291DB35E901CB51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339982500.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1600000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d15552ccbd2484b6630cb396b7b0cb658a2498cb353d0cd7d5c96e75f669b233
                                                                                          • Instruction ID: c22f419776b7f9ee30960223eb80ee4e4dbf9d9422f35ff255d431af0bc41f39
                                                                                          • Opcode Fuzzy Hash: d15552ccbd2484b6630cb396b7b0cb658a2498cb353d0cd7d5c96e75f669b233
                                                                                          • Instruction Fuzzy Hash: 3A12D8F15117468BE732EF65E89A1D93B78F745328F90820CD2616FAD8D7B4124ACF84
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4cfb31d49af16133645d987a9bb90fef0d3c3c66551ffb6939de102704659f8b
                                                                                          • Instruction ID: d11329d45632ccea15a45c50995986b67ebcd848f9f134828065b97e361f49cc
                                                                                          • Opcode Fuzzy Hash: 4cfb31d49af16133645d987a9bb90fef0d3c3c66551ffb6939de102704659f8b
                                                                                          • Instruction Fuzzy Hash: 2BD1C274A006458FDB54DF69C598AADBBF1BF8C304F6580A9E909AB361DB31AD40CF60
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339982500.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1600000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d9dee816dc4e3367b70f7060774e8df38be7a5e01992244fa55c01e7afd5932d
                                                                                          • Instruction ID: 4a650ec11f5521d390b458f13db3b6c106a5a721085307c1490b13fe403fdb1c
                                                                                          • Opcode Fuzzy Hash: d9dee816dc4e3367b70f7060774e8df38be7a5e01992244fa55c01e7afd5932d
                                                                                          • Instruction Fuzzy Hash: B0A17F36E0021ACFCF1ADFF5C8445DEBBB2FF85300B15866AE905AB265DB35A945CB40
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339982500.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1600000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2845e875b7348c47bf9cc85b66ff03b3a56c516abe27a543e8245e1bc060faed
                                                                                          • Instruction ID: 7d174fa6472aae32a71de5337ac7231603ba96a5cf44a89ab447c11397bfba42
                                                                                          • Opcode Fuzzy Hash: 2845e875b7348c47bf9cc85b66ff03b3a56c516abe27a543e8245e1bc060faed
                                                                                          • Instruction Fuzzy Hash: 51C16EB19117468BE732EF24E88A1D97B79FB86328F50830CD1616F6D8D7B4124ACF84
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f945356fa1363581bf33a90691ac6fc822fd96f42a25a1f5a2e9784eee28d9db
                                                                                          • Instruction ID: 3f05a9adfb028f08e3c239af0ef40fff72060ca99ef49c81499cc887c61dd555
                                                                                          • Opcode Fuzzy Hash: f945356fa1363581bf33a90691ac6fc822fd96f42a25a1f5a2e9784eee28d9db
                                                                                          • Instruction Fuzzy Hash: 1371F8B4E0560ACFCB44CFA5D5915AEFFF2FB89210F10982AD815BB244D7745942CF94
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 49659234ef27caba8f1010a789792a69ea4c4900cc5fd29d1b5ebe85a690c05e
                                                                                          • Instruction ID: b629ee35a0ddf247b083906b49978a1ae6c023526c43288628b64d7e3cb5a7d7
                                                                                          • Opcode Fuzzy Hash: 49659234ef27caba8f1010a789792a69ea4c4900cc5fd29d1b5ebe85a690c05e
                                                                                          • Instruction Fuzzy Hash: 4D61F4B4E0560ACFCB44CFA6D4915AEBFF2FB89310F10982AD815BB254E7745A42CF60
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0d47ecbbe9c6e09661e0f14b70834b03d21e5327975e857de32632100610a437
                                                                                          • Instruction ID: 9e0e723518773dd79061bd0319a07f9855fe32487fada2b964eaa1b35e558926
                                                                                          • Opcode Fuzzy Hash: 0d47ecbbe9c6e09661e0f14b70834b03d21e5327975e857de32632100610a437
                                                                                          • Instruction Fuzzy Hash: 20410871D1062ACBDB64CF66C8447E9BBB2FF99300F1486AAD50DA6210EB705A85CF40
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.339905773.0000000001550000.00000040.00000800.00020000.00000000.sdmp, Offset: 01550000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_1550000_PURCHASE ORDER.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cc4c070fb1008ab4bdaccbcf0905dabcaa996a0ea44c0229c990442a4f08ac84
                                                                                          • Instruction ID: 359b67c5a9593ab2f44dd4a02bf6ed452311ad957b751848339ec1c1c069fe42
                                                                                          • Opcode Fuzzy Hash: cc4c070fb1008ab4bdaccbcf0905dabcaa996a0ea44c0229c990442a4f08ac84
                                                                                          • Instruction Fuzzy Hash: 7C411B71D1062ACBDB68CF66C984799BBB2FFD9300F1582EAD508A7214EB705AC5CF40
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Execution Graph

                                                                                          Execution Coverage:19.7%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:0.8%
                                                                                          Total number of Nodes:947
                                                                                          Total number of Limit Nodes:22
                                                                                          execution_graph 58272 4d74990 58273 4d749a4 58272->58273 58276 4d74fe2 58273->58276 58282 4d750b7 58276->58282 58287 4d750c8 58276->58287 58292 4d751de 58276->58292 58297 4d751c4 58276->58297 58283 4d7510c 58282->58283 58284 4d75203 58283->58284 58302 4d754d0 58283->58302 58307 4d754bf 58283->58307 58288 4d7510c 58287->58288 58289 4d75203 58288->58289 58290 4d754d0 2 API calls 58288->58290 58291 4d754bf 2 API calls 58288->58291 58290->58289 58291->58289 58293 4d751f1 58292->58293 58294 4d75203 58292->58294 58295 4d754d0 2 API calls 58293->58295 58296 4d754bf 2 API calls 58293->58296 58295->58294 58296->58294 58298 4d75177 58297->58298 58299 4d75203 58298->58299 58300 4d754d0 2 API calls 58298->58300 58301 4d754bf 2 API calls 58298->58301 58300->58299 58301->58299 58303 4d754de 58302->58303 58312 4d75520 58303->58312 58316 4d7550f 58303->58316 58304 4d754ee 58304->58284 58308 4d754de 58307->58308 58310 4d75520 RtlEncodePointer 58308->58310 58311 4d7550f RtlEncodePointer 58308->58311 58309 4d754ee 58309->58284 58310->58309 58311->58309 58313 4d7555a 58312->58313 58314 4d75584 RtlEncodePointer 58313->58314 58315 4d755ad 58313->58315 58314->58315 58315->58304 58317 4d7555a 58316->58317 58318 4d75584 RtlEncodePointer 58317->58318 58319 4d755ad 58317->58319 58318->58319 58319->58304 58320 4d7b8d8 58321 4d7b8f6 58320->58321 58324 4d7a240 58321->58324 58323 4d7b92d 58325 4d7d3f8 LoadLibraryA 58324->58325 58327 4d7d4d4 58325->58327 58328 4d70448 58329 4d70455 58328->58329 58332 4d7086b 58329->58332 58330 4d7045b 58333 4d70873 58332->58333 58334 4d70851 58332->58334 58335 4d70a5e VirtualAllocExNuma 58333->58335 58336 4d7089a 58333->58336 58343 4d72598 58333->58343 58348 4d72588 58333->58348 58354 5d360b0 58333->58354 58361 5d360a0 58333->58361 58338 4d70b2d 58335->58338 58336->58330 58338->58330 58344 4d725a3 58343->58344 58368 5d358e7 58344->58368 58373 5d358e8 58344->58373 58345 4d72630 58345->58333 58349 4d72574 58348->58349 58350 4d72597 58348->58350 58352 5d358e7 GetUserNameW 58350->58352 58353 5d358e8 GetUserNameW 58350->58353 58351 4d72630 58351->58333 58352->58351 58353->58351 58356 5d360c9 58354->58356 58355 5d36523 58355->58333 58356->58355 58382 5d37430 58356->58382 58432 5d36e25 58356->58432 58437 5d36de4 58356->58437 58442 5d36c73 58356->58442 58363 5d360b0 58361->58363 58362 5d36523 58362->58333 58363->58362 58364 5d37430 77 API calls 58363->58364 58365 5d36c73 DeleteFileW 58363->58365 58366 5d36e25 DeleteFileW 58363->58366 58367 5d36de4 DeleteFileW 58363->58367 58364->58363 58365->58363 58366->58363 58367->58363 58369 5d35900 58368->58369 58371 5d3595f 58369->58371 58378 5d354c0 58369->58378 58374 5d35900 58373->58374 58375 5d354c0 GetUserNameW 58374->58375 58376 5d3595f 58374->58376 58377 5d35951 58375->58377 58377->58345 58380 5d35a20 GetUserNameW 58378->58380 58381 5d35b6d 58380->58381 58383 5d3744a 58382->58383 58384 5d37500 58383->58384 58447 5d385d3 58383->58447 58463 5d3822e 58383->58463 58484 5d38a2f 58383->58484 58488 5d3872f 58383->58488 58504 5d389ab 58383->58504 58508 5d386ab 58383->58508 58524 5d381a4 58383->58524 58545 5d387bf 58383->58545 58561 5d382b8 58383->58561 58582 5d37eb6 58383->58582 58603 5d3800f 58383->58603 58624 5d38408 58383->58624 58640 5d38489 58383->58640 58656 5d3888b 58383->58656 58672 5d3858b 58383->58672 58688 5d37f85 58383->58688 58709 5d38807 58383->58709 58725 5d38387 58383->58725 58746 5d38501 58383->58746 58762 5d38099 58383->58762 58783 5d3811a 58383->58783 58804 5d3891b 58383->58804 58811 5d3861b 58383->58811 58827 5d381e9 58383->58827 58848 5d386e7 58383->58848 58864 5d38963 58383->58864 58868 5d38663 58383->58868 58884 5d382fd 58383->58884 58905 5d37efb 58383->58905 58926 5d38a77 58383->58926 58930 5d38777 58383->58930 58946 5d37e71 58383->58946 58967 5d389f3 58383->58967 58971 5d38273 58383->58971 58992 5d383cc 58383->58992 59010 5d3844d 58383->59010 59026 5d3884f 58383->59026 59042 5d37fca 58383->59042 59063 5d384c5 58383->59063 59079 5d38546 58383->59079 59095 5d37f40 58383->59095 59116 5d38342 58383->59116 59137 5d3815f 58383->59137 59158 5d38054 58383->59158 59179 5d380d5 58383->59179 59200 5d37e50 58383->59200 59221 5d388d3 58383->59221 58384->58356 58433 5d36e2d 58432->58433 59323 5d37140 58433->59323 59327 5d37198 58433->59327 58434 5d36f48 58434->58356 58439 5d36dec 58437->58439 58438 5d36f48 58438->58356 58440 5d37140 DeleteFileW 58439->58440 58441 5d37198 DeleteFileW 58439->58441 58440->58438 58441->58438 58444 5d36cb1 58442->58444 58443 5d36f48 58443->58356 58444->58443 58445 5d37140 DeleteFileW 58444->58445 58446 5d37198 DeleteFileW 58444->58446 58445->58443 58446->58443 58448 5d385e4 58447->58448 59231 5e8eb88 58448->59231 59236 5e8e8ba 58448->59236 59241 5e8e770 58448->59241 59246 5e8ea84 58448->59246 59251 5e8e210 58448->59251 58449 5d388b8 59257 5e8f503 58449->59257 59261 5e8f5f8 58449->59261 58450 5d38900 58451 5d38948 58450->58451 58454 5e8f5f8 RegQueryValueExW 58450->58454 58455 5e8f503 RegQueryValueExW 58450->58455 58452 5d38a92 KiUserExceptionDispatcher 58451->58452 58453 5d38aae 58452->58453 58453->58383 58454->58451 58455->58451 58464 5d3823f 58463->58464 59271 5e86660 58464->59271 59276 5e86670 58464->59276 58465 5d383b1 KiUserExceptionDispatcher 58467 5d38406 58465->58467 58477 5e8eb88 2 API calls 58467->58477 58478 5e8e8ba 2 API calls 58467->58478 58479 5e8e770 2 API calls 58467->58479 58480 5e8e210 2 API calls 58467->58480 58481 5e8ea84 2 API calls 58467->58481 58468 5d388b8 58482 5e8f5f8 RegQueryValueExW 58468->58482 58483 5e8f503 RegQueryValueExW 58468->58483 58469 5d38900 58470 5d38948 58469->58470 58473 5e8f5f8 RegQueryValueExW 58469->58473 58474 5e8f503 RegQueryValueExW 58469->58474 58471 5d38a92 KiUserExceptionDispatcher 58470->58471 58472 5d38aae 58471->58472 58472->58383 58473->58470 58474->58470 58477->58468 58478->58468 58479->58468 58480->58468 58481->58468 58482->58469 58483->58469 58485 5d38a40 58484->58485 58486 5d38a92 KiUserExceptionDispatcher 58485->58486 58487 5d38aae 58486->58487 58487->58383 58489 5d38740 58488->58489 58495 5e8eb88 2 API calls 58489->58495 58496 5e8e8ba 2 API calls 58489->58496 58497 5e8e770 2 API calls 58489->58497 58498 5e8e210 2 API calls 58489->58498 58499 5e8ea84 2 API calls 58489->58499 58490 5d388b8 58500 5e8f5f8 RegQueryValueExW 58490->58500 58501 5e8f503 RegQueryValueExW 58490->58501 58491 5d38900 58492 5d38948 58491->58492 58502 5e8f5f8 RegQueryValueExW 58491->58502 58503 5e8f503 RegQueryValueExW 58491->58503 58493 5d38a92 KiUserExceptionDispatcher 58492->58493 58494 5d38aae 58493->58494 58494->58383 58495->58490 58496->58490 58497->58490 58498->58490 58499->58490 58500->58491 58501->58491 58502->58492 58503->58492 58505 5d389bc 58504->58505 58506 5d38a92 KiUserExceptionDispatcher 58505->58506 58507 5d38aae 58506->58507 58507->58383 58509 5d386bc 58508->58509 58515 5e8eb88 2 API calls 58509->58515 58516 5e8e8ba 2 API calls 58509->58516 58517 5e8e770 2 API calls 58509->58517 58518 5e8e210 2 API calls 58509->58518 58519 5e8ea84 2 API calls 58509->58519 58510 5d388b8 58520 5e8f5f8 RegQueryValueExW 58510->58520 58521 5e8f503 RegQueryValueExW 58510->58521 58511 5d38900 58512 5d38948 58511->58512 58522 5e8f5f8 RegQueryValueExW 58511->58522 58523 5e8f503 RegQueryValueExW 58511->58523 58513 5d38a92 KiUserExceptionDispatcher 58512->58513 58514 5d38aae 58513->58514 58514->58383 58515->58510 58516->58510 58517->58510 58518->58510 58519->58510 58520->58511 58521->58511 58522->58512 58523->58512 58525 5d381b5 58524->58525 58534 5e86660 5 API calls 58525->58534 58535 5e86670 5 API calls 58525->58535 58526 5d383b1 KiUserExceptionDispatcher 58528 5d38406 58526->58528 58536 5e8eb88 2 API calls 58528->58536 58537 5e8e8ba 2 API calls 58528->58537 58538 5e8e770 2 API calls 58528->58538 58539 5e8e210 2 API calls 58528->58539 58540 5e8ea84 2 API calls 58528->58540 58529 5d388b8 58541 5e8f5f8 RegQueryValueExW 58529->58541 58542 5e8f503 RegQueryValueExW 58529->58542 58530 5d38900 58531 5d38948 58530->58531 58543 5e8f5f8 RegQueryValueExW 58530->58543 58544 5e8f503 RegQueryValueExW 58530->58544 58532 5d38a92 KiUserExceptionDispatcher 58531->58532 58533 5d38aae 58532->58533 58533->58383 58534->58526 58535->58526 58536->58529 58537->58529 58538->58529 58539->58529 58540->58529 58541->58530 58542->58530 58543->58531 58544->58531 58546 5d387d0 58545->58546 58552 5e8eb88 2 API calls 58546->58552 58553 5e8e8ba 2 API calls 58546->58553 58554 5e8e770 2 API calls 58546->58554 58555 5e8e210 2 API calls 58546->58555 58556 5e8ea84 2 API calls 58546->58556 58547 5d388b8 58557 5e8f5f8 RegQueryValueExW 58547->58557 58558 5e8f503 RegQueryValueExW 58547->58558 58548 5d38900 58549 5d38948 58548->58549 58559 5e8f5f8 RegQueryValueExW 58548->58559 58560 5e8f503 RegQueryValueExW 58548->58560 58550 5d38a92 KiUserExceptionDispatcher 58549->58550 58551 5d38aae 58550->58551 58551->58383 58552->58547 58553->58547 58554->58547 58555->58547 58556->58547 58557->58548 58558->58548 58559->58549 58560->58549 58562 5d382c9 58561->58562 58580 5e86660 5 API calls 58562->58580 58581 5e86670 5 API calls 58562->58581 58563 5d383b1 KiUserExceptionDispatcher 58565 5d38406 58563->58565 58571 5e8eb88 2 API calls 58565->58571 58572 5e8e8ba 2 API calls 58565->58572 58573 5e8e770 2 API calls 58565->58573 58574 5e8e210 2 API calls 58565->58574 58575 5e8ea84 2 API calls 58565->58575 58566 5d388b8 58576 5e8f5f8 RegQueryValueExW 58566->58576 58577 5e8f503 RegQueryValueExW 58566->58577 58567 5d38900 58568 5d38948 58567->58568 58578 5e8f5f8 RegQueryValueExW 58567->58578 58579 5e8f503 RegQueryValueExW 58567->58579 58569 5d38a92 KiUserExceptionDispatcher 58568->58569 58570 5d38aae 58569->58570 58570->58383 58571->58566 58572->58566 58573->58566 58574->58566 58575->58566 58576->58567 58577->58567 58578->58568 58579->58568 58580->58563 58581->58563 58583 5d37ec7 58582->58583 58596 5e86660 5 API calls 58583->58596 58597 5e86670 5 API calls 58583->58597 58584 5d383b1 KiUserExceptionDispatcher 58586 5d38406 58584->58586 58598 5e8eb88 2 API calls 58586->58598 58599 5e8e8ba 2 API calls 58586->58599 58600 5e8e770 2 API calls 58586->58600 58601 5e8e210 2 API calls 58586->58601 58602 5e8ea84 2 API calls 58586->58602 58587 5d388b8 58592 5e8f5f8 RegQueryValueExW 58587->58592 58593 5e8f503 RegQueryValueExW 58587->58593 58588 5d38900 58589 5d38948 58588->58589 58594 5e8f5f8 RegQueryValueExW 58588->58594 58595 5e8f503 RegQueryValueExW 58588->58595 58590 5d38a92 KiUserExceptionDispatcher 58589->58590 58591 5d38aae 58590->58591 58591->58383 58592->58588 58593->58588 58594->58589 58595->58589 58596->58584 58597->58584 58598->58587 58599->58587 58600->58587 58601->58587 58602->58587 58604 5d38020 58603->58604 58613 5e86660 5 API calls 58604->58613 58614 5e86670 5 API calls 58604->58614 58605 5d383b1 KiUserExceptionDispatcher 58607 5d38406 58605->58607 58615 5e8eb88 2 API calls 58607->58615 58616 5e8e8ba 2 API calls 58607->58616 58617 5e8e770 2 API calls 58607->58617 58618 5e8e210 2 API calls 58607->58618 58619 5e8ea84 2 API calls 58607->58619 58608 5d388b8 58620 5e8f5f8 RegQueryValueExW 58608->58620 58621 5e8f503 RegQueryValueExW 58608->58621 58609 5d38900 58610 5d38948 58609->58610 58622 5e8f5f8 RegQueryValueExW 58609->58622 58623 5e8f503 RegQueryValueExW 58609->58623 58611 5d38a92 KiUserExceptionDispatcher 58610->58611 58612 5d38aae 58611->58612 58612->58383 58613->58605 58614->58605 58615->58608 58616->58608 58617->58608 58618->58608 58619->58608 58620->58609 58621->58609 58622->58610 58623->58610 58625 5d38419 58624->58625 58631 5e8eb88 2 API calls 58625->58631 58632 5e8e8ba 2 API calls 58625->58632 58633 5e8e770 2 API calls 58625->58633 58634 5e8e210 2 API calls 58625->58634 58635 5e8ea84 2 API calls 58625->58635 58626 5d388b8 58636 5e8f5f8 RegQueryValueExW 58626->58636 58637 5e8f503 RegQueryValueExW 58626->58637 58627 5d38900 58628 5d38948 58627->58628 58638 5e8f5f8 RegQueryValueExW 58627->58638 58639 5e8f503 RegQueryValueExW 58627->58639 58629 5d38a92 KiUserExceptionDispatcher 58628->58629 58630 5d38aae 58629->58630 58630->58383 58631->58626 58632->58626 58633->58626 58634->58626 58635->58626 58636->58627 58637->58627 58638->58628 58639->58628 58641 5d3849a 58640->58641 58647 5e8eb88 2 API calls 58641->58647 58648 5e8e8ba 2 API calls 58641->58648 58649 5e8e770 2 API calls 58641->58649 58650 5e8e210 2 API calls 58641->58650 58651 5e8ea84 2 API calls 58641->58651 58642 5d388b8 58652 5e8f5f8 RegQueryValueExW 58642->58652 58653 5e8f503 RegQueryValueExW 58642->58653 58643 5d38900 58644 5d38948 58643->58644 58654 5e8f5f8 RegQueryValueExW 58643->58654 58655 5e8f503 RegQueryValueExW 58643->58655 58645 5d38a92 KiUserExceptionDispatcher 58644->58645 58646 5d38aae 58645->58646 58646->58383 58647->58642 58648->58642 58649->58642 58650->58642 58651->58642 58652->58643 58653->58643 58654->58644 58655->58644 58657 5d3889c 58656->58657 58665 5e8eb88 2 API calls 58657->58665 58666 5e8e8ba 2 API calls 58657->58666 58667 5e8e770 2 API calls 58657->58667 58668 5e8e210 2 API calls 58657->58668 58669 5e8ea84 2 API calls 58657->58669 58658 5d388b8 58670 5e8f5f8 RegQueryValueExW 58658->58670 58671 5e8f503 RegQueryValueExW 58658->58671 58659 5d38900 58660 5d38948 58659->58660 58663 5e8f5f8 RegQueryValueExW 58659->58663 58664 5e8f503 RegQueryValueExW 58659->58664 58661 5d38a92 KiUserExceptionDispatcher 58660->58661 58662 5d38aae 58661->58662 58662->58383 58663->58660 58664->58660 58665->58658 58666->58658 58667->58658 58668->58658 58669->58658 58670->58659 58671->58659 58673 5d3859c 58672->58673 58679 5e8eb88 2 API calls 58673->58679 58680 5e8e8ba 2 API calls 58673->58680 58681 5e8e770 2 API calls 58673->58681 58682 5e8e210 2 API calls 58673->58682 58683 5e8ea84 2 API calls 58673->58683 58674 5d388b8 58684 5e8f5f8 RegQueryValueExW 58674->58684 58685 5e8f503 RegQueryValueExW 58674->58685 58675 5d38900 58676 5d38948 58675->58676 58686 5e8f5f8 RegQueryValueExW 58675->58686 58687 5e8f503 RegQueryValueExW 58675->58687 58677 5d38a92 KiUserExceptionDispatcher 58676->58677 58678 5d38aae 58677->58678 58678->58383 58679->58674 58680->58674 58681->58674 58682->58674 58683->58674 58684->58675 58685->58675 58686->58676 58687->58676 58689 5d37f96 58688->58689 58707 5e86660 5 API calls 58689->58707 58708 5e86670 5 API calls 58689->58708 58690 5d383b1 KiUserExceptionDispatcher 58692 5d38406 58690->58692 58698 5e8eb88 2 API calls 58692->58698 58699 5e8e8ba 2 API calls 58692->58699 58700 5e8e770 2 API calls 58692->58700 58701 5e8e210 2 API calls 58692->58701 58702 5e8ea84 2 API calls 58692->58702 58693 5d388b8 58703 5e8f5f8 RegQueryValueExW 58693->58703 58704 5e8f503 RegQueryValueExW 58693->58704 58694 5d38900 58695 5d38948 58694->58695 58705 5e8f5f8 RegQueryValueExW 58694->58705 58706 5e8f503 RegQueryValueExW 58694->58706 58696 5d38a92 KiUserExceptionDispatcher 58695->58696 58697 5d38aae 58696->58697 58697->58383 58698->58693 58699->58693 58700->58693 58701->58693 58702->58693 58703->58694 58704->58694 58705->58695 58706->58695 58707->58690 58708->58690 58710 5d38818 58709->58710 58716 5e8eb88 2 API calls 58710->58716 58717 5e8e8ba 2 API calls 58710->58717 58718 5e8e770 2 API calls 58710->58718 58719 5e8e210 2 API calls 58710->58719 58720 5e8ea84 2 API calls 58710->58720 58711 5d388b8 58721 5e8f5f8 RegQueryValueExW 58711->58721 58722 5e8f503 RegQueryValueExW 58711->58722 58712 5d38900 58713 5d38948 58712->58713 58723 5e8f5f8 RegQueryValueExW 58712->58723 58724 5e8f503 RegQueryValueExW 58712->58724 58714 5d38a92 KiUserExceptionDispatcher 58713->58714 58715 5d38aae 58714->58715 58715->58383 58716->58711 58717->58711 58718->58711 58719->58711 58720->58711 58721->58712 58722->58712 58723->58713 58724->58713 58726 5d38398 58725->58726 58737 5e86660 5 API calls 58726->58737 58738 5e86670 5 API calls 58726->58738 58727 5d383b1 KiUserExceptionDispatcher 58729 5d38406 58727->58729 58739 5e8eb88 2 API calls 58729->58739 58740 5e8e8ba 2 API calls 58729->58740 58741 5e8e770 2 API calls 58729->58741 58742 5e8e210 2 API calls 58729->58742 58743 5e8ea84 2 API calls 58729->58743 58730 5d388b8 58744 5e8f5f8 RegQueryValueExW 58730->58744 58745 5e8f503 RegQueryValueExW 58730->58745 58731 5d38900 58732 5d38948 58731->58732 58735 5e8f5f8 RegQueryValueExW 58731->58735 58736 5e8f503 RegQueryValueExW 58731->58736 58733 5d38a92 KiUserExceptionDispatcher 58732->58733 58734 5d38aae 58733->58734 58734->58383 58735->58732 58736->58732 58737->58727 58738->58727 58739->58730 58740->58730 58741->58730 58742->58730 58743->58730 58744->58731 58745->58731 58747 5d38512 58746->58747 58753 5e8eb88 2 API calls 58747->58753 58754 5e8e8ba 2 API calls 58747->58754 58755 5e8e770 2 API calls 58747->58755 58756 5e8e210 2 API calls 58747->58756 58757 5e8ea84 2 API calls 58747->58757 58748 5d388b8 58758 5e8f5f8 RegQueryValueExW 58748->58758 58759 5e8f503 RegQueryValueExW 58748->58759 58749 5d38900 58750 5d38948 58749->58750 58760 5e8f5f8 RegQueryValueExW 58749->58760 58761 5e8f503 RegQueryValueExW 58749->58761 58751 5d38a92 KiUserExceptionDispatcher 58750->58751 58752 5d38aae 58751->58752 58752->58383 58753->58748 58754->58748 58755->58748 58756->58748 58757->58748 58758->58749 58759->58749 58760->58750 58761->58750 58763 5d380aa 58762->58763 58781 5e86660 5 API calls 58763->58781 58782 5e86670 5 API calls 58763->58782 58764 5d383b1 KiUserExceptionDispatcher 58766 5d38406 58764->58766 58772 5e8eb88 2 API calls 58766->58772 58773 5e8e8ba 2 API calls 58766->58773 58774 5e8e770 2 API calls 58766->58774 58775 5e8e210 2 API calls 58766->58775 58776 5e8ea84 2 API calls 58766->58776 58767 5d388b8 58777 5e8f5f8 RegQueryValueExW 58767->58777 58778 5e8f503 RegQueryValueExW 58767->58778 58768 5d38900 58769 5d38948 58768->58769 58779 5e8f5f8 RegQueryValueExW 58768->58779 58780 5e8f503 RegQueryValueExW 58768->58780 58770 5d38a92 KiUserExceptionDispatcher 58769->58770 58771 5d38aae 58770->58771 58771->58383 58772->58767 58773->58767 58774->58767 58775->58767 58776->58767 58777->58768 58778->58768 58779->58769 58780->58769 58781->58764 58782->58764 58784 5d3812b 58783->58784 58802 5e86660 5 API calls 58784->58802 58803 5e86670 5 API calls 58784->58803 58785 5d383b1 KiUserExceptionDispatcher 58787 5d38406 58785->58787 58793 5e8eb88 2 API calls 58787->58793 58794 5e8e8ba 2 API calls 58787->58794 58795 5e8e770 2 API calls 58787->58795 58796 5e8e210 2 API calls 58787->58796 58797 5e8ea84 2 API calls 58787->58797 58788 5d388b8 58798 5e8f5f8 RegQueryValueExW 58788->58798 58799 5e8f503 RegQueryValueExW 58788->58799 58789 5d38900 58790 5d38948 58789->58790 58800 5e8f5f8 RegQueryValueExW 58789->58800 58801 5e8f503 RegQueryValueExW 58789->58801 58791 5d38a92 KiUserExceptionDispatcher 58790->58791 58792 5d38aae 58791->58792 58792->58383 58793->58788 58794->58788 58795->58788 58796->58788 58797->58788 58798->58789 58799->58789 58800->58790 58801->58790 58802->58785 58803->58785 58805 5d3892c 58804->58805 58806 5d38948 58805->58806 58809 5e8f5f8 RegQueryValueExW 58805->58809 58810 5e8f503 RegQueryValueExW 58805->58810 58807 5d38a92 KiUserExceptionDispatcher 58806->58807 58808 5d38aae 58807->58808 58808->58383 58809->58806 58810->58806 58812 5d3862c 58811->58812 58818 5e8eb88 2 API calls 58812->58818 58819 5e8e8ba 2 API calls 58812->58819 58820 5e8e770 2 API calls 58812->58820 58821 5e8e210 2 API calls 58812->58821 58822 5e8ea84 2 API calls 58812->58822 58813 5d388b8 58823 5e8f5f8 RegQueryValueExW 58813->58823 58824 5e8f503 RegQueryValueExW 58813->58824 58814 5d38900 58815 5d38948 58814->58815 58825 5e8f5f8 RegQueryValueExW 58814->58825 58826 5e8f503 RegQueryValueExW 58814->58826 58816 5d38a92 KiUserExceptionDispatcher 58815->58816 58817 5d38aae 58816->58817 58817->58383 58818->58813 58819->58813 58820->58813 58821->58813 58822->58813 58823->58814 58824->58814 58825->58815 58826->58815 58828 5d381fa 58827->58828 58846 5e86660 5 API calls 58828->58846 58847 5e86670 5 API calls 58828->58847 58829 5d383b1 KiUserExceptionDispatcher 58831 5d38406 58829->58831 58837 5e8eb88 2 API calls 58831->58837 58838 5e8e8ba 2 API calls 58831->58838 58839 5e8e770 2 API calls 58831->58839 58840 5e8e210 2 API calls 58831->58840 58841 5e8ea84 2 API calls 58831->58841 58832 5d388b8 58842 5e8f5f8 RegQueryValueExW 58832->58842 58843 5e8f503 RegQueryValueExW 58832->58843 58833 5d38900 58834 5d38948 58833->58834 58844 5e8f5f8 RegQueryValueExW 58833->58844 58845 5e8f503 RegQueryValueExW 58833->58845 58835 5d38a92 KiUserExceptionDispatcher 58834->58835 58836 5d38aae 58835->58836 58836->58383 58837->58832 58838->58832 58839->58832 58840->58832 58841->58832 58842->58833 58843->58833 58844->58834 58845->58834 58846->58829 58847->58829 58849 5d386f8 58848->58849 58855 5e8eb88 2 API calls 58849->58855 58856 5e8e8ba 2 API calls 58849->58856 58857 5e8e770 2 API calls 58849->58857 58858 5e8e210 2 API calls 58849->58858 58859 5e8ea84 2 API calls 58849->58859 58850 5d388b8 58860 5e8f5f8 RegQueryValueExW 58850->58860 58861 5e8f503 RegQueryValueExW 58850->58861 58851 5d38900 58852 5d38948 58851->58852 58862 5e8f5f8 RegQueryValueExW 58851->58862 58863 5e8f503 RegQueryValueExW 58851->58863 58853 5d38a92 KiUserExceptionDispatcher 58852->58853 58854 5d38aae 58853->58854 58854->58383 58855->58850 58856->58850 58857->58850 58858->58850 58859->58850 58860->58851 58861->58851 58862->58852 58863->58852 58865 5d38974 58864->58865 58866 5d38a92 KiUserExceptionDispatcher 58865->58866 58867 5d38aae 58866->58867 58867->58383 58869 5d38674 58868->58869 58875 5e8eb88 2 API calls 58869->58875 58876 5e8e8ba 2 API calls 58869->58876 58877 5e8e770 2 API calls 58869->58877 58878 5e8e210 2 API calls 58869->58878 58879 5e8ea84 2 API calls 58869->58879 58870 5d388b8 58880 5e8f5f8 RegQueryValueExW 58870->58880 58881 5e8f503 RegQueryValueExW 58870->58881 58871 5d38900 58872 5d38948 58871->58872 58882 5e8f5f8 RegQueryValueExW 58871->58882 58883 5e8f503 RegQueryValueExW 58871->58883 58873 5d38a92 KiUserExceptionDispatcher 58872->58873 58874 5d38aae 58873->58874 58874->58383 58875->58870 58876->58870 58877->58870 58878->58870 58879->58870 58880->58871 58881->58871 58882->58872 58883->58872 58885 5d3830e 58884->58885 58903 5e86660 5 API calls 58885->58903 58904 5e86670 5 API calls 58885->58904 58886 5d383b1 KiUserExceptionDispatcher 58888 5d38406 58886->58888 58894 5e8eb88 2 API calls 58888->58894 58895 5e8e8ba 2 API calls 58888->58895 58896 5e8e770 2 API calls 58888->58896 58897 5e8e210 2 API calls 58888->58897 58898 5e8ea84 2 API calls 58888->58898 58889 5d388b8 58899 5e8f5f8 RegQueryValueExW 58889->58899 58900 5e8f503 RegQueryValueExW 58889->58900 58890 5d38900 58891 5d38948 58890->58891 58901 5e8f5f8 RegQueryValueExW 58890->58901 58902 5e8f503 RegQueryValueExW 58890->58902 58892 5d38a92 KiUserExceptionDispatcher 58891->58892 58893 5d38aae 58892->58893 58893->58383 58894->58889 58895->58889 58896->58889 58897->58889 58898->58889 58899->58890 58900->58890 58901->58891 58902->58891 58903->58886 58904->58886 58906 5d37f0c 58905->58906 58918 5e86660 5 API calls 58906->58918 58919 5e86670 5 API calls 58906->58919 58907 5d383b1 KiUserExceptionDispatcher 58920 5d38406 58907->58920 58909 5d388b8 58914 5e8f5f8 RegQueryValueExW 58909->58914 58915 5e8f503 RegQueryValueExW 58909->58915 58910 5d38900 58911 5d38948 58910->58911 58916 5e8f5f8 RegQueryValueExW 58910->58916 58917 5e8f503 RegQueryValueExW 58910->58917 58912 5d38a92 KiUserExceptionDispatcher 58911->58912 58913 5d38aae 58912->58913 58913->58383 58914->58910 58915->58910 58916->58911 58917->58911 58918->58907 58919->58907 58921 5e8eb88 2 API calls 58920->58921 58922 5e8e8ba 2 API calls 58920->58922 58923 5e8e770 2 API calls 58920->58923 58924 5e8e210 2 API calls 58920->58924 58925 5e8ea84 2 API calls 58920->58925 58921->58909 58922->58909 58923->58909 58924->58909 58925->58909 58927 5d38a88 58926->58927 58928 5d38a92 KiUserExceptionDispatcher 58927->58928 58929 5d38aae 58928->58929 58929->58383 58931 5d38788 58930->58931 58939 5e8eb88 2 API calls 58931->58939 58940 5e8e8ba 2 API calls 58931->58940 58941 5e8e770 2 API calls 58931->58941 58942 5e8e210 2 API calls 58931->58942 58943 5e8ea84 2 API calls 58931->58943 58932 5d388b8 58944 5e8f5f8 RegQueryValueExW 58932->58944 58945 5e8f503 RegQueryValueExW 58932->58945 58933 5d38900 58936 5e8f5f8 RegQueryValueExW 58933->58936 58937 5d38948 58933->58937 58938 5e8f503 RegQueryValueExW 58933->58938 58934 5d38a92 KiUserExceptionDispatcher 58935 5d38aae 58934->58935 58935->58383 58936->58937 58937->58934 58938->58937 58939->58932 58940->58932 58941->58932 58942->58932 58943->58932 58944->58933 58945->58933 58947 5d37e82 58946->58947 58965 5e86660 5 API calls 58947->58965 58966 5e86670 5 API calls 58947->58966 58948 5d383b1 KiUserExceptionDispatcher 58950 5d38406 58948->58950 58956 5e8eb88 2 API calls 58950->58956 58957 5e8e8ba 2 API calls 58950->58957 58958 5e8e770 2 API calls 58950->58958 58959 5e8e210 2 API calls 58950->58959 58960 5e8ea84 2 API calls 58950->58960 58951 5d388b8 58961 5e8f5f8 RegQueryValueExW 58951->58961 58962 5e8f503 RegQueryValueExW 58951->58962 58952 5d38900 58953 5d38948 58952->58953 58963 5e8f5f8 RegQueryValueExW 58952->58963 58964 5e8f503 RegQueryValueExW 58952->58964 58954 5d38a92 KiUserExceptionDispatcher 58953->58954 58955 5d38aae 58954->58955 58955->58383 58956->58951 58957->58951 58958->58951 58959->58951 58960->58951 58961->58952 58962->58952 58963->58953 58964->58953 58965->58948 58966->58948 58968 5d38a04 58967->58968 58969 5d38a92 KiUserExceptionDispatcher 58968->58969 58970 5d38aae 58969->58970 58970->58383 58972 5d38284 58971->58972 58983 5e86660 5 API calls 58972->58983 58984 5e86670 5 API calls 58972->58984 58973 5d383b1 KiUserExceptionDispatcher 58975 5d38406 58973->58975 58985 5e8eb88 2 API calls 58975->58985 58986 5e8e8ba 2 API calls 58975->58986 58987 5e8e770 2 API calls 58975->58987 58988 5e8e210 2 API calls 58975->58988 58989 5e8ea84 2 API calls 58975->58989 58976 5d388b8 58990 5e8f5f8 RegQueryValueExW 58976->58990 58991 5e8f503 RegQueryValueExW 58976->58991 58977 5d38900 58978 5d38948 58977->58978 58981 5e8f5f8 RegQueryValueExW 58977->58981 58982 5e8f503 RegQueryValueExW 58977->58982 58979 5d38a92 KiUserExceptionDispatcher 58978->58979 58980 5d38aae 58979->58980 58980->58383 58981->58978 58982->58978 58983->58973 58984->58973 58985->58976 58986->58976 58987->58976 58988->58976 58989->58976 58990->58977 58991->58977 58993 5d383dd 58992->58993 58994 5d383e7 KiUserExceptionDispatcher 58993->58994 58995 5d38406 58994->58995 59001 5e8eb88 2 API calls 58995->59001 59002 5e8e8ba 2 API calls 58995->59002 59003 5e8e770 2 API calls 58995->59003 59004 5e8e210 2 API calls 58995->59004 59005 5e8ea84 2 API calls 58995->59005 58996 5d388b8 59006 5e8f5f8 RegQueryValueExW 58996->59006 59007 5e8f503 RegQueryValueExW 58996->59007 58997 5d38900 58998 5d38948 58997->58998 59008 5e8f5f8 RegQueryValueExW 58997->59008 59009 5e8f503 RegQueryValueExW 58997->59009 58999 5d38a92 KiUserExceptionDispatcher 58998->58999 59000 5d38aae 58999->59000 59000->58383 59001->58996 59002->58996 59003->58996 59004->58996 59005->58996 59006->58997 59007->58997 59008->58998 59009->58998 59011 5d3845e 59010->59011 59017 5e8eb88 2 API calls 59011->59017 59018 5e8e8ba 2 API calls 59011->59018 59019 5e8e770 2 API calls 59011->59019 59020 5e8e210 2 API calls 59011->59020 59021 5e8ea84 2 API calls 59011->59021 59012 5d388b8 59022 5e8f5f8 RegQueryValueExW 59012->59022 59023 5e8f503 RegQueryValueExW 59012->59023 59013 5d38900 59014 5d38948 59013->59014 59024 5e8f5f8 RegQueryValueExW 59013->59024 59025 5e8f503 RegQueryValueExW 59013->59025 59015 5d38a92 KiUserExceptionDispatcher 59014->59015 59016 5d38aae 59015->59016 59016->58383 59017->59012 59018->59012 59019->59012 59020->59012 59021->59012 59022->59013 59023->59013 59024->59014 59025->59014 59027 5d38860 59026->59027 59037 5e8eb88 2 API calls 59027->59037 59038 5e8e8ba 2 API calls 59027->59038 59039 5e8e770 2 API calls 59027->59039 59040 5e8e210 2 API calls 59027->59040 59041 5e8ea84 2 API calls 59027->59041 59028 5d388b8 59033 5e8f5f8 RegQueryValueExW 59028->59033 59034 5e8f503 RegQueryValueExW 59028->59034 59029 5d38900 59030 5d38948 59029->59030 59035 5e8f5f8 RegQueryValueExW 59029->59035 59036 5e8f503 RegQueryValueExW 59029->59036 59031 5d38a92 KiUserExceptionDispatcher 59030->59031 59032 5d38aae 59031->59032 59032->58383 59033->59029 59034->59029 59035->59030 59036->59030 59037->59028 59038->59028 59039->59028 59040->59028 59041->59028 59043 5d37fdb 59042->59043 59056 5e86660 5 API calls 59043->59056 59057 5e86670 5 API calls 59043->59057 59044 5d383b1 KiUserExceptionDispatcher 59046 5d38406 59044->59046 59058 5e8eb88 2 API calls 59046->59058 59059 5e8e8ba 2 API calls 59046->59059 59060 5e8e770 2 API calls 59046->59060 59061 5e8e210 2 API calls 59046->59061 59062 5e8ea84 2 API calls 59046->59062 59047 5d388b8 59052 5e8f5f8 RegQueryValueExW 59047->59052 59053 5e8f503 RegQueryValueExW 59047->59053 59048 5d38900 59049 5d38948 59048->59049 59054 5e8f5f8 RegQueryValueExW 59048->59054 59055 5e8f503 RegQueryValueExW 59048->59055 59050 5d38a92 KiUserExceptionDispatcher 59049->59050 59051 5d38aae 59050->59051 59051->58383 59052->59048 59053->59048 59054->59049 59055->59049 59056->59044 59057->59044 59058->59047 59059->59047 59060->59047 59061->59047 59062->59047 59064 5d384d6 59063->59064 59070 5e8eb88 2 API calls 59064->59070 59071 5e8e8ba 2 API calls 59064->59071 59072 5e8e770 2 API calls 59064->59072 59073 5e8e210 2 API calls 59064->59073 59074 5e8ea84 2 API calls 59064->59074 59065 5d388b8 59075 5e8f5f8 RegQueryValueExW 59065->59075 59076 5e8f503 RegQueryValueExW 59065->59076 59066 5d38900 59067 5d38948 59066->59067 59077 5e8f5f8 RegQueryValueExW 59066->59077 59078 5e8f503 RegQueryValueExW 59066->59078 59068 5d38a92 KiUserExceptionDispatcher 59067->59068 59069 5d38aae 59068->59069 59069->58383 59070->59065 59071->59065 59072->59065 59073->59065 59074->59065 59075->59066 59076->59066 59077->59067 59078->59067 59080 5d38557 59079->59080 59086 5e8eb88 2 API calls 59080->59086 59087 5e8e8ba 2 API calls 59080->59087 59088 5e8e770 2 API calls 59080->59088 59089 5e8e210 2 API calls 59080->59089 59090 5e8ea84 2 API calls 59080->59090 59081 5d388b8 59091 5e8f5f8 RegQueryValueExW 59081->59091 59092 5e8f503 RegQueryValueExW 59081->59092 59082 5d38900 59083 5d38948 59082->59083 59093 5e8f5f8 RegQueryValueExW 59082->59093 59094 5e8f503 RegQueryValueExW 59082->59094 59084 5d38a92 KiUserExceptionDispatcher 59083->59084 59085 5d38aae 59084->59085 59085->58383 59086->59081 59087->59081 59088->59081 59089->59081 59090->59081 59091->59082 59092->59082 59093->59083 59094->59083 59096 5d37f51 59095->59096 59105 5e86660 5 API calls 59096->59105 59106 5e86670 5 API calls 59096->59106 59097 5d383b1 KiUserExceptionDispatcher 59099 5d38406 59097->59099 59107 5e8eb88 2 API calls 59099->59107 59108 5e8e8ba 2 API calls 59099->59108 59109 5e8e770 2 API calls 59099->59109 59110 5e8e210 2 API calls 59099->59110 59111 5e8ea84 2 API calls 59099->59111 59100 5d388b8 59112 5e8f5f8 RegQueryValueExW 59100->59112 59113 5e8f503 RegQueryValueExW 59100->59113 59101 5d38900 59102 5d38948 59101->59102 59114 5e8f5f8 RegQueryValueExW 59101->59114 59115 5e8f503 RegQueryValueExW 59101->59115 59103 5d38a92 KiUserExceptionDispatcher 59102->59103 59104 5d38aae 59103->59104 59104->58383 59105->59097 59106->59097 59107->59100 59108->59100 59109->59100 59110->59100 59111->59100 59112->59101 59113->59101 59114->59102 59115->59102 59117 5d38353 59116->59117 59126 5e86660 5 API calls 59117->59126 59127 5e86670 5 API calls 59117->59127 59118 5d383b1 KiUserExceptionDispatcher 59120 5d38406 59118->59120 59128 5e8eb88 2 API calls 59120->59128 59129 5e8e8ba 2 API calls 59120->59129 59130 5e8e770 2 API calls 59120->59130 59131 5e8e210 2 API calls 59120->59131 59132 5e8ea84 2 API calls 59120->59132 59121 5d388b8 59133 5e8f5f8 RegQueryValueExW 59121->59133 59134 5e8f503 RegQueryValueExW 59121->59134 59122 5d38900 59123 5d38948 59122->59123 59135 5e8f5f8 RegQueryValueExW 59122->59135 59136 5e8f503 RegQueryValueExW 59122->59136 59124 5d38a92 KiUserExceptionDispatcher 59123->59124 59125 5d38aae 59124->59125 59125->58383 59126->59118 59127->59118 59128->59121 59129->59121 59130->59121 59131->59121 59132->59121 59133->59122 59134->59122 59135->59123 59136->59123 59138 5d38170 59137->59138 59156 5e86660 5 API calls 59138->59156 59157 5e86670 5 API calls 59138->59157 59139 5d383b1 KiUserExceptionDispatcher 59141 5d38406 59139->59141 59147 5e8eb88 2 API calls 59141->59147 59148 5e8e8ba 2 API calls 59141->59148 59149 5e8e770 2 API calls 59141->59149 59150 5e8e210 2 API calls 59141->59150 59151 5e8ea84 2 API calls 59141->59151 59142 5d388b8 59152 5e8f5f8 RegQueryValueExW 59142->59152 59153 5e8f503 RegQueryValueExW 59142->59153 59143 5d38900 59144 5d38948 59143->59144 59154 5e8f5f8 RegQueryValueExW 59143->59154 59155 5e8f503 RegQueryValueExW 59143->59155 59145 5d38a92 KiUserExceptionDispatcher 59144->59145 59146 5d38aae 59145->59146 59146->58383 59147->59142 59148->59142 59149->59142 59150->59142 59151->59142 59152->59143 59153->59143 59154->59144 59155->59144 59156->59139 59157->59139 59159 5d38065 59158->59159 59168 5e86660 5 API calls 59159->59168 59169 5e86670 5 API calls 59159->59169 59160 5d383b1 KiUserExceptionDispatcher 59162 5d38406 59160->59162 59170 5e8eb88 2 API calls 59162->59170 59171 5e8e8ba 2 API calls 59162->59171 59172 5e8e770 2 API calls 59162->59172 59173 5e8e210 2 API calls 59162->59173 59174 5e8ea84 2 API calls 59162->59174 59163 5d388b8 59175 5e8f5f8 RegQueryValueExW 59163->59175 59176 5e8f503 RegQueryValueExW 59163->59176 59164 5d38900 59165 5d38948 59164->59165 59177 5e8f5f8 RegQueryValueExW 59164->59177 59178 5e8f503 RegQueryValueExW 59164->59178 59166 5d38a92 KiUserExceptionDispatcher 59165->59166 59167 5d38aae 59166->59167 59167->58383 59168->59160 59169->59160 59170->59163 59171->59163 59172->59163 59173->59163 59174->59163 59175->59164 59176->59164 59177->59165 59178->59165 59180 5d380e6 59179->59180 59193 5e86660 5 API calls 59180->59193 59194 5e86670 5 API calls 59180->59194 59181 5d383b1 KiUserExceptionDispatcher 59183 5d38406 59181->59183 59195 5e8eb88 2 API calls 59183->59195 59196 5e8e8ba 2 API calls 59183->59196 59197 5e8e770 2 API calls 59183->59197 59198 5e8e210 2 API calls 59183->59198 59199 5e8ea84 2 API calls 59183->59199 59184 5d388b8 59189 5e8f5f8 RegQueryValueExW 59184->59189 59190 5e8f503 RegQueryValueExW 59184->59190 59185 5d38900 59186 5d38948 59185->59186 59191 5e8f5f8 RegQueryValueExW 59185->59191 59192 5e8f503 RegQueryValueExW 59185->59192 59187 5d38a92 KiUserExceptionDispatcher 59186->59187 59188 5d38aae 59187->59188 59188->58383 59189->59185 59190->59185 59191->59186 59192->59186 59193->59181 59194->59181 59195->59184 59196->59184 59197->59184 59198->59184 59199->59184 59201 5d37e56 59200->59201 59219 5e86660 5 API calls 59201->59219 59220 5e86670 5 API calls 59201->59220 59202 5d383b1 KiUserExceptionDispatcher 59204 5d38406 59202->59204 59210 5e8eb88 2 API calls 59204->59210 59211 5e8e8ba 2 API calls 59204->59211 59212 5e8e770 2 API calls 59204->59212 59213 5e8e210 2 API calls 59204->59213 59214 5e8ea84 2 API calls 59204->59214 59205 5d388b8 59215 5e8f5f8 RegQueryValueExW 59205->59215 59216 5e8f503 RegQueryValueExW 59205->59216 59206 5d38900 59207 5d38948 59206->59207 59217 5e8f5f8 RegQueryValueExW 59206->59217 59218 5e8f503 RegQueryValueExW 59206->59218 59208 5d38a92 KiUserExceptionDispatcher 59207->59208 59209 5d38aae 59208->59209 59209->58383 59210->59205 59211->59205 59212->59205 59213->59205 59214->59205 59215->59206 59216->59206 59217->59207 59218->59207 59219->59202 59220->59202 59222 5d388e4 59221->59222 59227 5e8f5f8 RegQueryValueExW 59222->59227 59228 5e8f503 RegQueryValueExW 59222->59228 59223 5d38900 59224 5d38948 59223->59224 59229 5e8f5f8 RegQueryValueExW 59223->59229 59230 5e8f503 RegQueryValueExW 59223->59230 59225 5d38a92 KiUserExceptionDispatcher 59224->59225 59226 5d38aae 59225->59226 59226->58383 59227->59223 59228->59223 59229->59224 59230->59224 59235 5e8eba7 59231->59235 59232 5e8ee11 59232->58449 59234 5e8ba80 RegQueryValueExW 59234->59235 59235->59232 59235->59234 59265 5e8ba74 59235->59265 59240 5e8e877 59236->59240 59237 5e8eabc 59237->58449 59238 5e8ba74 RegOpenKeyExW 59238->59240 59239 5e8ba80 RegQueryValueExW 59239->59240 59240->59237 59240->59238 59240->59239 59245 5e8e791 59241->59245 59242 5e8eabc 59242->58449 59243 5e8ba74 RegOpenKeyExW 59243->59245 59244 5e8ba80 RegQueryValueExW 59244->59245 59245->59242 59245->59243 59245->59244 59250 5e8e877 59246->59250 59247 5e8eabc 59247->58449 59248 5e8ba74 RegOpenKeyExW 59248->59250 59249 5e8ba80 RegQueryValueExW 59249->59250 59250->59247 59250->59248 59250->59249 59252 5e8e231 59251->59252 59256 5e8e254 59251->59256 59252->58449 59253 5e8e281 59253->58449 59254 5e8ba74 RegOpenKeyExW 59254->59256 59255 5e8ba80 RegQueryValueExW 59255->59256 59256->59253 59256->59254 59256->59255 59258 5e8f516 59257->59258 59259 5e8f51e 59258->59259 59269 5e8f108 RegQueryValueExW 59258->59269 59259->58450 59263 5e8f613 59261->59263 59264 5e8f9f8 59263->59264 59270 5e8f108 RegQueryValueExW 59263->59270 59264->58450 59266 5e8eea0 RegOpenKeyExW 59265->59266 59268 5e8ef66 59266->59268 59269->59258 59270->59263 59272 5e8666e 59271->59272 59273 5e866a7 59272->59273 59281 5e868bc 59272->59281 59289 5e869af 59272->59289 59273->58465 59277 5e8668e 59276->59277 59278 5e866a7 59277->59278 59279 5e868bc 5 API calls 59277->59279 59280 5e869af 5 API calls 59277->59280 59278->58465 59279->59278 59280->59278 59282 5e868c2 59281->59282 59283 5e869c6 59282->59283 59297 5e86be8 59282->59297 59302 5e86d51 59282->59302 59307 5e86e00 59282->59307 59313 5e86dad 59282->59313 59318 5e86bf8 59282->59318 59283->59273 59290 5e8693f 59289->59290 59290->59289 59291 5e869c6 59290->59291 59292 5e86be8 LdrInitializeThunk 59290->59292 59293 5e86bf8 LdrInitializeThunk 59290->59293 59294 5e86dad LdrInitializeThunk 59290->59294 59295 5e86e00 LdrInitializeThunk 59290->59295 59296 5e86d51 LdrInitializeThunk 59290->59296 59291->59273 59292->59291 59293->59291 59294->59291 59295->59291 59296->59291 59298 5e86ba3 59297->59298 59300 5e86bf2 59297->59300 59298->59283 59299 5e870cf LdrInitializeThunk 59301 5e870eb 59299->59301 59300->59298 59300->59299 59301->59283 59305 5e86caa 59302->59305 59303 5e86de4 59303->59283 59304 5e870cf LdrInitializeThunk 59306 5e870eb 59304->59306 59305->59303 59305->59304 59306->59283 59308 5e86e21 59307->59308 59310 5e86e44 59307->59310 59308->59283 59309 5e86e71 59309->59283 59310->59309 59311 5e870cf LdrInitializeThunk 59310->59311 59312 5e870eb 59311->59312 59312->59283 59316 5e86caa 59313->59316 59314 5e86de4 59314->59283 59315 5e870cf LdrInitializeThunk 59317 5e870eb 59315->59317 59316->59314 59316->59315 59317->59283 59319 5e86c18 59318->59319 59320 5e86de4 59319->59320 59321 5e870cf LdrInitializeThunk 59319->59321 59320->59283 59322 5e870eb 59321->59322 59322->59283 59324 5d3715e 59323->59324 59325 5d37181 59323->59325 59324->58434 59325->59324 59332 5d35e1c 59325->59332 59328 5d371a6 59327->59328 59329 5d371c9 59327->59329 59328->58434 59330 5d35e1c DeleteFileW 59329->59330 59331 5d37164 59329->59331 59330->59331 59331->58434 59333 5d37290 DeleteFileW 59332->59333 59335 5d3730f 59333->59335 59335->59324 59336 4d70b68 59337 4d70ba9 Sleep 59336->59337 59338 4d70bd6 59337->59338
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423690749.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e80000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e8ef3f62579309857d46adf994bff312a4e971cd9b0b5e308e487f61acaf7551
                                                                                          • Instruction ID: 850d8d6eaf9e761f0a57da86eb5b790f894259dbc2249a8a5d33318298f7a394
                                                                                          • Opcode Fuzzy Hash: e8ef3f62579309857d46adf994bff312a4e971cd9b0b5e308e487f61acaf7551
                                                                                          • Instruction Fuzzy Hash: 9F129E70B052049FDB14EBB8C858BAEBBB2EF89308F158069D449EB395DB35DC45CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 8^tl
                                                                                          • API String ID: 0-2108595561
                                                                                          • Opcode ID: 6b5c4edd3a29271622e34464edab11042db3e0dfb394676cdbf551fd5991199f
                                                                                          • Instruction ID: 126cf440965a8acd26b4b02d4dd97123396256150bf0367e863e1806b332b00e
                                                                                          • Opcode Fuzzy Hash: 6b5c4edd3a29271622e34464edab11042db3e0dfb394676cdbf551fd5991199f
                                                                                          • Instruction Fuzzy Hash: 9E429130E44248CFEB24DBA8C5547ADB7A2EF85384F15C06AD449AF386DB74D885CB62
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: \ol
                                                                                          • API String ID: 0-1325158581
                                                                                          • Opcode ID: 9e4120ad185f0e13eda026ca3e3fa342434ac6e0e2a0176f933ea7058b5ff447
                                                                                          • Instruction ID: a0778db4953ed6d5a376623cf47eea6d2aad4c9256c8d522a12a6655c5169551
                                                                                          • Opcode Fuzzy Hash: 9e4120ad185f0e13eda026ca3e3fa342434ac6e0e2a0176f933ea7058b5ff447
                                                                                          • Instruction Fuzzy Hash: 7B020530B442488FEB14DB68D894BAEB7E3FB85394F159029E0A9EB385CB34DC41C761
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • GetUserNameW.ADVAPI32(00000000,00000000), ref: 05D35B5B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: NameUser
                                                                                          • String ID:
                                                                                          • API String ID: 2645101109-0
                                                                                          • Opcode ID: 7eac715c2048c392817f580a92d6037e4365bb6ec3cab8d43b4eb70495a58f7f
                                                                                          • Instruction ID: b480243dffc5f4a8084f39f471181079f5915c2e3763c3757a5d1fd19270e5ec
                                                                                          • Opcode Fuzzy Hash: 7eac715c2048c392817f580a92d6037e4365bb6ec3cab8d43b4eb70495a58f7f
                                                                                          • Instruction Fuzzy Hash: 6D5102B0D002188FDB14CFA9D899BDEBBF1BF49314F55812AE816AB350D774A844CF95
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e5393ff1fc47e1f79e92721d78826eb479377942c5e68d97bfe30db982a03cbc
                                                                                          • Instruction ID: 649771ef9c20b5c79f022e9f7deaad16e2eb4eeeaf60198fdebaaca9b7da7d53
                                                                                          • Opcode Fuzzy Hash: e5393ff1fc47e1f79e92721d78826eb479377942c5e68d97bfe30db982a03cbc
                                                                                          • Instruction Fuzzy Hash: 3D8284277C55F88FF2314968CC9E6BD2B73F7901D874A6001A4DBE2B16D72896088FA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2a7b30f3a1127f11121e78e637b41c1f20e26ceba908dc91d624c5b2fb65b029
                                                                                          • Instruction ID: 509414eb65f5da49cf816b1a391047ded472cd97927c58979ec57ba28da2b453
                                                                                          • Opcode Fuzzy Hash: 2a7b30f3a1127f11121e78e637b41c1f20e26ceba908dc91d624c5b2fb65b029
                                                                                          • Instruction Fuzzy Hash: D6327030B042188FDB24DBB8C8547AEB7B2FF85288F5184AAD549DB395DB34DC85CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4d6fd1fe7b9d2b5fdd12feacaa52a999457051965b83c93d634a5a104562fd7e
                                                                                          • Instruction ID: 023493a2778461349c2f12b7a9eb609b937a3b1cf8fa450b8043ba59da70a4b4
                                                                                          • Opcode Fuzzy Hash: 4d6fd1fe7b9d2b5fdd12feacaa52a999457051965b83c93d634a5a104562fd7e
                                                                                          • Instruction Fuzzy Hash: 79D1D431B442058FEB20CF69D880A6FBBB2FF85394F1185AAD1A9DB259D730EC45C791
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f719694797b11598b76d15cad7640676b0bc793eb8d329393de810db9ce42a24
                                                                                          • Instruction ID: 1e6caf06ceb2bb039b451d3097f255363325bface2154fc83406d2dc4599a259
                                                                                          • Opcode Fuzzy Hash: f719694797b11598b76d15cad7640676b0bc793eb8d329393de810db9ce42a24
                                                                                          • Instruction Fuzzy Hash: 20D1B230B442145FEB18EB78C85576E76E3EFC9748F158429E50AAB384EF34EC4287A5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.412065580.0000000000DED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DED000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_ded000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3ab7c42da2d4e9c7406113c042ee38dfb88fbd0b617c5c326dcb98e815b53027
                                                                                          • Instruction ID: 46a39df806747b7ef21b1d96403a21515db3247b8233f2aefb3c184e4a15df39
                                                                                          • Opcode Fuzzy Hash: 3ab7c42da2d4e9c7406113c042ee38dfb88fbd0b617c5c326dcb98e815b53027
                                                                                          • Instruction Fuzzy Hash: BF91B27684E7C09FD3138B3498A46517FB0AF53219F1E45DBC8C2CA1A3E2699D0AC762
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cd7079edc8b876d90d767b2284bb02a9d4e36ac220c614073a63406a093f29a7
                                                                                          • Instruction ID: 26f1c20ae873462c36aaf76f336d58465837038b7346c9c08df227dc920d9db9
                                                                                          • Opcode Fuzzy Hash: cd7079edc8b876d90d767b2284bb02a9d4e36ac220c614073a63406a093f29a7
                                                                                          • Instruction Fuzzy Hash: 6BB1F130F442188BDB24DB74C95976EB6E3AFC5384FA58069D44AAB391DF70DC82C792
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 05e8cef35d1f78dd6e2c6be5e751689d630e6c36bb302035655ab4d86998437b
                                                                                          • Instruction ID: 4e617dbdeca662dd62bc04217a318e482a6279beb632d85f9ba51b2a93567e17
                                                                                          • Opcode Fuzzy Hash: 05e8cef35d1f78dd6e2c6be5e751689d630e6c36bb302035655ab4d86998437b
                                                                                          • Instruction Fuzzy Hash: F912BC79902218CFCB64DF74D98969CB7B2BF89346F1041EAE45A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 2029e67935e3dc8cccb0341e8778a7b4fea42f3feb65e914fb6700ac07890f4e
                                                                                          • Instruction ID: 32732c9b889e26f38725a3810df099134f49b4146e837c474cee0a68558622e5
                                                                                          • Opcode Fuzzy Hash: 2029e67935e3dc8cccb0341e8778a7b4fea42f3feb65e914fb6700ac07890f4e
                                                                                          • Instruction Fuzzy Hash: 1912BB79906218CFCB64DF74D98969CB7B2BF89346F1041EAE41A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: a740533a6bbecb0cec3977de1ceceb21f58988f529e22fe65e7d13d63e7d88ec
                                                                                          • Instruction ID: 25485f9eb81b2c9bbc732eb7d2625b81a1f1a52b779e777fee99bac219113fdd
                                                                                          • Opcode Fuzzy Hash: a740533a6bbecb0cec3977de1ceceb21f58988f529e22fe65e7d13d63e7d88ec
                                                                                          • Instruction Fuzzy Hash: 6E02BB79906218CFCB64DF74D98969CB7B2BF89346F1041EAE41A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 533b1bc0cc0fe20567564fd1fe5a7ba52ce9b403164ff04be1ce5ea1b50279d4
                                                                                          • Instruction ID: af679c78ac006da72335c68678b1f6cab1dea7e1f6aec73068f5f67351fd2222
                                                                                          • Opcode Fuzzy Hash: 533b1bc0cc0fe20567564fd1fe5a7ba52ce9b403164ff04be1ce5ea1b50279d4
                                                                                          • Instruction Fuzzy Hash: 4202BC79906218CFCB64DF74D98969CB7B2BF89346F1041EAE44A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 9ea81f86025f13f8a1e50a23ad3744abfd758d8548dec06857797b3dc0732d52
                                                                                          • Instruction ID: df1f7510aa4a9d29a99a4dcbe32e80652e86fcbfc3d7e496379e89ac0b76b4a3
                                                                                          • Opcode Fuzzy Hash: 9ea81f86025f13f8a1e50a23ad3744abfd758d8548dec06857797b3dc0732d52
                                                                                          • Instruction Fuzzy Hash: 8F02AB79906218CFCB64DF74D98969CB7B2BF89346F1041EAE44A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 4582c54d2cefaf488324e6005ccc506054f84bd770f22f342b4901d979a719df
                                                                                          • Instruction ID: 452fd84e96881b8706267d9b88e5cff916354cba9c2e277fd018d046184bd42f
                                                                                          • Opcode Fuzzy Hash: 4582c54d2cefaf488324e6005ccc506054f84bd770f22f342b4901d979a719df
                                                                                          • Instruction Fuzzy Hash: 7502AC79906218CFCB64DF74D98969CB7B2BF89346F1041EAE44A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 45afad000494c450806ff9f60700cfb0cd0c2871cfd29436dce022e2768f6a17
                                                                                          • Instruction ID: 5b8bc8eeea88e609ca5fe1c97c8f7750853a4b1df1768e2a05f391d2d1d8b03f
                                                                                          • Opcode Fuzzy Hash: 45afad000494c450806ff9f60700cfb0cd0c2871cfd29436dce022e2768f6a17
                                                                                          • Instruction Fuzzy Hash: 4B02AB79906218CFCB64DF74D98969CB7B2BF89346F1041EAE44A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 65535cf2fa8fd197ddbbfd4cac5c01ad05b07709f0e0aff309648cb8201fd1ce
                                                                                          • Instruction ID: 63f4d921b68508dbb7bc4d5cb4d0577e3e9ff7822ba98e81df1582ed91b842c6
                                                                                          • Opcode Fuzzy Hash: 65535cf2fa8fd197ddbbfd4cac5c01ad05b07709f0e0aff309648cb8201fd1ce
                                                                                          • Instruction Fuzzy Hash: 70F1AB79906218CFCB64DF74D98969CB7B2BF89346F1041EAE40A62350CB359EC6CF61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 671f953ab8ace9c15fe271f096aa086747514de82f22bc60d90d9387b194016b
                                                                                          • Instruction ID: e6aeab7ed53156ed2934f1114c17a637bb450e58160756ebd8f2e6b8278f0c1b
                                                                                          • Opcode Fuzzy Hash: 671f953ab8ace9c15fe271f096aa086747514de82f22bc60d90d9387b194016b
                                                                                          • Instruction Fuzzy Hash: 76F1AB79906218CFCB64DF74D98969CB7B2BF89346F1041EAE40A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 11d9ce5560aab528ab0cd55e249455a9e8e3b0f8da2de6b24eae4504becda9e7
                                                                                          • Instruction ID: 3d644658f411eb765b2fd20ba92b289f84fc9b54c0a4e7fbaed5cf8db6e17b29
                                                                                          • Opcode Fuzzy Hash: 11d9ce5560aab528ab0cd55e249455a9e8e3b0f8da2de6b24eae4504becda9e7
                                                                                          • Instruction Fuzzy Hash: B2F1AA79906218CFCB64DF74D98969CB7B2BF89346F1041EAE40A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 154fdee07ea602c98e950362d1dddb42845c0d7954d4d1b15c003909bf75d691
                                                                                          • Instruction ID: f83dffdef2e4b9e2d0fdd4af0369efa7fecc55e403752e093010a0b8f067f3b9
                                                                                          • Opcode Fuzzy Hash: 154fdee07ea602c98e950362d1dddb42845c0d7954d4d1b15c003909bf75d691
                                                                                          • Instruction Fuzzy Hash: E0F1AB79906258CFCB64DF74D98969CB7B2BF89346F1041EAE40A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: ad66586e1bd2dcaa4edcafbc329e384b93fbfd6370f049620cea32499d48da40
                                                                                          • Instruction ID: 9bb39f0ec2792d90f37c602d4e5f2e2504394cca4de05490a93cee455fbfc568
                                                                                          • Opcode Fuzzy Hash: ad66586e1bd2dcaa4edcafbc329e384b93fbfd6370f049620cea32499d48da40
                                                                                          • Instruction Fuzzy Hash: 53E1AB79906218CFCB64DF74D98969CB7B2BF89346F1041EAE44A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: c9efd2bc29aba45e864309418d6480afc8a05cbacd58ec7fa042dfea6cacfb5a
                                                                                          • Instruction ID: f26f16ddd379ccbc5b36d807547e555c2f752605e5a09396b2c65ebfd5a8d44b
                                                                                          • Opcode Fuzzy Hash: c9efd2bc29aba45e864309418d6480afc8a05cbacd58ec7fa042dfea6cacfb5a
                                                                                          • Instruction Fuzzy Hash: 8FE1AB79906218CFCB64DF74D98969CB7B2BF89346F1041EAE44A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: c44b01a5c36e9cacfcfb44d1110a88c48a39a5f3f373d807eee55c0ccaa445db
                                                                                          • Instruction ID: cf5affefa29e7297566d52a96a1843a153a5e33c8efb54f19548e123f84cf9e4
                                                                                          • Opcode Fuzzy Hash: c44b01a5c36e9cacfcfb44d1110a88c48a39a5f3f373d807eee55c0ccaa445db
                                                                                          • Instruction Fuzzy Hash: 7DE1AB79906218CFCB64DF74D98969CB7B2BF89346F1041EAE44A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: a62c406856cddb0d447c76f6b2750a5517a39bdcf12b10ee092052f93fabd37f
                                                                                          • Instruction ID: 5c55005a0bcb5129e47650821257d2ad9c77719b6c0ee9ae8a85310da7036e43
                                                                                          • Opcode Fuzzy Hash: a62c406856cddb0d447c76f6b2750a5517a39bdcf12b10ee092052f93fabd37f
                                                                                          • Instruction Fuzzy Hash: 9BE1AB79906218CFCB64DF74D98969CB7B2BF89346F1041EAE44A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 673846e4b7fad3dc5edc7c133a6017a75fc5a81fb20aed33cdc35fc0c6ab2d1b
                                                                                          • Instruction ID: 157068c472742256c30a3b7025f40fca95afaf8525a5426e282c834bf91335ac
                                                                                          • Opcode Fuzzy Hash: 673846e4b7fad3dc5edc7c133a6017a75fc5a81fb20aed33cdc35fc0c6ab2d1b
                                                                                          • Instruction Fuzzy Hash: 35D1BB79906218CFCB64DF74D98969CB7B2BF85346F1041EAE50AA2350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: aee8445f918b8c53d8491acb523614de819c405a355d416f32747bbab66abdef
                                                                                          • Instruction ID: ab2e9468c9ff03b7820169cccaa7de3ef6bd39c1f765be82ccfa1d8491f376be
                                                                                          • Opcode Fuzzy Hash: aee8445f918b8c53d8491acb523614de819c405a355d416f32747bbab66abdef
                                                                                          • Instruction Fuzzy Hash: 80D1AB79906218CFCB64DF74D98969CB7B2BF85346F1041EAE50AA2350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 0d017d5ebc16590877c0eed5d63f868307ad8ef9d9f6b5beb37944c690e28b28
                                                                                          • Instruction ID: 5cc7be9ef669cac6d9981c25ffa3d1c09df616c2fe5f74fb3f07a46371c644e8
                                                                                          • Opcode Fuzzy Hash: 0d017d5ebc16590877c0eed5d63f868307ad8ef9d9f6b5beb37944c690e28b28
                                                                                          • Instruction Fuzzy Hash: 1DD1AB79906218CFCB64DF74D98969CB7B2BF85346F1041EAE50A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 68c33b7b383a4acd72166f779cf10566c80bdf509b83f4933e7b90a228657a7f
                                                                                          • Instruction ID: 40cdca43ef787782839a2bb1aa632d5fc415110f03f71c971d379f81f7454e82
                                                                                          • Opcode Fuzzy Hash: 68c33b7b383a4acd72166f779cf10566c80bdf509b83f4933e7b90a228657a7f
                                                                                          • Instruction Fuzzy Hash: C0C1AA79906218CFCB64DF74D98969CB7B2BF89346F1041EAE50A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 0e3267b0c8c34419529759febe78ee8c3085d1b184e9a0099f6d8c8f3076dbdc
                                                                                          • Instruction ID: a2bbd842204752fc7ffeb967de0a2b3d4baf186b0e64e376ecbc544a413c2222
                                                                                          • Opcode Fuzzy Hash: 0e3267b0c8c34419529759febe78ee8c3085d1b184e9a0099f6d8c8f3076dbdc
                                                                                          • Instruction Fuzzy Hash: CDC1A979906228CFCB64DF74D98969CB7B2BF85346F1041EAE40A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 13b63bca4308a49d5fc84798b22ce28ddfe771fe9d59d85baa4e78ca3625d3fd
                                                                                          • Instruction ID: 86909f09735a7b0e96c865cba2af96b09ec45114eb54ee44c5a7cc5d961b9862
                                                                                          • Opcode Fuzzy Hash: 13b63bca4308a49d5fc84798b22ce28ddfe771fe9d59d85baa4e78ca3625d3fd
                                                                                          • Instruction Fuzzy Hash: B9C1BA79906228CFCB64DF74D98969CB7B2BF85346F1041EAE40A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D383E7
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: c8f5219c6672129319f7c45b315eb220b9f24a04fedd1568a73dcc18f2f33c19
                                                                                          • Instruction ID: a11bea378ecef6b1aa08e4f43d261b145dc4b22a4707abf8497f7384ba1adb8c
                                                                                          • Opcode Fuzzy Hash: c8f5219c6672129319f7c45b315eb220b9f24a04fedd1568a73dcc18f2f33c19
                                                                                          • Instruction Fuzzy Hash: EBB1A979906228CFCB64DF74D98969CB7B2BF85346F1041EAE44A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: Xctl$Xctl
                                                                                          • API String ID: 0-1774723568
                                                                                          • Opcode ID: 5c0f72602f750d732311f1d0b0b981b59aae721b6a5ec5474635276a01432e14
                                                                                          • Instruction ID: 808819bf7504857b55c5a69e12e049875150e4ff9c0ba6f5bcfca578aff01732
                                                                                          • Opcode Fuzzy Hash: 5c0f72602f750d732311f1d0b0b981b59aae721b6a5ec5474635276a01432e14
                                                                                          • Instruction Fuzzy Hash: E4A1C0307442159FEB05EF68C859ABE3BA3EF89384F158469E58ADB391DF30DC0187A1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.420414324.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_4d70000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6b0715874a8cf58d9b2a3ceb1c32266f43cbf21b453a01a09f0886987dee6451
                                                                                          • Instruction ID: 9b79fd7280be4bfe29bba50c53aeb24fd57dc8f0338b0105bb83da22546afcbf
                                                                                          • Opcode Fuzzy Hash: 6b0715874a8cf58d9b2a3ceb1c32266f43cbf21b453a01a09f0886987dee6451
                                                                                          • Instruction Fuzzy Hash: 1E81A171E042089FDF11DFA9D8807EDBBB1FB8A324F24446AE509E7391E734A845CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: f90be6587e2ae33abc8abff5a5a19805e7a670601d7cf92dced06da1c810b95d
                                                                                          • Instruction ID: b53c00993f94c7a68978859a0d6168fe80b96453f2f8c1e8168a03a7c20bb9a4
                                                                                          • Opcode Fuzzy Hash: f90be6587e2ae33abc8abff5a5a19805e7a670601d7cf92dced06da1c810b95d
                                                                                          • Instruction Fuzzy Hash: 5BB1BA79906218CFCB64DF74D98969CB7B2BF89346F1041EAE40A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 6eedccfcd8f6ae4233ed3201d299b541b03dce6c557aec922c3f30606d879830
                                                                                          • Instruction ID: 449cd9a4b50c522eb621cdb9469be64dea7c2c4c87235b1900747682d4c80237
                                                                                          • Opcode Fuzzy Hash: 6eedccfcd8f6ae4233ed3201d299b541b03dce6c557aec922c3f30606d879830
                                                                                          • Instruction Fuzzy Hash: 6CB1BA79906218CFCB64DF74D98969CB7B2BF85346F1041EAE44A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: fe66f33f65c7f88730ac562ee3ccd9a9862a02c5f0fc80f2c8fa0a1e74f95ffa
                                                                                          • Instruction ID: 04389ed6c821c7b97dd5e6b98ba3d2aa2720e495e0a3d1b3bb7e86e8be426630
                                                                                          • Opcode Fuzzy Hash: fe66f33f65c7f88730ac562ee3ccd9a9862a02c5f0fc80f2c8fa0a1e74f95ffa
                                                                                          • Instruction Fuzzy Hash: F5A1CB79906228CFCB64DF74D98969CB7B2BF85346F1041EAE44A62350CB359EC6CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 191c0d5d3c9e2d0b5e5f00a710e185f6940482b13c5e1678f9f1352f7ce7614a
                                                                                          • Instruction ID: 48d0d2385b373547b946b593d740937c3ce11dbf5124e45deae53b9baed60c82
                                                                                          • Opcode Fuzzy Hash: 191c0d5d3c9e2d0b5e5f00a710e185f6940482b13c5e1678f9f1352f7ce7614a
                                                                                          • Instruction Fuzzy Hash: 6CA1BB79906228CFCB64DF74D98969CB7B2BF85346F5041EAE44A62350CB359EC2CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 3e0dc30ba13adeb239a4c82f6bc0f7e2f2527305d8998feaeb61e46956d5023d
                                                                                          • Instruction ID: 5fe10d0b9ed472ca1498d7d0fcbb14b6262e4363a265dbf2bd16534d7bb1c7a6
                                                                                          • Opcode Fuzzy Hash: 3e0dc30ba13adeb239a4c82f6bc0f7e2f2527305d8998feaeb61e46956d5023d
                                                                                          • Instruction Fuzzy Hash: CDA1A979906228CFCB64DF74D98969CB7B2BF89305F5041EAE44A62350DB359EC2CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 2ca87be94d17f4375004b02d9295e06b9d5d0ebbbef4743d24add30c5dc0107a
                                                                                          • Instruction ID: 38fcf973b79c09411c70c49e1f4afe8e4247e7f2c79373690fa372742353c1a3
                                                                                          • Opcode Fuzzy Hash: 2ca87be94d17f4375004b02d9295e06b9d5d0ebbbef4743d24add30c5dc0107a
                                                                                          • Instruction Fuzzy Hash: 5091BA79906228CFCB64DF74D98969DB7B2BF45305F1041EAE44A62350CB359EC2CF61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 557fc55a93664a3af48ec8f5009b0000208c9a8de8786eb5b27fdd47fb1d3699
                                                                                          • Instruction ID: b5ffe45d4b255a9b4f8a39d974786778532ffb31ad88abd1710465611405e0e4
                                                                                          • Opcode Fuzzy Hash: 557fc55a93664a3af48ec8f5009b0000208c9a8de8786eb5b27fdd47fb1d3699
                                                                                          • Instruction Fuzzy Hash: 8F91AA79906228CFCB64DF74D98969CB7B2BF89305F1041EAE44A62350DB359EC2CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: 8
                                                                                          • API String ID: 0-4194326291
                                                                                          • Opcode ID: fbf88e9535bddfa1a1d2e43c6d528b179533d6bc22825c51e76c1160c870173c
                                                                                          • Instruction ID: 386098a4c2ab6286ec9734acf9c8d94169a7df2591026b33f3c7041394ff59e5
                                                                                          • Opcode Fuzzy Hash: fbf88e9535bddfa1a1d2e43c6d528b179533d6bc22825c51e76c1160c870173c
                                                                                          • Instruction Fuzzy Hash: 13E17B34B443049FEB049BB8D4546ADB7E2EF85388F14856AD44ADB395EF38EC45CB90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: d5cf1708dadd226e4f2a5e849394db784e505a88ae4a03f29a6813c48207b7a5
                                                                                          • Instruction ID: c4278b816355c17c6ad149a6bf24bd1a7af35b374f400d7a8a39ea6cabe2e31d
                                                                                          • Opcode Fuzzy Hash: d5cf1708dadd226e4f2a5e849394db784e505a88ae4a03f29a6813c48207b7a5
                                                                                          • Instruction Fuzzy Hash: 0C81BA79906228CFCB64DF74D98969CB7B2BF89305F5041EAE44A62350DB359EC2CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: b987b89368e70cbf7d014c55fee4dbd9c34c349e502c2f5e7c308de05bccdea8
                                                                                          • Instruction ID: 36c9ebe987340a4116ee4b404d8bc135ec7c8cfba2d733a795f95a8e0794844c
                                                                                          • Opcode Fuzzy Hash: b987b89368e70cbf7d014c55fee4dbd9c34c349e502c2f5e7c308de05bccdea8
                                                                                          • Instruction Fuzzy Hash: C581AA79906228CFCB64DF74D98969DB7B2BF89305F1041EAE44A62350DB359EC2CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 490ee8b06acaf00c8e51111310944ea704818f89b74099ec12c487981ed5882c
                                                                                          • Instruction ID: 2d3f425b1530e8b637831ac2ac247b12b54d495c0f27f9f4dd56bfa5b61a0495
                                                                                          • Opcode Fuzzy Hash: 490ee8b06acaf00c8e51111310944ea704818f89b74099ec12c487981ed5882c
                                                                                          • Instruction Fuzzy Hash: 7171CA79906228CFCB64DF74D98969CB7B2BF89305F1041EAE44A62350DB359EC2CF61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 3de2d15866cadd83bd71ed0a52ec5541953be89cce70f3a94ed8c1cee952eac7
                                                                                          • Instruction ID: 2bb7601203ed08420b3730c7ad5a273c5e80d43131704090b9de4686750f766b
                                                                                          • Opcode Fuzzy Hash: 3de2d15866cadd83bd71ed0a52ec5541953be89cce70f3a94ed8c1cee952eac7
                                                                                          • Instruction Fuzzy Hash: A571CC79906228CFCB64DF74D98969CB7B2BF89305F1041EAE44A62340DB359EC2CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: d5a5380a8cbba8f87ac5b368175ddd36c1e61e682b818e112f3541e364e03ce8
                                                                                          • Instruction ID: d0ca5a87c56802ec876c4b8fab5e4411e517028810ad7e73f3c033b0381a4ba1
                                                                                          • Opcode Fuzzy Hash: d5a5380a8cbba8f87ac5b368175ddd36c1e61e682b818e112f3541e364e03ce8
                                                                                          • Instruction Fuzzy Hash: B761CA79906228CFCB64DF74D98969CB7B2BF85305F1041EAE44A62340DB359EC6CF11
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • GetUserNameW.ADVAPI32(00000000,00000000), ref: 05D35B5B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: NameUser
                                                                                          • String ID:
                                                                                          • API String ID: 2645101109-0
                                                                                          • Opcode ID: 693194eaf1dec253dffb4db7d98aa5d0a72b0513e20786fa30a2c0a3f7639b94
                                                                                          • Instruction ID: c862aff9802aace520f16511b2514e2e8fb6af102a50d6e4729dcd7f5cb12936
                                                                                          • Opcode Fuzzy Hash: 693194eaf1dec253dffb4db7d98aa5d0a72b0513e20786fa30a2c0a3f7639b94
                                                                                          • Instruction Fuzzy Hash: 515102B0D002188FDB14CFA9D899BDDBBF1BF49314F15812AE816AB350D774A844CF95
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • GetUserNameW.ADVAPI32(00000000,00000000), ref: 05D35B5B
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: NameUser
                                                                                          • String ID:
                                                                                          • API String ID: 2645101109-0
                                                                                          • Opcode ID: a8c726b255c44ea2a768c898686a757ec9a9bb9a5abc7cce8c3660bcf76af823
                                                                                          • Instruction ID: 9f5170370a1f3f62cac31a2b8d271c2f2dd223c03c3734cf1113dbfcf0867e20
                                                                                          • Opcode Fuzzy Hash: a8c726b255c44ea2a768c898686a757ec9a9bb9a5abc7cce8c3660bcf76af823
                                                                                          • Instruction Fuzzy Hash: AE5110B0D002588FDB18CFA9D899BDDBBF1BF49314F14812AE816AB390D774A844CF94
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 0476aca559b657af33ac823f4ae41dea79abeec29c2734a0461ee45e5f01ca6a
                                                                                          • Instruction ID: 8846552d3157f3b68e7f1e85cb72603936a1dcbc45f9a6a55a05b113dd728132
                                                                                          • Opcode Fuzzy Hash: 0476aca559b657af33ac823f4ae41dea79abeec29c2734a0461ee45e5f01ca6a
                                                                                          • Instruction Fuzzy Hash: 1161BB79902228CFCB64DF64D98969CB7B2BF89305F5041EAE44A63340DB359EC6CF11
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: f602beaab72be335a9ff4a39740eb441b1fe26a77a7ce4e6ad345d80889a9d9c
                                                                                          • Instruction ID: c6aacd610bd18a767617bed332f17e2d0cdfcc52eba464b67c9221a08af4de50
                                                                                          • Opcode Fuzzy Hash: f602beaab72be335a9ff4a39740eb441b1fe26a77a7ce4e6ad345d80889a9d9c
                                                                                          • Instruction Fuzzy Hash: E751BA79902228CFCB64DF64D98969CB7B2BF85305F5041EAE44AA3350DB359EC2CF61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 8b31107453eb673b77cab5be6a7c38da24c6cef28f6d31b4347cfaae982743ba
                                                                                          • Instruction ID: baf175ae9028fa5bceed9ba87991ad3b3b4ae8b0b925f5592a69b878711b5458
                                                                                          • Opcode Fuzzy Hash: 8b31107453eb673b77cab5be6a7c38da24c6cef28f6d31b4347cfaae982743ba
                                                                                          • Instruction Fuzzy Hash: 4151D979902228CFCB64DF64D98969CB7B2BF85305F5041EAE44AA3350DB359EC2CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 05E8F211
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423690749.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e80000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: QueryValue
                                                                                          • String ID:
                                                                                          • API String ID: 3660427363-0
                                                                                          • Opcode ID: 27efa5269d34bb08caf7d9e52a382bfc1f8d257e590b0a2c7a35c885ef02f808
                                                                                          • Instruction ID: 5488fb05d0a73416a645c35559dc51b1673108786ba0830e24948b68fa6818ef
                                                                                          • Opcode Fuzzy Hash: 27efa5269d34bb08caf7d9e52a382bfc1f8d257e590b0a2c7a35c885ef02f808
                                                                                          • Instruction Fuzzy Hash: 6A4125B0E04318DFDB10DF99C884A9EBBF5BF48304F15816AE869AB354D774A805CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 05E8EF54
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423690749.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e80000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: Open
                                                                                          • String ID:
                                                                                          • API String ID: 71445658-0
                                                                                          • Opcode ID: 4480ebd539694ac1bd33734ab1ca2da1eb66901ab20d87d03872f4b12456cd19
                                                                                          • Instruction ID: 3de9d0d0c205f11191a48b194285fd91f4b2ac0ceb1b212121c54432a0e21b1b
                                                                                          • Opcode Fuzzy Hash: 4480ebd539694ac1bd33734ab1ca2da1eb66901ab20d87d03872f4b12456cd19
                                                                                          • Instruction Fuzzy Hash: 324169B0E05249CFEB00DFA8C548A9EFFF5BF48314F19816AD408AB381D7759845CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: bf4409d2d27c6eba59242284b246a96be89a4c727b08f3a84bfc2ac70ebd33fb
                                                                                          • Instruction ID: 6898a62c9037619b6b1771e845625e6306687906ea9c33a2abf38940d25b6231
                                                                                          • Opcode Fuzzy Hash: bf4409d2d27c6eba59242284b246a96be89a4c727b08f3a84bfc2ac70ebd33fb
                                                                                          • Instruction Fuzzy Hash: CE51D979902228CFCB64DF64D98969CB7B2BF85305F5041EAE44AA3350DB359EC2CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 337b784b21ec4487aaf68f0961cf94140967becc25e889be4b736072f33e38aa
                                                                                          • Instruction ID: 4bfe80b8d11f3bc379b628f1880393d5fd7179330e8ea98de49a36fac5335fd8
                                                                                          • Opcode Fuzzy Hash: 337b784b21ec4487aaf68f0961cf94140967becc25e889be4b736072f33e38aa
                                                                                          • Instruction Fuzzy Hash: 3251CB79902228CFCB64DF64D98969CB7B2BF85305F1041EAE54A63350DB359EC2CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: baeb8cdd218c936100b828617dd61375dfb9a300b42b5ca6b92b9e5f4b21199b
                                                                                          • Instruction ID: dc6589d343f9fdaa23a35b7bbab66f2daed2ee06a0533b6732549cf036ddcdf0
                                                                                          • Opcode Fuzzy Hash: baeb8cdd218c936100b828617dd61375dfb9a300b42b5ca6b92b9e5f4b21199b
                                                                                          • Instruction Fuzzy Hash: 9B41B879902228CFCB64DF64D98969DB7B2BF85305F1041EAE54AA2340DB359EC2CF61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • LoadLibraryA.KERNELBASE(?), ref: 04D7D4C2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.420414324.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_4d70000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID:
                                                                                          • API String ID: 1029625771-0
                                                                                          • Opcode ID: 718a9eec8ba0a3c9cc232068a752be92025e787c3faf8c16a6e8d7387895d65c
                                                                                          • Instruction ID: a3715145967f3ed5d7f0508f02a1fd24f81febc659bb608d0eafcc62e4b71c29
                                                                                          • Opcode Fuzzy Hash: 718a9eec8ba0a3c9cc232068a752be92025e787c3faf8c16a6e8d7387895d65c
                                                                                          • Instruction Fuzzy Hash: CC3123B0D002599FDB24CFA9C8847AEBBF2FF08318F148529E815A7380E774A845CF95
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • LoadLibraryA.KERNELBASE(?), ref: 04D7D4C2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.420414324.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_4d70000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID:
                                                                                          • API String ID: 1029625771-0
                                                                                          • Opcode ID: 035afa5159799291140c07f76410b977770905cf530cc02f5dddf7e832ec0045
                                                                                          • Instruction ID: 9d9ceeb70d9d0742833e9287bc0881ed0f5d2dd7a0b0c6c1bd44cdcd8e5a4068
                                                                                          • Opcode Fuzzy Hash: 035afa5159799291140c07f76410b977770905cf530cc02f5dddf7e832ec0045
                                                                                          • Instruction Fuzzy Hash: 3C3132B0D402599FDB14CFA8D8847EEBBF2BF08318F14852AE815A7380E774A445CF95
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 05E8F211
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423690749.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e80000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: QueryValue
                                                                                          • String ID:
                                                                                          • API String ID: 3660427363-0
                                                                                          • Opcode ID: 690d48f21ce2a05bb42494facd553af6f7e36330b2fba3eefd9db03618d67546
                                                                                          • Instruction ID: 1f537c45482cda46c1bd44b61bd40cace83af24713136bf0647031845dcc2472
                                                                                          • Opcode Fuzzy Hash: 690d48f21ce2a05bb42494facd553af6f7e36330b2fba3eefd9db03618d67546
                                                                                          • Instruction Fuzzy Hash: 8531F2B1D04258DFCB20DF9AD884ADEBBF5BF48314F54802AE869AB314D774A945CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 83765ff83d4064347a747ff4b30771b393171e56bc8354d4ff60efef142c22fd
                                                                                          • Instruction ID: 5b1e0c0e3cad49dc29327e45dfb263d95aaa29fd2ec59f74d3ef6c8346b9c675
                                                                                          • Opcode Fuzzy Hash: 83765ff83d4064347a747ff4b30771b393171e56bc8354d4ff60efef142c22fd
                                                                                          • Instruction Fuzzy Hash: 8341B979902228CFCB64DF64D98969DB7B2BF85305F1041EAE54AA2340DB359EC2CF21
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • DeleteFileW.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,05D3721D), ref: 05D37300
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DeleteFile
                                                                                          • String ID:
                                                                                          • API String ID: 4033686569-0
                                                                                          • Opcode ID: 3e73093b6092de306d23a3766cfb960929c38a71de3e4616a470d59567bac5d7
                                                                                          • Instruction ID: 9ae41a991df032d4a968491bcdc6147f0e135c23b1c09edd1cc40ab41f1d5e48
                                                                                          • Opcode Fuzzy Hash: 3e73093b6092de306d23a3766cfb960929c38a71de3e4616a470d59567bac5d7
                                                                                          • Instruction Fuzzy Hash: B131CFB0D086859FDB00CFAAD94479EBFF0FF49310F05816AD449A7351D738A945CBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 05E8EF54
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423690749.0000000005E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E80000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e80000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: Open
                                                                                          • String ID:
                                                                                          • API String ID: 71445658-0
                                                                                          • Opcode ID: c2d557c10af136a36021b42c5e85435ffd8c21463fbf94d8305e6008e44b8841
                                                                                          • Instruction ID: 6e6e4df5d42fee39be776b28fe509cc61f6669418bd3118f727ab9d4bbaca9e4
                                                                                          • Opcode Fuzzy Hash: c2d557c10af136a36021b42c5e85435ffd8c21463fbf94d8305e6008e44b8841
                                                                                          • Instruction Fuzzy Hash: BB31F2B0D052599FDB10DF99C588A9EFBF9BF48304F29816AE409AB340C7759845CFA4
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: e7fb60e949a78ab89b0fcaa91cee83ba083e3500647969ceb222c33d77ed7f7d
                                                                                          • Instruction ID: b2f5840f30fb6070e0977d17792045a39740b433bdb2d9e1402dff8967a2692e
                                                                                          • Opcode Fuzzy Hash: e7fb60e949a78ab89b0fcaa91cee83ba083e3500647969ceb222c33d77ed7f7d
                                                                                          • Instruction Fuzzy Hash: D641CA79906228CFCB64DF64D98969DB7B2FF85305F1041EAE44AA2340CB359EC2CF11
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 003b1785503f81920be797fb536b2895f23cf533ceebbdfd61f38103192de6ea
                                                                                          • Instruction ID: b7d50b10d1c004153ff2d5aeac1b2832a4e2e4011121f46700a5177d8b8842e4
                                                                                          • Opcode Fuzzy Hash: 003b1785503f81920be797fb536b2895f23cf533ceebbdfd61f38103192de6ea
                                                                                          • Instruction Fuzzy Hash: 0B31BA79A06228CFCB64DF64D98969DB7B2FF85305F1041EAE54AA2340CB359E82CF51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 855e6c8852daacee8f0571083e1634e7222c35f0aea7ed078cd712ecf406fe3e
                                                                                          • Instruction ID: 3a7be7140e51d511c65a549df744942a10ee8ecbbb7db236981ece804d8219ba
                                                                                          • Opcode Fuzzy Hash: 855e6c8852daacee8f0571083e1634e7222c35f0aea7ed078cd712ecf406fe3e
                                                                                          • Instruction Fuzzy Hash: DF31CA79A06228CFCB64DF64D88969DB7B2FF85305F1041EAE54AA2340CB359EC2CF51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • DeleteFileW.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,05D3721D), ref: 05D37300
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DeleteFile
                                                                                          • String ID:
                                                                                          • API String ID: 4033686569-0
                                                                                          • Opcode ID: 766ab9c7859d89335ad3d786440cb1c0395f01ea0cc9bf03351dd4bcd3455b34
                                                                                          • Instruction ID: 383dbe1cb9108c3339f54eaeb89d3ecd45a01ea4e3f214ff200d8b5c78bec6a6
                                                                                          • Opcode Fuzzy Hash: 766ab9c7859d89335ad3d786440cb1c0395f01ea0cc9bf03351dd4bcd3455b34
                                                                                          • Instruction Fuzzy Hash: B82129B1C0461A9BCB10DF9AC44579EFBF4FB48324F15852AD819B7640D734A944CFE5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: a3568de9b1d88651fa7b9b200cbd2b43c86b36bf7d557192f33aa6018922112a
                                                                                          • Instruction ID: fb700f291ebb9724855d85782afb79e88051ec4f5162a577e0ec5085a72d4d40
                                                                                          • Opcode Fuzzy Hash: a3568de9b1d88651fa7b9b200cbd2b43c86b36bf7d557192f33aa6018922112a
                                                                                          • Instruction Fuzzy Hash: A121DB79A06228CFCB64DF64D88969DB772FF85305F1041EAE54A92340CB319EC2CF51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • RtlEncodePointer.NTDLL(00000000), ref: 04D7559A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.420414324.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_4d70000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: EncodePointer
                                                                                          • String ID:
                                                                                          • API String ID: 2118026453-0
                                                                                          • Opcode ID: 4652270ba7cb6774288f1e64f94b4c4ca3aa17d9e2b1701b268735a3d7f4a038
                                                                                          • Instruction ID: 4f1a06afef9d76f1d7ac5b7876c5ece4fe96d0e244d9e9435569205ad6e48e8c
                                                                                          • Opcode Fuzzy Hash: 4652270ba7cb6774288f1e64f94b4c4ca3aa17d9e2b1701b268735a3d7f4a038
                                                                                          • Instruction Fuzzy Hash: E32186B1C01344CFDB20DFA9E9497DABBF8FB08314F14842AD904A6640E738A544CFA6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • RtlEncodePointer.NTDLL(00000000), ref: 04D7559A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.420414324.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_4d70000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: EncodePointer
                                                                                          • String ID:
                                                                                          • API String ID: 2118026453-0
                                                                                          • Opcode ID: e1e2bd7774050fff07a0895616ea56fa7d5d3f559dd77261e06d503753687d53
                                                                                          • Instruction ID: 4db7783cca970d2cd87540a360e3546afc8deb246ee1b0fb534d71adaa7e9180
                                                                                          • Opcode Fuzzy Hash: e1e2bd7774050fff07a0895616ea56fa7d5d3f559dd77261e06d503753687d53
                                                                                          • Instruction Fuzzy Hash: 1E1189B0901344CFDB20DFA9D8487DABBF8FB48314F148429D405A7641D739A944CFA6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 44272c3a3bfe7d97eae234cf9f5dd4033718b34f0e4afd634b6b7ad4e3048575
                                                                                          • Instruction ID: 508acaa1b12c010bfb648db7d9e1098f7d70634fbe93bce950a1acb8eb703973
                                                                                          • Opcode Fuzzy Hash: 44272c3a3bfe7d97eae234cf9f5dd4033718b34f0e4afd634b6b7ad4e3048575
                                                                                          • Instruction Fuzzy Hash: 0021A979A06228CFCB64DF64D98969DB7B2FF49305F1041EAE54A93340CB319E82CF51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • VirtualAllocExNuma.KERNELBASE(?,?,?,?,?,?), ref: 04D70B1E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.420414324.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_4d70000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocNumaVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 4233825816-0
                                                                                          • Opcode ID: f50ef48e60497e09dfe18f82a8121ac1a5a7c796bafb95a7bfaf12064fedca6b
                                                                                          • Instruction ID: 84c80cd23d9d5acd5ef95566a90b897b16c9efea3eccc74ceb5e8198bc9b2435
                                                                                          • Opcode Fuzzy Hash: f50ef48e60497e09dfe18f82a8121ac1a5a7c796bafb95a7bfaf12064fedca6b
                                                                                          • Instruction Fuzzy Hash: 831104B19042499FCB10CF9AD888BDFBBF8FB88324F148419E519A7250D775A944CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          • KiUserExceptionDispatcher.NTDLL ref: 05D38A92
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.422394621.0000000005D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D30000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5d30000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: DispatcherExceptionUser
                                                                                          • String ID:
                                                                                          • API String ID: 6842923-0
                                                                                          • Opcode ID: 416c8a2f6b2e74ade340f8425cc76c7afef2af5ba7a1133d7ea5bafea686714c
                                                                                          • Instruction ID: 787102b83f8e10697bce33817a918eb7ee554291f4c16e8be2fb081002f3fbc7
                                                                                          • Opcode Fuzzy Hash: 416c8a2f6b2e74ade340f8425cc76c7afef2af5ba7a1133d7ea5bafea686714c
                                                                                          • Instruction Fuzzy Hash: 0611B979A06229CFCB64DF68D88969DB772FF89345F1041EAD54A93340CB315E82CF51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: D0tl
                                                                                          • API String ID: 0-504259687
                                                                                          • Opcode ID: 39abed2145b0ff809f38ac076c15cb43cc1ed1e18aff22d4bd81d1f00ecaa148
                                                                                          • Instruction ID: c8e76004c5e98a6295a631aa140f91307ff32c8a6930d82ceed602221f03ec01
                                                                                          • Opcode Fuzzy Hash: 39abed2145b0ff809f38ac076c15cb43cc1ed1e18aff22d4bd81d1f00ecaa148
                                                                                          • Instruction Fuzzy Hash: F141B275B086198FD714AF78C865A6E77A7EBC8380F154429D906DB388CF78DC0287E6
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.420414324.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_4d70000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: Sleep
                                                                                          • String ID:
                                                                                          • API String ID: 3472027048-0
                                                                                          • Opcode ID: e853fd86b8bea59e7fcdda68205253a307ae2ca206c6c2284e85a67a93399090
                                                                                          • Instruction ID: a9558b868024e2d66fb6480fc6e782eb080b3098795ea648b556d7fb05bf6b94
                                                                                          • Opcode Fuzzy Hash: e853fd86b8bea59e7fcdda68205253a307ae2ca206c6c2284e85a67a93399090
                                                                                          • Instruction Fuzzy Hash: 7F11D0B1804259CFDB20DF9AD488BDEBBF4EB48324F14841AD519A7240D774A945CFE1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.420414324.0000000004D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 04D70000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_4d70000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID: Sleep
                                                                                          • String ID:
                                                                                          • API String ID: 3472027048-0
                                                                                          • Opcode ID: a705ca7407b3de8eff09b874d3a551c092930d7fb95012566b2b621a9e685c4c
                                                                                          • Instruction ID: aa9695c780165c9dfa8c59fdaca8b6d2a7453a68edcb20abb73a5952d4cf65d8
                                                                                          • Opcode Fuzzy Hash: a705ca7407b3de8eff09b874d3a551c092930d7fb95012566b2b621a9e685c4c
                                                                                          • Instruction Fuzzy Hash: 7111E2B1804259CFDB20DF9AD488BDEFBF4EB48324F14841AD519A7240D774A944CFE5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6c34d42647dd20156157549c14d1864d8f6aa9cd5e9d1095c46461d6f802d795
                                                                                          • Instruction ID: 9a76015d89169dd07280b44bf7d4a805346bf8496f0fc9a956de3fe61455b389
                                                                                          • Opcode Fuzzy Hash: 6c34d42647dd20156157549c14d1864d8f6aa9cd5e9d1095c46461d6f802d795
                                                                                          • Instruction Fuzzy Hash: 52029B30F442049FDB04AB74D82876E7BA2EF89398F158529E916EB391EF34DC05CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 94e0193249c1bd8e0939e62d867dba754539252504165c1fa92bc21dce7a372b
                                                                                          • Instruction ID: 3203fe651ea4b0ced4b32f2fac44473c39e6fb64129a251f07c318b4b7a1b5c5
                                                                                          • Opcode Fuzzy Hash: 94e0193249c1bd8e0939e62d867dba754539252504165c1fa92bc21dce7a372b
                                                                                          • Instruction Fuzzy Hash: 97E10331B086058FDB14DB68C8546BE77F6EF85384F05846AE186DB391DB34DC46CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 859953ff57cd540fdbdfa58c2c06142e2d69f2c7f32c40fbab1cddd0e0b43d94
                                                                                          • Instruction ID: d2900158e759640d07263bc6386f26be13929adad9b53af06674d38eeacfdbd7
                                                                                          • Opcode Fuzzy Hash: 859953ff57cd540fdbdfa58c2c06142e2d69f2c7f32c40fbab1cddd0e0b43d94
                                                                                          • Instruction Fuzzy Hash: EDD1F174A042088FCB14DF68C854AAEBBFAFF89394F11846AD149DB781DB31EC45CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2f84f151c52481bd86cc512474d13eaa3d7232c1f1345205831f9bf4df5dbcc3
                                                                                          • Instruction ID: 85ac6bc6161c15ad15dbcdfbab3406d6621d678f454086af0300acb85eae5bbf
                                                                                          • Opcode Fuzzy Hash: 2f84f151c52481bd86cc512474d13eaa3d7232c1f1345205831f9bf4df5dbcc3
                                                                                          • Instruction Fuzzy Hash: FEC1823470D7818FE70697649C156A67FB2EB86388F1680E7D184CF393EA68DC0AC761
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ab3d99f412a94b13127f4067f2f650ae6b51a8b40c02f5733669221a4e57711c
                                                                                          • Instruction ID: 9acc655c0ba97078d8734f0207b5b22c0c763641957814ec09ff6598446a3460
                                                                                          • Opcode Fuzzy Hash: ab3d99f412a94b13127f4067f2f650ae6b51a8b40c02f5733669221a4e57711c
                                                                                          • Instruction Fuzzy Hash: 02C19B34B452048FDB04DFB8D888AADBBF2EF89288F61846AE406D7355DB34EC45CB50
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fa6a9eb007aca4bff3a6513329a805d7ae670d46b2e254294fc896e7a6685305
                                                                                          • Instruction ID: 17c03657890bdd175c8b84f64591633d35ea737d1d7a0e2d36372b1461ca471a
                                                                                          • Opcode Fuzzy Hash: fa6a9eb007aca4bff3a6513329a805d7ae670d46b2e254294fc896e7a6685305
                                                                                          • Instruction Fuzzy Hash: E0A1CE71A44249DFCF05CFA8C884AEDBBB6FF89390F158156E885EB350D770A855CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2eba4104d4bc1a7822574a2286602d7d57045794329395e5f910911af4b25eb7
                                                                                          • Instruction ID: db09221adcac25a07c20bef79e1d07bbc1ed89196418e15bb868e7574e57ceb1
                                                                                          • Opcode Fuzzy Hash: 2eba4104d4bc1a7822574a2286602d7d57045794329395e5f910911af4b25eb7
                                                                                          • Instruction Fuzzy Hash: 48814734754104CFCB44EF68D8989ADBBF2EF89358B1184A9E50ADB366DB31EC01CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9df9bcfb1401448ad11b0d9e8014b392a19f59232b4fbbdaf9a9ee3ecb0e2507
                                                                                          • Instruction ID: ea0013a400924cc060737d37df8ebe15d6982285d73a5a081f762dc612222de2
                                                                                          • Opcode Fuzzy Hash: 9df9bcfb1401448ad11b0d9e8014b392a19f59232b4fbbdaf9a9ee3ecb0e2507
                                                                                          • Instruction Fuzzy Hash: 4B619270B501188BEF249BA8C894BBEB7B6FB893D8F115425D485D7381DB39DC418761
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9121ee197407763b0533a226d1f4b83e00926193f5bde4d759e0ec9e8b1808bb
                                                                                          • Instruction ID: 51971b249cd08643e1b72ed4e1793421aebf576f5df4e38431db9c8f0752c321
                                                                                          • Opcode Fuzzy Hash: 9121ee197407763b0533a226d1f4b83e00926193f5bde4d759e0ec9e8b1808bb
                                                                                          • Instruction Fuzzy Hash: CA61B230B093409FEB0197B8981876E7BE2EBCA248F1580BAD448CB392EF38DC45C751
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f578f6e995d4e124f73459a6dd6edf5623549301eada25b79a0d9f081dd04779
                                                                                          • Instruction ID: beef424de6433c244158685d60c49104c2d0114a89abf7bc52c3a6c922252e16
                                                                                          • Opcode Fuzzy Hash: f578f6e995d4e124f73459a6dd6edf5623549301eada25b79a0d9f081dd04779
                                                                                          • Instruction Fuzzy Hash: 4E714934744205CFDB65DF28C898AAE7BEAFF49688F1510A5E852CB3A1DB70DC41CB51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0414281645b24063f4aaee25edd1d74f03c5546a70d32bf3778f2b88aebeca57
                                                                                          • Instruction ID: f92f2af5cb59fd769947dd4b70de9da00b916a208218c24f2258e4e8c3c95183
                                                                                          • Opcode Fuzzy Hash: 0414281645b24063f4aaee25edd1d74f03c5546a70d32bf3778f2b88aebeca57
                                                                                          • Instruction Fuzzy Hash: 36712834754200CFCB44EF68D898969BBF2EF8935871684A9E506CB376DB71EC05CB51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 87b028bad100b8d2b926726fac5384ace94cff5267ca597ae4daadd336d3e20c
                                                                                          • Instruction ID: 059ec7eeb492617e235c4d7f0bc96818cbb0b59d57bfd0b610745c2348c5cd5c
                                                                                          • Opcode Fuzzy Hash: 87b028bad100b8d2b926726fac5384ace94cff5267ca597ae4daadd336d3e20c
                                                                                          • Instruction Fuzzy Hash: 69617C70E047498FDB11CFA5C540AAEBBF7BF89394F20825AD885EB245E770A945CF40
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cdbe8f741d39bc858e04cf97abb2f5c3e2aab77f10b2b11728134b8393df6c63
                                                                                          • Instruction ID: e1cdc551a713109b4279eff506e9a71cba44527b5f6a840cbda7a592eb73460a
                                                                                          • Opcode Fuzzy Hash: cdbe8f741d39bc858e04cf97abb2f5c3e2aab77f10b2b11728134b8393df6c63
                                                                                          • Instruction Fuzzy Hash: 6F516B70E047498FDB11CFA5C540AEDBBF7BF89384F24825AE885AB245E770A985CF40
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4edd9ed013164fc401419ece1a94c74aa2fe298c9bcb148d2e4d07ddb7e5c578
                                                                                          • Instruction ID: 42717bb711dfe9443aa03b6b5ce6ebd9d9b040c55d39db047a0a77923fc84d03
                                                                                          • Opcode Fuzzy Hash: 4edd9ed013164fc401419ece1a94c74aa2fe298c9bcb148d2e4d07ddb7e5c578
                                                                                          • Instruction Fuzzy Hash: 65414234F40205CFDB14EB74D81977E7AA6AB88299F148429E846E7790EF74DC41CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8d9de31a727539266348f9e312ebc4c7b1eb142341e8dfc3cb6386628bd9c069
                                                                                          • Instruction ID: 2820620aa29db3dce279f8b82ed4db7e0478ab9fc5cc8b6a79a6b71c87c7de29
                                                                                          • Opcode Fuzzy Hash: 8d9de31a727539266348f9e312ebc4c7b1eb142341e8dfc3cb6386628bd9c069
                                                                                          • Instruction Fuzzy Hash: 2C41CF71A44209DFCF01CFA4C844AEDBBB6BF493D4F019152E895EB291E371D810CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a181ca332d6d58fc342731eeca9fbe2e1341e85aa7da7e07392b08f4c504a2a3
                                                                                          • Instruction ID: b5367a31238327a3ea8f515ac3a84c822ff75ab93cce1268c7c14bcebc47dcea
                                                                                          • Opcode Fuzzy Hash: a181ca332d6d58fc342731eeca9fbe2e1341e85aa7da7e07392b08f4c504a2a3
                                                                                          • Instruction Fuzzy Hash: 00319E71B482008BDB04ABB4D9196AE77F7AB88284B508469D406EB395EF34DC41CBE5
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6637cd45d43cd11f23912f5eccb35d051814278954360affd60484272250c4a7
                                                                                          • Instruction ID: a910cd6486f2eb35faf0cd557fee1acdd225bd655255d4717310aec73f1ca42e
                                                                                          • Opcode Fuzzy Hash: 6637cd45d43cd11f23912f5eccb35d051814278954360affd60484272250c4a7
                                                                                          • Instruction Fuzzy Hash: EB3105316482059FDB10CF68C844BAA7BBBAF453D4F0686A6D4D5DB3A2D331E800CB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.411973661.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_ddd000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 2cfef9543896c71aaf5d0558487fe589c7ec0461d7be9bce1fb9c8a99d335f66
                                                                                          • Instruction ID: 4be4010dbe1cd20b167ffb5a5bef4dc1f1bbbcc2e5dacd844a122b1d5cb91a13
                                                                                          • Opcode Fuzzy Hash: 2cfef9543896c71aaf5d0558487fe589c7ec0461d7be9bce1fb9c8a99d335f66
                                                                                          • Instruction Fuzzy Hash: 532125B1508240DFDF10CF14E9C0B26BB66FB99328F24856AE9094B346C336D856CBB1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.411973661.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_ddd000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 1ef6ca9795a4c73f052fcac6cf0b3dfb0b13ac6a38c98a2cede6e3b89c098329
                                                                                          • Instruction ID: c3d23644fe0a1f1052b71f2f2cabefd223ba3861bb0f92f1e840b4035cbf7477
                                                                                          • Opcode Fuzzy Hash: 1ef6ca9795a4c73f052fcac6cf0b3dfb0b13ac6a38c98a2cede6e3b89c098329
                                                                                          • Instruction Fuzzy Hash: 4D2122B1508240EFDF00DF54D9C0B26BB66FB98324F24C96AE9494B306C336E846CBB1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.412065580.0000000000DED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DED000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_ded000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d3bdbcee66f66b9a0e6466952791455b625117a9bb297217ae35baa2c9baecc5
                                                                                          • Instruction ID: c3ad5492e382fb6f7c0e9d6e655fde308c1fb975436f8462bf28311eeb828937
                                                                                          • Opcode Fuzzy Hash: d3bdbcee66f66b9a0e6466952791455b625117a9bb297217ae35baa2c9baecc5
                                                                                          • Instruction Fuzzy Hash: 912107B1608280DFDB04EF15D8C4B26BB65FB88714F24C969D9494B386C336D846CAB1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0435cf7c7fc1bcaf1aeee6f258e9142a878e1e34a0d00921fc6483bed8aaef26
                                                                                          • Instruction ID: 756bcb85e101cfb6da5ceb9b30b50f705fdc0715edac8bffd71bda0a4c4524de
                                                                                          • Opcode Fuzzy Hash: 0435cf7c7fc1bcaf1aeee6f258e9142a878e1e34a0d00921fc6483bed8aaef26
                                                                                          • Instruction Fuzzy Hash: 91113A31F492249FEB119F64C44966E77A3EFC61E4F19C4A9C4855F302E7319C42C796
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.411973661.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_ddd000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f3cb3e44370515572fb733351235636ff71e6e31c7d1222fc57b3ac88bc4a795
                                                                                          • Instruction ID: 9ae896d2e5cab2ad2664299b8aa687bda02b7d362e8a62f868adecf78e5acd67
                                                                                          • Opcode Fuzzy Hash: f3cb3e44370515572fb733351235636ff71e6e31c7d1222fc57b3ac88bc4a795
                                                                                          • Instruction Fuzzy Hash: 3511D376404280DFDF11CF14D9C4B16BF72FB95324F2886AAD8054B756C33AD856CBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.411973661.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_ddd000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f3cb3e44370515572fb733351235636ff71e6e31c7d1222fc57b3ac88bc4a795
                                                                                          • Instruction ID: 20033ec17bae86ac02ffaa68bef27af5ccd906b3fe9b09a0f06b4ed5d7ef2266
                                                                                          • Opcode Fuzzy Hash: f3cb3e44370515572fb733351235636ff71e6e31c7d1222fc57b3ac88bc4a795
                                                                                          • Instruction Fuzzy Hash: 77119D76404280DFDF11CF14D9C4B16BF62FB94324F28C6AAD8484A616C33AE85ACBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: be75495d86a4aaa1b54fb7fc7307adfc27afcd6a745fdc3e3cfe1ecf5af3f93e
                                                                                          • Instruction ID: 78aa5cbd281e81fac81ae40a5ba76cb5ec8c9ed4ebfd0f8581be5a64bc630bd4
                                                                                          • Opcode Fuzzy Hash: be75495d86a4aaa1b54fb7fc7307adfc27afcd6a745fdc3e3cfe1ecf5af3f93e
                                                                                          • Instruction Fuzzy Hash: 77F012353842148FD708DB2AE954D2A37EAFFC9A957054469F506CB361DE71EC018750
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 421be005fdab815a4ce87e39516e1dd3986930a5ad9201587fb8ffa5b820c5c7
                                                                                          • Instruction ID: 695a0f189c1fa5f43969e5e46a76a67ef1de8dff6a25370dce9656d3c4482615
                                                                                          • Opcode Fuzzy Hash: 421be005fdab815a4ce87e39516e1dd3986930a5ad9201587fb8ffa5b820c5c7
                                                                                          • Instruction Fuzzy Hash: 52F082353842048FE7089B29E964B2937E6EFC96D5B0640A8E946CB3B0DA71EC01C750
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.423422264.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_5e60000_RegSvcs.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c9f221101199ef8b210fcad0f822ad9c6caada9478bf85f594fa3feb2cfc48af
                                                                                          • Instruction ID: a080245780842c71b71e26f13a64413412dd6e37e3c2db3f8630cee3445ddd3a
                                                                                          • Opcode Fuzzy Hash: c9f221101199ef8b210fcad0f822ad9c6caada9478bf85f594fa3feb2cfc48af
                                                                                          • Instruction Fuzzy Hash: 23D01231B4993987165971ADA8109ED37DA97899F57001416D4898BB40DF65DC4143C9
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%