Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Telco 32pcs New Purchase Order.exe

Overview

General Information

Sample name:Telco 32pcs New Purchase Order.exe
Analysis ID:1519146
MD5:8d310f2e831174aac8eaa5eba20e87ad
SHA1:600ef55976b69523c7973c5d0aeeb91f3fdcf97e
SHA256:457b6241f125cd8c4f030e7b7f05829b89a5e831f624225cb70ea272ecd88876
Tags:AgentTeslaexeuser-cocaman
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Telco 32pcs New Purchase Order.exe (PID: 4136 cmdline: "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe" MD5: 8D310F2E831174AAC8EAA5EBA20E87AD)
    • powershell.exe (PID: 6836 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 3660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 6884 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 3564 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7348 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 1532 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp4878.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 2212 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • zBzzGAdzqF.exe (PID: 2768 cmdline: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe MD5: 8D310F2E831174AAC8EAA5EBA20E87AD)
    • schtasks.exe (PID: 7444 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp5C8D.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • zBzzGAdzqF.exe (PID: 7500 cmdline: "C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe" MD5: 8D310F2E831174AAC8EAA5EBA20E87AD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "mail@iaa-airferight.com", "Password": "Asaprocky11"}
SourceRuleDescriptionAuthorStrings
0000000F.00000002.2689631627.0000000003141000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    0000000F.00000002.2689631627.0000000003141000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000A.00000002.2689533130.0000000002C0C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000F.00000002.2689631627.0000000003165000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          0000000A.00000002.2689533130.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 12 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x316f7:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x31769:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x317f3:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x31885:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x318ef:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x31961:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x319f7:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31a87:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                10.2.Telco 32pcs New Purchase Order.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  10.2.Telco 32pcs New Purchase Order.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 12 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe", ParentImage: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe, ParentProcessId: 4136, ParentProcessName: Telco 32pcs New Purchase Order.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe", ProcessId: 6836, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe", ParentImage: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe, ParentProcessId: 4136, ParentProcessName: Telco 32pcs New Purchase Order.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe", ProcessId: 6836, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp5C8D.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp5C8D.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe, ParentImage: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe, ParentProcessId: 2768, ParentProcessName: zBzzGAdzqF.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp5C8D.tmp", ProcessId: 7444, ProcessName: schtasks.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 46.175.148.58, DestinationIsIpv6: false, DestinationPort: 25, EventID: 3, Image: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe, Initiated: true, ProcessId: 4508, Protocol: tcp, SourceIp: 192.168.2.8, SourceIsIpv6: false, SourcePort: 49711
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp4878.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp4878.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe", ParentImage: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe, ParentProcessId: 4136, ParentProcessName: Telco 32pcs New Purchase Order.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp4878.tmp", ProcessId: 1532, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe", ParentImage: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe, ParentProcessId: 4136, ParentProcessName: Telco 32pcs New Purchase Order.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe", ProcessId: 6836, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp4878.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp4878.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe", ParentImage: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe, ParentProcessId: 4136, ParentProcessName: Telco 32pcs New Purchase Order.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp4878.tmp", ProcessId: 1532, ProcessName: schtasks.exe
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://mail.iaa-airferight.comAvira URL Cloud: Label: malware
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "25", "Host": "mail.iaa-airferight.com", "Username": "mail@iaa-airferight.com", "Password": "Asaprocky11"}
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeReversingLabs: Detection: 44%
                    Source: Telco 32pcs New Purchase Order.exeReversingLabs: Detection: 44%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeJoe Sandbox ML: detected
                    Source: Telco 32pcs New Purchase Order.exeJoe Sandbox ML: detected
                    Source: Telco 32pcs New Purchase Order.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.8:49709 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.8:49712 version: TLS 1.2
                    Source: Telco 32pcs New Purchase Order.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: yuyGs.pdb source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.dr
                    Source: Binary string: yuyGs.pdbSHA256m source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.dr
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 4x nop then jmp 071DCB88h0_2_071DD062
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 4x nop then jmp 073EBA20h11_2_073EBEFA

                    Networking

                    barindex
                    Source: Yara matchFile source: 0.2.Telco 32pcs New Purchase Order.exe.3ded1d8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, type: UNPACKEDPE
                    Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                    Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                    Source: Joe Sandbox ViewIP Address: 46.175.148.58 46.175.148.58
                    Source: Joe Sandbox ViewASN Name: ASLAGIDKOM-NETUA ASLAGIDKOM-NETUA
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.8:49711 -> 46.175.148.58:25
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.iaa-airferight.com
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                    Source: zBzzGAdzqF.exe, 0000000F.00000002.2701127043.0000000006B52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mG
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                    Source: Telco 32pcs New Purchase Order.exe, 0000000A.00000002.2689533130.0000000002C0C000.00000004.00000800.00020000.00000000.sdmp, zBzzGAdzqF.exe, 0000000F.00000002.2689631627.0000000003165000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.iaa-airferight.com
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://s2.symcb.com0
                    Source: Telco 32pcs New Purchase Order.exe, 00000000.00000002.1460082719.0000000002B8C000.00000004.00000800.00020000.00000000.sdmp, Telco 32pcs New Purchase Order.exe, 0000000A.00000002.2689533130.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, zBzzGAdzqF.exe, 0000000B.00000002.1511440653.0000000002ECC000.00000004.00000800.00020000.00000000.sdmp, zBzzGAdzqF.exe, 0000000F.00000002.2689631627.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://www.symauth.com/cps0(
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: http://www.symauth.com/rpa00
                    Source: Telco 32pcs New Purchase Order.exe, 00000000.00000002.1461636343.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, Telco 32pcs New Purchase Order.exe, 0000000A.00000002.2685907689.0000000000435000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: Telco 32pcs New Purchase Order.exe, 00000000.00000002.1461636343.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, Telco 32pcs New Purchase Order.exe, 0000000A.00000002.2689533130.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, zBzzGAdzqF.exe, 0000000F.00000002.2685915143.0000000000434000.00000040.00000400.00020000.00000000.sdmp, zBzzGAdzqF.exe, 0000000F.00000002.2689631627.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: Telco 32pcs New Purchase Order.exe, 0000000A.00000002.2689533130.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, zBzzGAdzqF.exe, 0000000F.00000002.2689631627.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: Telco 32pcs New Purchase Order.exe, 0000000A.00000002.2689533130.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, zBzzGAdzqF.exe, 0000000F.00000002.2689631627.00000000030F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drString found in binary or memory: https://static.wikia.nocookie.net/mitologa/images/a/a3/Imagen_por_defecto.png/revision/latest/thumbn
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.8:49709 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.8:49712 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, abAX9N.cs.Net Code: BFeixnEv
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3ded1d8.3.raw.unpack, abAX9N.cs.Net Code: BFeixnEv
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeWindow created: window name: CLIPBRDWNDCLASS

                    System Summary

                    barindex
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 10.2.Telco 32pcs New Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3ded1d8.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3ded1d8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: initial sampleStatic PE information: Filename: Telco 32pcs New Purchase Order.exe
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_011FD3640_2_011FD364
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_050F97000_2_050F9700
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_050F001F0_2_050F001F
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_050F00400_2_050F0040
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_050F96F20_2_050F96F2
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_056E950B0_2_056E950B
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_056E95180_2_056E9518
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_056EF12B0_2_056EF12B
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_056EF1380_2_056EF138
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_056E19980_2_056E1998
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071D00400_2_071D0040
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071DCAA80_2_071DCAA8
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071D36190_2_071D3619
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071D83B80_2_071D83B8
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071D91A00_2_071D91A0
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071D00060_2_071D0006
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071D6D100_2_071D6D10
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071D8C900_2_071D8C90
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071D8C800_2_071D8C80
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071D68B80_2_071D68B8
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 10_2_011CA96810_2_011CA968
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 10_2_011C4A9810_2_011C4A98
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 10_2_011C3E8010_2_011C3E80
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 10_2_011C41C810_2_011C41C8
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 10_2_011CF8A510_2_011CF8A5
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_0148D36411_2_0148D364
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E004011_2_073E0040
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073EB94011_2_073EB940
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E361911_2_073E3619
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E83B811_2_073E83B8
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E814811_2_073E8148
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E91A011_2_073E91A0
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E001E11_2_073E001E
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073EEF3011_2_073EEF30
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E6D1011_2_073E6D10
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E8C9011_2_073E8C90
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E8C8011_2_073E8C80
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E68A511_2_073E68A5
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_08C0199811_2_08C01998
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_08C0F12B11_2_08C0F12B
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_08C0F13811_2_08C0F138
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_08C0950B11_2_08C0950B
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_08C0951811_2_08C09518
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_0179A96815_2_0179A968
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_01794A9815_2_01794A98
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_01793E8015_2_01793E80
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_017941C815_2_017941C8
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_0179F8A515_2_0179F8A5
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_05D55D3015_2_05D55D30
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_05D591F015_2_05D591F0
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_05D5A14015_2_05D5A140
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_05D5E0C815_2_05D5E0C8
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_05D545A015_2_05D545A0
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_05D5357815_2_05D53578
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_05D53CA015_2_05D53CA0
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_05D5565015_2_05D55650
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_05D5C61815_2_05D5C618
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_05D5033815_2_05D50338
                    Source: Telco 32pcs New Purchase Order.exeStatic PE information: invalid certificate
                    Source: Telco 32pcs New Purchase Order.exe, 00000000.00000000.1434374405.0000000000772000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameyuyGs.exe: vs Telco 32pcs New Purchase Order.exe
                    Source: Telco 32pcs New Purchase Order.exe, 00000000.00000002.1483913264.0000000008D7A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Telco 32pcs New Purchase Order.exe
                    Source: Telco 32pcs New Purchase Order.exe, 00000000.00000002.1482724477.00000000071E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Telco 32pcs New Purchase Order.exe
                    Source: Telco 32pcs New Purchase Order.exe, 00000000.00000002.1460082719.0000000002B8C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename8854fa4e-ee03-4899-b0c3-2df80b3f7614.exe4 vs Telco 32pcs New Purchase Order.exe
                    Source: Telco 32pcs New Purchase Order.exe, 00000000.00000002.1458787818.0000000000F3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Telco 32pcs New Purchase Order.exe
                    Source: Telco 32pcs New Purchase Order.exe, 00000000.00000002.1461636343.0000000003B49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename8854fa4e-ee03-4899-b0c3-2df80b3f7614.exe4 vs Telco 32pcs New Purchase Order.exe
                    Source: Telco 32pcs New Purchase Order.exe, 00000000.00000002.1461636343.0000000003B49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Telco 32pcs New Purchase Order.exe
                    Source: Telco 32pcs New Purchase Order.exe, 0000000A.00000002.2686390719.0000000000D59000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Telco 32pcs New Purchase Order.exe
                    Source: Telco 32pcs New Purchase Order.exe, 0000000A.00000002.2685907689.0000000000435000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename8854fa4e-ee03-4899-b0c3-2df80b3f7614.exe4 vs Telco 32pcs New Purchase Order.exe
                    Source: Telco 32pcs New Purchase Order.exeBinary or memory string: OriginalFilenameyuyGs.exe: vs Telco 32pcs New Purchase Order.exe
                    Source: Telco 32pcs New Purchase Order.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 10.2.Telco 32pcs New Purchase Order.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3ded1d8.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3ded1d8.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: Telco 32pcs New Purchase Order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: zBzzGAdzqF.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, RsYAkkzVoy.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, Kqqzixk.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, xROdzGigX.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, ywes.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, iPVW0zV.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, 1Pi9sgbHwoV.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, YUgDfWK2g4.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, YUgDfWK2g4.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, MarWtcu.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, qu4eVoHSPo9ejA6esY.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, qu4eVoHSPo9ejA6esY.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, qu4eVoHSPo9ejA6esY.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, IPKqHFaHGVDOvQLAAk.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, qu4eVoHSPo9ejA6esY.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, qu4eVoHSPo9ejA6esY.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, qu4eVoHSPo9ejA6esY.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, IPKqHFaHGVDOvQLAAk.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/15@2/2
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeFile created: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7452:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2212:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3564:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3660:120:WilError_03
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeFile created: C:\Users\user\AppData\Local\Temp\tmp4878.tmpJump to behavior
                    Source: Telco 32pcs New Purchase Order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Telco 32pcs New Purchase Order.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: Telco 32pcs New Purchase Order.exeReversingLabs: Detection: 44%
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeFile read: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp4878.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp5C8D.tmp"
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess created: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe "C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe"
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp4878.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp5C8D.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess created: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe "C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeSection loaded: edputil.dll
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: Telco 32pcs New Purchase Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Telco 32pcs New Purchase Order.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Telco 32pcs New Purchase Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: yuyGs.pdb source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.dr
                    Source: Binary string: yuyGs.pdbSHA256m source: Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.dr

                    Data Obfuscation

                    barindex
                    Source: Telco 32pcs New Purchase Order.exe, Home.cs.Net Code: InitializeComponent
                    Source: zBzzGAdzqF.exe.0.dr, Home.cs.Net Code: InitializeComponent
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.2bcdf8c.0.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.6da0000.5.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.2b6dc80.1.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, qu4eVoHSPo9ejA6esY.cs.Net Code: iIlL85sgd2 System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, qu4eVoHSPo9ejA6esY.cs.Net Code: iIlL85sgd2 System.Reflection.Assembly.Load(byte[])
                    Source: Telco 32pcs New Purchase Order.exeStatic PE information: 0xBA8721D6 [Sat Mar 2 02:49:58 2069 UTC]
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071DD732 pushfd ; ret 0_2_071DD764
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071DD788 pushfd ; ret 0_2_071DD7A4
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071DD7D6 pushfd ; ret 0_2_071DD7E4
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071DC471 pushfd ; ret 0_2_071DC472
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071D24CC pushfd ; ret 0_2_071D24CD
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071DB3E9 pushfd ; ret 0_2_071DB3F1
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071D5040 pushfd ; ret 0_2_071D5041
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071D2E6E pushfd ; ret 0_2_071D2E6F
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071D4D6F pushfd ; ret 0_2_071D4D8C
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071D9CC3 pushfd ; ret 0_2_071D9CC4
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071D4A29 pushad ; retf 0_2_071D4A35
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 0_2_071DD891 pushfd ; ret 0_2_071DD8AC
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeCode function: 10_2_011C0C45 push ebx; retf 10_2_011C0C52
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073EC620 pushfd ; ret 11_2_073EC63C
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073EC66E pushfd ; ret 11_2_073EC67C
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073EA518 pushfd ; ret 11_2_073EA534
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073EC5DA pushfd ; ret 11_2_073EC5FC
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073EA5C1 pushfd ; ret 11_2_073EA5C9
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E24CC pushfd ; ret 11_2_073E24CD
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073EB309 pushfd ; ret 11_2_073EB30A
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073EB2B3 pushfd ; ret 11_2_073EB2B4
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E5040 pushfd ; ret 11_2_073E5041
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E2E6E pushfd ; ret 11_2_073E2E6F
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E4D6F pushfd ; ret 11_2_073E4D8C
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E5DB2 pushfd ; ret 11_2_073E5DC6
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E9CC3 pushfd ; ret 11_2_073E9CC4
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 11_2_073E4A29 pushad ; retf 11_2_073E4A35
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_01790C45 push ebx; retf 15_2_01790C52
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeCode function: 15_2_0179DCA0 push esp; iretd 15_2_0179DD29
                    Source: Telco 32pcs New Purchase Order.exeStatic PE information: section name: .text entropy: 7.800984886920725
                    Source: zBzzGAdzqF.exe.0.drStatic PE information: section name: .text entropy: 7.800984886920725
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.2bcdf8c.0.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.2bcdf8c.0.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.6da0000.5.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.6da0000.5.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.2b6dc80.1.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.2b6dc80.1.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, wKEY3HJo8eDVRJWVro.csHigh entropy of concatenated method names: 'sqDQGHh96y', 'AgAQEv1riQ', 'Fg1QJJBr6R', 'I1wQSRnwnx', 'vIeQwNK6Rq', 'BGOQjZUIjV', 'wvgQ3QfWU5', 'VtPQ4RYbh2', 'lyLQyNGwsr', 'ajHQqn1Ng0'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, w3Un50OCHhr6XKPgVv.csHigh entropy of concatenated method names: 'RYCrUTgMSO', 'kQorbaib6b', 'IEdR5YSe1q', 'PFSRcXEnj1', 'uPqrdx7Xkp', 'Wi6rEyPbgM', 'VoLrZD6RB9', 'dD7rJGZpTT', 'LKmrSHsKFR', 'eJVrt2tHI4'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, pfqRELt3v9bOXMqgPx.csHigh entropy of concatenated method names: 'ToString', 'yvehdb2t9t', 'NQehwkDNPt', 'vNahjGrn0B', 'zDnh3DYCMD', 'weFh4Ejuli', 'vuohyoIpHQ', 'TcOhqv04Zo', 'tPNhYAfG6g', 'o2xhTYIURs'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, AwjlnHTFEX7SG8ODN5.csHigh entropy of concatenated method names: 'hy00FxSK3A', 'ALr0lyMuec', 'iLE08TC0iR', 'FT00oF8KFL', 'vlr02teTAH', 'HUy0VVi8jv', 'Wwo0uTJLZY', 'nJB0avBUnP', 'olQ0XjQ0TG', 'GyN0ABaMdL'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, fyDZ3Q6uBXD3CjoIfe.csHigh entropy of concatenated method names: 'Dispose', 'qAxcCZdVv3', 'XBWnwVY2lN', 'Pe9YYBBw6U', 'PRjcbfEKjm', 'pJPczup5ZA', 'ProcessDialogKey', 'FBnn5M11V2', 'K3CncqNxJ4', 'gslnnW9WDD'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, v04S8qXUOtWGnng4FZ.csHigh entropy of concatenated method names: 'cYavouRehn', 'ksNvVPg00u', 'HJWvalwSPx', 'nZSvXHQ0mo', 'cU7vQjopVc', 'SR9vhPYicQ', 'jUHvrRRrtD', 'RJivRYlFin', 'uZyvkvXhi0', 'zXNvMvuihd'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, NvUCdtLRiH35Z1HHQn.csHigh entropy of concatenated method names: 'K83c0PKqHF', 'kGVcHDOvQL', 'LUOcWtWGnn', 'm4FcgZ8MJp', 'iawcQx7K0I', 'wdachtbGSN', 'Ch8D1whNuPg31uyFJg', 'YroQCR9w2iwP4MyTq2', 'HSDccBA0NU', 'fpPcP1HwW2'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, zMJpQBApxlWy5eawx7.csHigh entropy of concatenated method names: 'kMlx2KBJ7U', 'N6sxulRfT7', 'BI0vjhtSKK', 'L1Mv3bOtIS', 'FYkv4oD6xq', 'bSovyLeSu7', 'nc6vqhWF65', 'CuAvYJelIn', 'CF4vTaxdXC', 'm9CvG7pkcO'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, m9WDDAbdckgRSPLQdj.csHigh entropy of concatenated method names: 'orpkcoAta9', 'cwvkPdPa9X', 'XbNkLcJZI9', 'EHdki4HJWD', 'gWBk6sdHLm', 'T1QkxT79yj', 'oDXkehUsxs', 'DEJR1Ie2s7', 'DKoRUxGHO3', 'F8pRCefm26'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, mUIQHtc5PiMLIOqOQrb.csHigh entropy of concatenated method names: 'FAkkFxn8sH', 'HEFkljUHex', 'OjLk87EBb7', 'ox8kok0K4N', 'N5mk2P8Cqi', 'P7qkVymBuM', 'CawkuJWeYj', 'KGAkauav3Y', 'PbFkXix04G', 'KhkkASEoFQ'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, qjfEKjUmhJPup5ZABB.csHigh entropy of concatenated method names: 'SBhRiR8ln7', 'qPKR6YtsRd', 'oMORv0EDq6', 'vyTRxnX0X7', 'f14ReZWIe1', 'yXtR0gH05s', 'EhvRHkCaMg', 'fQaR7AtcnI', 'LAdRWgWshs', 'WXBRggvbQv'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, qu4eVoHSPo9ejA6esY.csHigh entropy of concatenated method names: 'DZrPIKLoAd', 'bZDPiLaV2C', 'b4aP6Q6EaY', 'CrmPvYf3LV', 'PAJPxbt4mA', 'oQKPeWFc5c', 'kClP0yR2mh', 'OHMPHWy8b7', 'PeuP7rGAdx', 'TYsPWgqv4k'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, PD4QmDnXLZawl4rABn.csHigh entropy of concatenated method names: 'zXF8f58L4', 't1Zoj5So2', 'qgxVRGBG6', 'IyBufDp2t', 'QowXlVPrY', 'FN9AftdVN', 'ooDhP5fR42yJe6YWK0', 'pfQm6CVwaQ6XprVAL5', 'qf0RTAdFl', 'XmkMpM5GF'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, cdF0WJqmBirGmsrC9U.csHigh entropy of concatenated method names: 'CEA0iQvX6D', 'tsg0vunrjL', 'SGS0eZ9ebn', 'pamebo8vG2', 'DcgezFMRP2', 'mon0569LDC', 'cKP0cCmnTN', 'Swu0nF7nXL', 'IsA0P69y81', 'TQ40LxNEXd'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, kVBCLKccNDI6UpiebDC.csHigh entropy of concatenated method names: 'ToString', 'ALWMPwDmCl', 'WnSMLIdYYd', 'r2AMIgRLAl', 'UaNMi1hf6c', 'yecM6WVgdF', 'VeGMvSIGDu', 'KUiMxwEDkT', 'OY4V8soRXljAc6TIZDg', 'fC8EL0oU2mD6oShue5e'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, K11YPaZenX8Q04FESS.csHigh entropy of concatenated method names: 'FyWfa97HKd', 'j2MfXKFyP8', 'tFPfBWSfC8', 'MYXfw7NqwV', 'ldEf3KdFXi', 'yYif4cbsdw', 'drjfqvjYRp', 'v1mfYKTv6M', 'gxqfGMCyFV', 'DL6fdyGmsW'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, IPKqHFaHGVDOvQLAAk.csHigh entropy of concatenated method names: 'HnQ6JWKUHJ', 'a1V6Soepat', 'cJe6tlpCfh', 'g1u6msnTg3', 'EF06pxQAPB', 'HTa6OBmIlQ', 'f6061O8oAr', 'G806Uk5tlb', 'uPt6Cea6Nj', 'fTu6b3J0ex'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, v0I9daBtbGSNNIQqY8.csHigh entropy of concatenated method names: 'jWZeIhpB5i', 'uYKe6pWusq', 'xDEexSSueb', 'oVZe0LBNTB', 'nPHeHXiFAA', 'w3HxpsP8cf', 'sexxOga7gR', 'uCcx1JvrKF', 'Sr6xUp8SG3', 'w4axCObIC7'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, BkgHkYcPAiFTFYL9rDK.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'YOyMJWMFgD', 'RgSMSvvR5h', 'WDJMtPpHPV', 'u9NMmAg7hB', 'vyyMpUK59E', 'CAKMOI9TkG', 'xmoM1ouMnq'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, L37xIBvcOVeeN7nJgi.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'bvdnCw79gs', 'l8hnbkI0pE', 'OMMnzrNTx1', 'KUYP5R1Qsw', 'KA3PcFQvuV', 'tq9PnVBWqf', 'XqqPPJe71U', 'R9bsZ92nZYfeK0FCVpO'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.3e30bd8.4.raw.unpack, bM11V2Cy3CqNxJ46sl.csHigh entropy of concatenated method names: 'W1oRB7WTse', 'qfARwnvqhU', 'GwFRjbX0mZ', 'tbJR3WaC5H', 'O0RRJfy9lu', 'ED8R4cS1rI', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, wKEY3HJo8eDVRJWVro.csHigh entropy of concatenated method names: 'sqDQGHh96y', 'AgAQEv1riQ', 'Fg1QJJBr6R', 'I1wQSRnwnx', 'vIeQwNK6Rq', 'BGOQjZUIjV', 'wvgQ3QfWU5', 'VtPQ4RYbh2', 'lyLQyNGwsr', 'ajHQqn1Ng0'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, w3Un50OCHhr6XKPgVv.csHigh entropy of concatenated method names: 'RYCrUTgMSO', 'kQorbaib6b', 'IEdR5YSe1q', 'PFSRcXEnj1', 'uPqrdx7Xkp', 'Wi6rEyPbgM', 'VoLrZD6RB9', 'dD7rJGZpTT', 'LKmrSHsKFR', 'eJVrt2tHI4'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, pfqRELt3v9bOXMqgPx.csHigh entropy of concatenated method names: 'ToString', 'yvehdb2t9t', 'NQehwkDNPt', 'vNahjGrn0B', 'zDnh3DYCMD', 'weFh4Ejuli', 'vuohyoIpHQ', 'TcOhqv04Zo', 'tPNhYAfG6g', 'o2xhTYIURs'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, AwjlnHTFEX7SG8ODN5.csHigh entropy of concatenated method names: 'hy00FxSK3A', 'ALr0lyMuec', 'iLE08TC0iR', 'FT00oF8KFL', 'vlr02teTAH', 'HUy0VVi8jv', 'Wwo0uTJLZY', 'nJB0avBUnP', 'olQ0XjQ0TG', 'GyN0ABaMdL'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, fyDZ3Q6uBXD3CjoIfe.csHigh entropy of concatenated method names: 'Dispose', 'qAxcCZdVv3', 'XBWnwVY2lN', 'Pe9YYBBw6U', 'PRjcbfEKjm', 'pJPczup5ZA', 'ProcessDialogKey', 'FBnn5M11V2', 'K3CncqNxJ4', 'gslnnW9WDD'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, v04S8qXUOtWGnng4FZ.csHigh entropy of concatenated method names: 'cYavouRehn', 'ksNvVPg00u', 'HJWvalwSPx', 'nZSvXHQ0mo', 'cU7vQjopVc', 'SR9vhPYicQ', 'jUHvrRRrtD', 'RJivRYlFin', 'uZyvkvXhi0', 'zXNvMvuihd'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, NvUCdtLRiH35Z1HHQn.csHigh entropy of concatenated method names: 'K83c0PKqHF', 'kGVcHDOvQL', 'LUOcWtWGnn', 'm4FcgZ8MJp', 'iawcQx7K0I', 'wdachtbGSN', 'Ch8D1whNuPg31uyFJg', 'YroQCR9w2iwP4MyTq2', 'HSDccBA0NU', 'fpPcP1HwW2'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, zMJpQBApxlWy5eawx7.csHigh entropy of concatenated method names: 'kMlx2KBJ7U', 'N6sxulRfT7', 'BI0vjhtSKK', 'L1Mv3bOtIS', 'FYkv4oD6xq', 'bSovyLeSu7', 'nc6vqhWF65', 'CuAvYJelIn', 'CF4vTaxdXC', 'm9CvG7pkcO'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, m9WDDAbdckgRSPLQdj.csHigh entropy of concatenated method names: 'orpkcoAta9', 'cwvkPdPa9X', 'XbNkLcJZI9', 'EHdki4HJWD', 'gWBk6sdHLm', 'T1QkxT79yj', 'oDXkehUsxs', 'DEJR1Ie2s7', 'DKoRUxGHO3', 'F8pRCefm26'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, mUIQHtc5PiMLIOqOQrb.csHigh entropy of concatenated method names: 'FAkkFxn8sH', 'HEFkljUHex', 'OjLk87EBb7', 'ox8kok0K4N', 'N5mk2P8Cqi', 'P7qkVymBuM', 'CawkuJWeYj', 'KGAkauav3Y', 'PbFkXix04G', 'KhkkASEoFQ'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, qjfEKjUmhJPup5ZABB.csHigh entropy of concatenated method names: 'SBhRiR8ln7', 'qPKR6YtsRd', 'oMORv0EDq6', 'vyTRxnX0X7', 'f14ReZWIe1', 'yXtR0gH05s', 'EhvRHkCaMg', 'fQaR7AtcnI', 'LAdRWgWshs', 'WXBRggvbQv'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, qu4eVoHSPo9ejA6esY.csHigh entropy of concatenated method names: 'DZrPIKLoAd', 'bZDPiLaV2C', 'b4aP6Q6EaY', 'CrmPvYf3LV', 'PAJPxbt4mA', 'oQKPeWFc5c', 'kClP0yR2mh', 'OHMPHWy8b7', 'PeuP7rGAdx', 'TYsPWgqv4k'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, PD4QmDnXLZawl4rABn.csHigh entropy of concatenated method names: 'zXF8f58L4', 't1Zoj5So2', 'qgxVRGBG6', 'IyBufDp2t', 'QowXlVPrY', 'FN9AftdVN', 'ooDhP5fR42yJe6YWK0', 'pfQm6CVwaQ6XprVAL5', 'qf0RTAdFl', 'XmkMpM5GF'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, cdF0WJqmBirGmsrC9U.csHigh entropy of concatenated method names: 'CEA0iQvX6D', 'tsg0vunrjL', 'SGS0eZ9ebn', 'pamebo8vG2', 'DcgezFMRP2', 'mon0569LDC', 'cKP0cCmnTN', 'Swu0nF7nXL', 'IsA0P69y81', 'TQ40LxNEXd'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, kVBCLKccNDI6UpiebDC.csHigh entropy of concatenated method names: 'ToString', 'ALWMPwDmCl', 'WnSMLIdYYd', 'r2AMIgRLAl', 'UaNMi1hf6c', 'yecM6WVgdF', 'VeGMvSIGDu', 'KUiMxwEDkT', 'OY4V8soRXljAc6TIZDg', 'fC8EL0oU2mD6oShue5e'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, K11YPaZenX8Q04FESS.csHigh entropy of concatenated method names: 'FyWfa97HKd', 'j2MfXKFyP8', 'tFPfBWSfC8', 'MYXfw7NqwV', 'ldEf3KdFXi', 'yYif4cbsdw', 'drjfqvjYRp', 'v1mfYKTv6M', 'gxqfGMCyFV', 'DL6fdyGmsW'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, IPKqHFaHGVDOvQLAAk.csHigh entropy of concatenated method names: 'HnQ6JWKUHJ', 'a1V6Soepat', 'cJe6tlpCfh', 'g1u6msnTg3', 'EF06pxQAPB', 'HTa6OBmIlQ', 'f6061O8oAr', 'G806Uk5tlb', 'uPt6Cea6Nj', 'fTu6b3J0ex'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, v0I9daBtbGSNNIQqY8.csHigh entropy of concatenated method names: 'jWZeIhpB5i', 'uYKe6pWusq', 'xDEexSSueb', 'oVZe0LBNTB', 'nPHeHXiFAA', 'w3HxpsP8cf', 'sexxOga7gR', 'uCcx1JvrKF', 'Sr6xUp8SG3', 'w4axCObIC7'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, BkgHkYcPAiFTFYL9rDK.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'YOyMJWMFgD', 'RgSMSvvR5h', 'WDJMtPpHPV', 'u9NMmAg7hB', 'vyyMpUK59E', 'CAKMOI9TkG', 'xmoM1ouMnq'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, L37xIBvcOVeeN7nJgi.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'bvdnCw79gs', 'l8hnbkI0pE', 'OMMnzrNTx1', 'KUYP5R1Qsw', 'KA3PcFQvuV', 'tq9PnVBWqf', 'XqqPPJe71U', 'R9bsZ92nZYfeK0FCVpO'
                    Source: 0.2.Telco 32pcs New Purchase Order.exe.71e0000.6.raw.unpack, bM11V2Cy3CqNxJ46sl.csHigh entropy of concatenated method names: 'W1oRB7WTse', 'qfARwnvqhU', 'GwFRjbX0mZ', 'tbJR3WaC5H', 'O0RRJfy9lu', 'ED8R4cS1rI', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeFile created: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp4878.tmp"

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (129).png
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: zBzzGAdzqF.exe PID: 2768, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeMemory allocated: 11F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeMemory allocated: 2B40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeMemory allocated: 4B40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeMemory allocated: 8FE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeMemory allocated: 9FE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeMemory allocated: A1F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeMemory allocated: B1F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeMemory allocated: 11C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeMemory allocated: 2B90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeMemory allocated: 4C90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeMemory allocated: 1460000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeMemory allocated: 2E80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeMemory allocated: 4E80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeMemory allocated: 8DE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeMemory allocated: 9DE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeMemory allocated: 9FE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeMemory allocated: AFE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeMemory allocated: 1740000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeMemory allocated: 30F0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeMemory allocated: 50F0000 memory reserve | memory write watch
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4547Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5859Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 577Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeWindow / User API: threadDelayed 3543Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeWindow / User API: threadDelayed 6300Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeWindow / User API: threadDelayed 3693
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeWindow / User API: threadDelayed 6144
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2252Thread sleep count: 4547 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2212Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4352Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5692Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3364Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep count: 38 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -35048813740048126s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7340Thread sleep count: 3543 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -99890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7340Thread sleep count: 6300 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -99780s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -99671s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -99562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -99453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -99343s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -99234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -99125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -99015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -98906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -98791s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -98687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -98578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -98465s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -98359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -98250s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -98140s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -98031s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -97922s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -97812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -97703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -97594s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -97479s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -97374s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -97265s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -97155s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -97047s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -96937s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -96828s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -96719s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -96609s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -96457s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -96156s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -96046s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -95937s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -95823s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -95717s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -95609s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -95500s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -95388s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -95281s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -95171s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -95049s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -94922s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -94812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -94703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -94594s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -94484s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -94375s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe TID: 7328Thread sleep time: -94265s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7336Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep count: 36 > 30
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -33204139332677172s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7632Thread sleep count: 3693 > 30
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -99585s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7632Thread sleep count: 6144 > 30
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -99469s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -99340s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -99226s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -99125s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -99013s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -98904s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -98795s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -98688s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -98578s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -98469s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -98344s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -98235s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -98110s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -97985s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -97860s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -97735s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -97610s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -97485s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -97360s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -97235s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -97110s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -96969s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -96710s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -96548s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -96304s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -96191s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -96063s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -95953s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -95844s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -95734s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -95625s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -95516s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -95406s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -95297s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -95188s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -95063s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -94938s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -94813s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -94703s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -94594s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -94469s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -94360s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -94235s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -94110s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -93985s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -93813s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -93693s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -93563s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe TID: 7604Thread sleep time: -93174s >= -30000s
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 99890Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 99780Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 99671Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 99562Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 99453Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 99343Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 99234Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 99125Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 99015Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 98906Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 98791Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 98687Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 98578Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 98465Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 98359Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 98250Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 98140Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 98031Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 97922Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 97812Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 97703Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 97594Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 97479Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 97374Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 97265Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 97155Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 97047Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 96937Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 96828Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 96719Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 96609Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 96457Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 96156Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 96046Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 95937Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 95823Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 95717Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 95609Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 95500Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 95388Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 95281Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 95171Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 95049Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 94922Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 94812Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 94703Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 94594Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 94484Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 94375Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeThread delayed: delay time: 94265Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 99585
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 99469
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 99340
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 99226
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 99125
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 99013
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 98904
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 98795
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 98688
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 98578
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 98469
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 98344
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 98235
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 98110
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 97985
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 97860
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 97735
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 97610
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 97485
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 97360
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 97235
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 97110
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 96969
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 96710
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 96548
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 96304
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 96191
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 96063
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 95953
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 95844
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 95734
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 95625
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 95516
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 95406
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 95297
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 95188
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 95063
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 94938
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 94813
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 94703
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 94594
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 94469
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 94360
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 94235
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 94110
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 93985
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 93813
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 93693
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 93563
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeThread delayed: delay time: 93174
                    Source: zBzzGAdzqF.exe, 0000000B.00000002.1508467194.00000000011A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}m=dE
                    Source: Telco 32pcs New Purchase Order.exe, 0000000A.00000002.2687529054.000000000117E000.00000004.00000020.00020000.00000000.sdmp, zBzzGAdzqF.exe, 0000000F.00000002.2687516605.000000000149F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: zBzzGAdzqF.exe, 0000000B.00000002.1508467194.00000000011A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\"
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe"
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeMemory written: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeMemory written: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp4878.tmp"Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeProcess created: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp5C8D.tmp"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeProcess created: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe "C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeQueries volume information: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeQueries volume information: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeQueries volume information: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeQueries volume information: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.Telco 32pcs New Purchase Order.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Telco 32pcs New Purchase Order.exe.3ded1d8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Telco 32pcs New Purchase Order.exe.3ded1d8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.2689631627.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2689533130.0000000002C0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2689631627.0000000003165000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2689533130.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2685907689.0000000000435000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1461636343.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Telco 32pcs New Purchase Order.exe PID: 4136, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Telco 32pcs New Purchase Order.exe PID: 4508, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: zBzzGAdzqF.exe PID: 7500, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeFile opened: C:\FTP Navigator\Ftplist.txt
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: Yara matchFile source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.Telco 32pcs New Purchase Order.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Telco 32pcs New Purchase Order.exe.3ded1d8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Telco 32pcs New Purchase Order.exe.3ded1d8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.2689631627.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2689533130.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2685907689.0000000000435000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1461636343.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Telco 32pcs New Purchase Order.exe PID: 4136, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Telco 32pcs New Purchase Order.exe PID: 4508, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: zBzzGAdzqF.exe PID: 7500, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.Telco 32pcs New Purchase Order.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Telco 32pcs New Purchase Order.exe.3ded1d8.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Telco 32pcs New Purchase Order.exe.3ded1d8.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Telco 32pcs New Purchase Order.exe.3db27b8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000F.00000002.2689631627.0000000003141000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2689533130.0000000002C0C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000F.00000002.2689631627.0000000003165000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2689533130.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2685907689.0000000000435000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1461636343.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Telco 32pcs New Purchase Order.exe PID: 4136, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Telco 32pcs New Purchase Order.exe PID: 4508, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: zBzzGAdzqF.exe PID: 7500, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    21
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Scheduled Task/Job
                    3
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS211
                    Security Software Discovery
                    Distributed Component Object Model21
                    Input Capture
                    23
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Timestomp
                    LSA Secrets1
                    Process Discovery
                    SSH1
                    Clipboard Data
                    Fallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                    Masquerading
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                    Virtualization/Sandbox Evasion
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                    Process Injection
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1519146 Sample: Telco 32pcs New Purchase Or... Startdate: 26/09/2024 Architecture: WINDOWS Score: 100 46 mail.iaa-airferight.com 2->46 48 api.ipify.org 2->48 54 Found malware configuration 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Antivirus detection for URL or domain 2->58 60 15 other signatures 2->60 8 Telco 32pcs New Purchase Order.exe 7 2->8         started        12 zBzzGAdzqF.exe 5 2->12         started        signatures3 process4 file5 38 C:\Users\user\AppData\...\zBzzGAdzqF.exe, PE32 8->38 dropped 40 C:\Users\...\zBzzGAdzqF.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\tmp4878.tmp, XML 8->42 dropped 44 C:\...\Telco 32pcs New Purchase Order.exe.log, ASCII 8->44 dropped 62 Adds a directory exclusion to Windows Defender 8->62 64 Injects a PE file into a foreign processes 8->64 14 Telco 32pcs New Purchase Order.exe 15 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        26 2 other processes 8->26 66 Multi AV Scanner detection for dropped file 12->66 68 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 12->68 70 Machine Learning detection for dropped file 12->70 22 zBzzGAdzqF.exe 12->22         started        24 schtasks.exe 12->24         started        signatures6 process7 dnsIp8 50 mail.iaa-airferight.com 46.175.148.58, 25 ASLAGIDKOM-NETUA Ukraine 14->50 52 api.ipify.org 104.26.12.205, 443, 49709, 49712 CLOUDFLARENETUS United States 14->52 72 Installs a global keyboard hook 14->72 74 Loading BitLocker PowerShell Module 18->74 28 conhost.exe 18->28         started        30 WmiPrvSE.exe 18->30         started        32 conhost.exe 20->32         started        76 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 22->76 78 Tries to steal Mail credentials (via file / registry access) 22->78 80 Tries to harvest and steal ftp login credentials 22->80 82 Tries to harvest and steal browser information (history, passwords, etc) 22->82 34 conhost.exe 24->34         started        36 conhost.exe 26->36         started        signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Telco 32pcs New Purchase Order.exe45%ReversingLabsWin32.Ransomware.CryptoJoker
                    Telco 32pcs New Purchase Order.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe45%ReversingLabsWin32.Ransomware.CryptoJoker
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    https://api.ipify.org0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://www.symauth.com/cps0(0%URL Reputationsafe
                    https://api.ipify.org/t0%Avira URL Cloudsafe
                    https://static.wikia.nocookie.net/mitologa/images/a/a3/Imagen_por_defecto.png/revision/latest/thumbn0%Avira URL Cloudsafe
                    http://www.symauth.com/rpa000%Avira URL Cloudsafe
                    http://crl.mG0%Avira URL Cloudsafe
                    http://mail.iaa-airferight.com100%Avira URL Cloudmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.iaa-airferight.com
                    46.175.148.58
                    truetrue
                      unknown
                      api.ipify.org
                      104.26.12.205
                      truefalse
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://api.ipify.orgTelco 32pcs New Purchase Order.exe, 00000000.00000002.1461636343.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, Telco 32pcs New Purchase Order.exe, 0000000A.00000002.2689533130.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, zBzzGAdzqF.exe, 0000000F.00000002.2685915143.0000000000434000.00000040.00000400.00020000.00000000.sdmp, zBzzGAdzqF.exe, 0000000F.00000002.2689631627.00000000030F1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://account.dyn.com/Telco 32pcs New Purchase Order.exe, 00000000.00000002.1461636343.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, Telco 32pcs New Purchase Order.exe, 0000000A.00000002.2685907689.0000000000435000.00000040.00000400.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.org/tTelco 32pcs New Purchase Order.exe, 0000000A.00000002.2689533130.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, zBzzGAdzqF.exe, 0000000F.00000002.2689631627.00000000030F1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://static.wikia.nocookie.net/mitologa/images/a/a3/Imagen_por_defecto.png/revision/latest/thumbnTelco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameTelco 32pcs New Purchase Order.exe, 00000000.00000002.1460082719.0000000002B8C000.00000004.00000800.00020000.00000000.sdmp, Telco 32pcs New Purchase Order.exe, 0000000A.00000002.2689533130.0000000002B91000.00000004.00000800.00020000.00000000.sdmp, zBzzGAdzqF.exe, 0000000B.00000002.1511440653.0000000002ECC000.00000004.00000800.00020000.00000000.sdmp, zBzzGAdzqF.exe, 0000000F.00000002.2689631627.00000000030F1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.symauth.com/cps0(Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drfalse
                        • URL Reputation: safe
                        unknown
                        http://www.symauth.com/rpa00Telco 32pcs New Purchase Order.exe, zBzzGAdzqF.exe.0.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.mGzBzzGAdzqF.exe, 0000000F.00000002.2701127043.0000000006B52000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://mail.iaa-airferight.comTelco 32pcs New Purchase Order.exe, 0000000A.00000002.2689533130.0000000002C0C000.00000004.00000800.00020000.00000000.sdmp, zBzzGAdzqF.exe, 0000000F.00000002.2689631627.0000000003165000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        104.26.12.205
                        api.ipify.orgUnited States
                        13335CLOUDFLARENETUSfalse
                        46.175.148.58
                        mail.iaa-airferight.comUkraine
                        56394ASLAGIDKOM-NETUAtrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1519146
                        Start date and time:2024-09-26 07:24:07 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 7m 28s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:20
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Telco 32pcs New Purchase Order.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@21/15@2/2
                        EGA Information:
                        • Successful, ratio: 75%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 252
                        • Number of non-executed functions: 14
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target Telco 32pcs New Purchase Order.exe, PID 4508 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtCreateKey calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        • VT rate limit hit for: Telco 32pcs New Purchase Order.exe
                        TimeTypeDescription
                        01:25:07API Interceptor1793587x Sleep call for process: Telco 32pcs New Purchase Order.exe modified
                        01:25:09API Interceptor39x Sleep call for process: powershell.exe modified
                        01:25:12API Interceptor1014264x Sleep call for process: zBzzGAdzqF.exe modified
                        07:25:09Task SchedulerRun new task: zBzzGAdzqF path: C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        104.26.12.205file.exeGet hashmaliciousLummaC, VidarBrowse
                        • api.ipify.org/
                        SecuriteInfo.com.Win64.Evo-gen.13899.14592.exeGet hashmaliciousUnknownBrowse
                        • api.ipify.org/
                        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                        • api.ipify.org/
                        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                        • api.ipify.org/
                        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                        • api.ipify.org/
                        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                        • api.ipify.org/
                        file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                        • api.ipify.org/
                        file.exeGet hashmaliciousUnknownBrowse
                        • api.ipify.org/
                        file.exeGet hashmaliciousUnknownBrowse
                        • api.ipify.org/
                        file.exeGet hashmaliciousUnknownBrowse
                        • api.ipify.org/
                        46.175.148.58Ningbo - Past Due Invoices.scr.exeGet hashmaliciousAgentTeslaBrowse
                          Samsung PO 20240920.exeGet hashmaliciousAgentTeslaBrowse
                            PO-3500036071.exeGet hashmaliciousAgentTeslaBrowse
                              PI #OVES1912196.scr.exeGet hashmaliciousAgentTeslaBrowse
                                SPW AW25 - PO.010 SMS.exeGet hashmaliciousAgentTeslaBrowse
                                  SPW AW25 - PO.010 SMS.exeGet hashmaliciousAgentTeslaBrowse
                                    LEVER STYLE SEP BUY ORDER & C248SH12.exeGet hashmaliciousAgentTeslaBrowse
                                      SPW AW25 - PO.010.exeGet hashmaliciousAgentTeslaBrowse
                                        Asco Valve Shanghai OrderPO-011024.exeGet hashmaliciousAgentTeslaBrowse
                                          Global e-Banking Payment Advice 000000164.exeGet hashmaliciousAgentTeslaBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            mail.iaa-airferight.comNingbo - Past Due Invoices.scr.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            Samsung PO 20240920.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            PO-3500036071.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            PI #OVES1912196.scr.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            SPW AW25 - PO.010 SMS.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            SPW AW25 - PO.010 SMS.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            LEVER STYLE SEP BUY ORDER & C248SH12.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            SPW AW25 - PO.010.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            Asco Valve Shanghai OrderPO-011024.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            Global e-Banking Payment Advice 000000164.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            api.ipify.orghttps://lmoriw-iekascma-oqmmcq-213-cmakwe-fgacsax.pages.dev/robots.txt/Get hashmaliciousHTMLPhisherBrowse
                                            • 104.26.13.205
                                            INDIA - VSL PARTICULARS.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.12.205
                                            http://limeac-oawkcc-otmsesrt-iond0-minestoasli.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                            • 172.67.74.152
                                            https://dreativityblocksnodes.pages.dev/Get hashmaliciousUnknownBrowse
                                            • 172.67.74.152
                                            https://check-smulti-993054.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                            • 172.67.74.152
                                            file.exeGet hashmaliciousLummaC, VidarBrowse
                                            • 104.26.12.205
                                            SecuriteInfo.com.Win64.Evo-gen.13899.14592.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.13.205
                                            SecuriteInfo.com.Win64.Evo-gen.13899.14592.exeGet hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            file.exeGet hashmaliciousLummaC, VidarBrowse
                                            • 172.67.74.152
                                            file.exeGet hashmaliciousLummaC, VidarBrowse
                                            • 172.67.74.152
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            CLOUDFLARENETUSenvifa.vbsGet hashmaliciousUnknownBrowse
                                            • 172.67.19.24
                                            https://redfoxgroup.ladesk.com/402755-APARGet hashmaliciousUnknownBrowse
                                            • 1.1.1.1
                                            https://docs-i-trezor.github.io/en-us/Get hashmaliciousHTMLPhisherBrowse
                                            • 104.17.25.14
                                            http://banlombiasucursalvirtughasd.vercel.app/Get hashmaliciousUnknownBrowse
                                            • 104.26.0.188
                                            https://cutt.ly/EeUeu5Iy/Get hashmaliciousUnknownBrowse
                                            • 172.67.8.238
                                            https://start-m-trezar.github.io/Get hashmaliciousHTMLPhisherBrowse
                                            • 104.16.96.114
                                            https://check-hticompialnt520842.com/sign-in?op_token=6QouodMTj42Y9R6vu7f7F4jkiiAw5e0RnP0YJ7kaakP7NW4bImz7RzENOq9XAroPzLQq7OQtDzJlNnfUSwkvnHQF3HnsYuhEh8y&uuid=3334009b-8512-457f-a8c7-c29303c4adbc&hash=lrio35yeh&language=enGet hashmaliciousUnknownBrowse
                                            • 104.18.86.42
                                            https://lmoriw-iekascma-oqmmcq-213-cmakwe-fgacsax.pages.dev/robots.txt/Get hashmaliciousHTMLPhisherBrowse
                                            • 172.67.74.152
                                            https://expressss-venezuela.pages.dev/robots.txt/Get hashmaliciousUnknownBrowse
                                            • 172.66.47.120
                                            https://risingstarsyouthfootballcamp.com/modules/psgdpr/css/bonde/auth/dV9oBz/index.php/Get hashmaliciousUnknownBrowse
                                            • 104.17.24.14
                                            ASLAGIDKOM-NETUANingbo - Past Due Invoices.scr.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            Samsung PO 20240920.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            PO-3500036071.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            PI #OVES1912196.scr.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            SPW AW25 - PO.010 SMS.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            SPW AW25 - PO.010 SMS.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            LEVER STYLE SEP BUY ORDER & C248SH12.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            SPW AW25 - PO.010.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            Asco Valve Shanghai OrderPO-011024.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            Global e-Banking Payment Advice 000000164.exeGet hashmaliciousAgentTeslaBrowse
                                            • 46.175.148.58
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            3b5074b1b5d032e5620f69f9f700ff0ehttp://npc.uzob291.vip/Get hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            http://oxv.efoi271.vip/Get hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            http://oxv.dsgn269.vip/Get hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            http://qae.qafv739.vip/Get hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            https://cmn.gyxm333.vip/Get hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            https://frt.jjze726.vip/Get hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            https://sparebankno-privat.netlify.app/Get hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            https://hgw.gyxm333.vip/Get hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            https://hgw.nxwp620.vip/Get hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            envifa.vbsGet hashmaliciousUnknownBrowse
                                            • 104.26.12.205
                                            No context
                                            Process:C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:modified
                                            Size (bytes):1216
                                            Entropy (8bit):5.34331486778365
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                            Process:C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1216
                                            Entropy (8bit):5.34331486778365
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                            Malicious:false
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):2232
                                            Entropy (8bit):5.380192968514367
                                            Encrypted:false
                                            SSDEEP:48:+WSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMugeC/ZPUyus:+LHyIFKL3IZ2KRH9Oug8s
                                            MD5:E3EC01FAB7E327602A9550342FA73464
                                            SHA1:7F06C78BA2496A8DDB3DDCD63BAF741CB8C84886
                                            SHA-256:4ECCD285FCD821659092ADB47638B559656F97512183BA76AEE2760D531273C5
                                            SHA-512:B66B707510DE1B0AA29F65F1C99BDEEBDC4D34EC3D9950B62E17058D2E5B1599C85A09EC056F1C4BCE019213485F1E3D7E9D68651890A853819F98DBF2492407
                                            Malicious:false
                                            Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe
                                            File Type:XML 1.0 document, ASCII text
                                            Category:dropped
                                            Size (bytes):1583
                                            Entropy (8bit):5.123792705839575
                                            Encrypted:false
                                            SSDEEP:24:2di4+S2qhtJ12iy1mcrUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtpaxvn:cgeLAYrFdOFzOzN33ODOiDdKrsuTcv
                                            MD5:6B274991AEAD520CF3B14502ED127215
                                            SHA1:BA88CCA464F78F60FB663B618D8F5E4569B318B9
                                            SHA-256:EE797A3F451460A5A85D0CF489D2DC3EC1AF61883DF4C8037F1EA6AE13C92A52
                                            SHA-512:23E252F95D1D2C59105EB615F27A38178C318F2CF6175B381C90D76F00790BBF895A6077F0D478C19FB2B423F7C825C8DC589C9A22BD54EB25B62725E1C18E54
                                            Malicious:true
                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                            Process:C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe
                                            File Type:XML 1.0 document, ASCII text
                                            Category:dropped
                                            Size (bytes):1583
                                            Entropy (8bit):5.123792705839575
                                            Encrypted:false
                                            SSDEEP:24:2di4+S2qhtJ12iy1mcrUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtpaxvn:cgeLAYrFdOFzOzN33ODOiDdKrsuTcv
                                            MD5:6B274991AEAD520CF3B14502ED127215
                                            SHA1:BA88CCA464F78F60FB663B618D8F5E4569B318B9
                                            SHA-256:EE797A3F451460A5A85D0CF489D2DC3EC1AF61883DF4C8037F1EA6AE13C92A52
                                            SHA-512:23E252F95D1D2C59105EB615F27A38178C318F2CF6175B381C90D76F00790BBF895A6077F0D478C19FB2B423F7C825C8DC589C9A22BD54EB25B62725E1C18E54
                                            Malicious:false
                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                            Process:C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe
                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Category:dropped
                                            Size (bytes):991848
                                            Entropy (8bit):7.397819157475462
                                            Encrypted:false
                                            SSDEEP:24576:izFcFCG6ra2QIi2zGc9rwZTkfrw6bMfR1q:izFcsG3ZDc9riI0q
                                            MD5:8D310F2E831174AAC8EAA5EBA20E87AD
                                            SHA1:600EF55976B69523C7973C5D0AEEB91F3FDCF97E
                                            SHA-256:457B6241F125CD8C4F030E7B7F05829B89A5E831F624225CB70EA272ECD88876
                                            SHA-512:A8A58D69131AE7B6736AF515AD800EEBE123DF03C8C5B909E24AE64E382F310835F984D045F97AABE11A0F489E614B1D8D516ADD24D9CFDE6F261CA88AF75839
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 45%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....!................0......R......n.... ........@.. .......................@............@.....................................O........O..............h4... ......\...p............................................ ............... ..H............text...t.... ...................... ..`.rsrc....O.......P..................@..@.reloc....... ......................@..B................M.......H............s..........."...f...........................................0............{.....+..*..(.......r...ps....}.....s....}....*r..{.....o......{.....o.....*...0..9.........{.....{....o.......{....o.......{....o....}..........z*...........!4.......0..4.........{.....{....o.......{....o......{....o....&......z*........./.......0............(.........,..{....o.....*V..{....o .....o!...&*^..}.....("......(.....*....0............s#...}....s>....s......{.....o=...o$.....{....
                                            Process:C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):26
                                            Entropy (8bit):3.95006375643621
                                            Encrypted:false
                                            SSDEEP:3:ggPYV:rPYV
                                            MD5:187F488E27DB4AF347237FE461A079AD
                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                            Malicious:true
                                            Preview:[ZoneTransfer]....ZoneId=0
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.397819157475462
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                            • Win32 Executable (generic) a (10002005/4) 49.97%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            • DOS Executable Generic (2002/1) 0.01%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:Telco 32pcs New Purchase Order.exe
                                            File size:991'848 bytes
                                            MD5:8d310f2e831174aac8eaa5eba20e87ad
                                            SHA1:600ef55976b69523c7973c5d0aeeb91f3fdcf97e
                                            SHA256:457b6241f125cd8c4f030e7b7f05829b89a5e831f624225cb70ea272ecd88876
                                            SHA512:a8a58d69131ae7b6736af515ad800eebe123df03c8c5b909e24ae64e382f310835f984d045f97aabe11a0f489e614b1d8d516add24d9cfde6f261ca88af75839
                                            SSDEEP:24576:izFcFCG6ra2QIi2zGc9rwZTkfrw6bMfR1q:izFcsG3ZDc9riI0q
                                            TLSH:1825CF42D29C9620EC3A5BB16535CD72032F7DAEA4B8D11C29CD3DAB3FFABA25414543
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....!................0......R......n.... ........@.. .......................@............@................................
                                            Icon Hash:c5a484988c94a04b
                                            Entrypoint:0x4bb86e
                                            Entrypoint Section:.text
                                            Digitally signed:true
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0xBA8721D6 [Sat Mar 2 02:49:58 2069 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Signature Valid:false
                                            Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                            Signature Validation Error:The digital signature of the object did not verify
                                            Error Number:-2146869232
                                            Not Before, Not After
                                            • 11/11/2021 01:00:00 14/11/2024 00:59:59
                                            Subject Chain
                                            • CN="NetEase Youdao Information Technology (Beijing) Co.,Ltd.", O="NetEase Youdao Information Technology (Beijing) Co.,Ltd.", S=Beijing, C=CN
                                            Version:3
                                            Thumbprint MD5:4F5FEC748CD450F88841E761105381F9
                                            Thumbprint SHA-1:4969233BC110419F015F688CF21C19254B1B0BAA
                                            Thumbprint SHA-256:1CC254B81F32E63E63AD35958D2E738ADAA491167E1EA91199DEF66274175909
                                            Serial:01CC0C6632D0CA3E68F19D8028508E91
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xbb8190x4f.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xbc0000x34fd4.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0xeee000x3468
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xf20000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xb895c0x70.text
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000xb98740xb9a0060221d64384c43b19ff3e11894385ae3False0.8255116266835016data7.800984886920725IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rsrc0xbc0000x34fd40x3500045c306573542355c062ef6fa2cdbcaeeFalse0.2101498010023585data4.4442337784832215IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xf20000xc0x2006d8f341d41e8d64323b267dba0004eccFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0xbc4600x668Device independent bitmap graphic, 48 x 96 x 4, image size 11520.3225609756097561
                                            RT_ICON0xbcac80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 5120.43951612903225806
                                            RT_ICON0xbcdb00x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 2880.4016393442622951
                                            RT_ICON0xbcf980x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.4831081081081081
                                            RT_ICON0xbd0c00x35e0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9907192575406032
                                            RT_ICON0xc06a00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.4584221748400853
                                            RT_ICON0xc15480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.47382671480144406
                                            RT_ICON0xc1df00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.45564516129032256
                                            RT_ICON0xc24b80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.3504335260115607
                                            RT_ICON0xc2a200x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.07868508221933042
                                            RT_ICON0xd32480x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.15114568005045195
                                            RT_ICON0xdc6f00x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 265600.1543233082706767
                                            RT_ICON0xe2ed80x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.175184842883549
                                            RT_ICON0xe83600x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.15948275862068967
                                            RT_ICON0xec5880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.24107883817427386
                                            RT_ICON0xeeb300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.2678236397748593
                                            RT_ICON0xefbd80x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.37459016393442623
                                            RT_ICON0xf05600x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.42819148936170215
                                            RT_GROUP_ICON0xf09c80x102data0.5775193798449613
                                            RT_VERSION0xf0acc0x31cdata0.4334170854271357
                                            RT_MANIFEST0xf0de80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            TimestampSource PortDest PortSource IPDest IP
                                            Sep 26, 2024 07:25:10.436988115 CEST49709443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:10.437037945 CEST44349709104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:10.437103987 CEST49709443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:10.444632053 CEST49709443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:10.444649935 CEST44349709104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:10.918414116 CEST44349709104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:10.918512106 CEST49709443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:10.980526924 CEST49709443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:10.980591059 CEST44349709104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:10.980968952 CEST44349709104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:11.023104906 CEST49709443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:11.142725945 CEST49709443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:11.183434010 CEST44349709104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:11.250452042 CEST44349709104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:11.250521898 CEST44349709104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:11.250616074 CEST49709443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:11.377949953 CEST49709443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:13.120582104 CEST4971125192.168.2.846.175.148.58
                                            Sep 26, 2024 07:25:14.257474899 CEST4971125192.168.2.846.175.148.58
                                            Sep 26, 2024 07:25:15.205766916 CEST49712443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:15.205813885 CEST44349712104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:15.206573963 CEST49712443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:15.210093021 CEST49712443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:15.210109949 CEST44349712104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:15.713049889 CEST44349712104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:15.713143110 CEST49712443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:15.715303898 CEST49712443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:15.715312958 CEST44349712104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:15.715603113 CEST44349712104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:15.757466078 CEST49712443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:15.781460047 CEST49712443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:15.827394009 CEST44349712104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:15.909660101 CEST44349712104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:15.909778118 CEST44349712104.26.12.205192.168.2.8
                                            Sep 26, 2024 07:25:15.909898043 CEST49712443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:15.913064957 CEST49712443192.168.2.8104.26.12.205
                                            Sep 26, 2024 07:25:16.257461071 CEST4971125192.168.2.846.175.148.58
                                            Sep 26, 2024 07:25:16.554302931 CEST4971425192.168.2.846.175.148.58
                                            Sep 26, 2024 07:25:17.623827934 CEST4971425192.168.2.846.175.148.58
                                            Sep 26, 2024 07:25:19.632471085 CEST4971425192.168.2.846.175.148.58
                                            Sep 26, 2024 07:25:20.257488012 CEST4971125192.168.2.846.175.148.58
                                            Sep 26, 2024 07:25:23.632477045 CEST4971425192.168.2.846.175.148.58
                                            Sep 26, 2024 07:25:28.257688999 CEST4971125192.168.2.846.175.148.58
                                            Sep 26, 2024 07:25:31.632509947 CEST4971425192.168.2.846.175.148.58
                                            TimestampSource PortDest PortSource IPDest IP
                                            Sep 26, 2024 07:25:10.415407896 CEST6264553192.168.2.81.1.1.1
                                            Sep 26, 2024 07:25:10.422221899 CEST53626451.1.1.1192.168.2.8
                                            Sep 26, 2024 07:25:13.107455969 CEST5947253192.168.2.81.1.1.1
                                            Sep 26, 2024 07:25:13.119957924 CEST53594721.1.1.1192.168.2.8
                                            Sep 26, 2024 07:25:27.499181032 CEST53549081.1.1.1192.168.2.8
                                            Sep 26, 2024 07:25:53.092528105 CEST5358771162.159.36.2192.168.2.8
                                            Sep 26, 2024 07:25:53.576627970 CEST53524331.1.1.1192.168.2.8
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Sep 26, 2024 07:25:10.415407896 CEST192.168.2.81.1.1.10x36c7Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                            Sep 26, 2024 07:25:13.107455969 CEST192.168.2.81.1.1.10xee65Standard query (0)mail.iaa-airferight.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Sep 26, 2024 07:25:10.422221899 CEST1.1.1.1192.168.2.80x36c7No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                            Sep 26, 2024 07:25:10.422221899 CEST1.1.1.1192.168.2.80x36c7No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                            Sep 26, 2024 07:25:10.422221899 CEST1.1.1.1192.168.2.80x36c7No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                            Sep 26, 2024 07:25:13.119957924 CEST1.1.1.1192.168.2.80xee65No error (0)mail.iaa-airferight.com46.175.148.58A (IP address)IN (0x0001)false
                                            • api.ipify.org
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.849709104.26.12.2054434508C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe
                                            TimestampBytes transferredDirectionData
                                            2024-09-26 05:25:11 UTC155OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                            Host: api.ipify.org
                                            Connection: Keep-Alive
                                            2024-09-26 05:25:11 UTC211INHTTP/1.1 200 OK
                                            Date: Thu, 26 Sep 2024 05:25:11 GMT
                                            Content-Type: text/plain
                                            Content-Length: 11
                                            Connection: close
                                            Vary: Origin
                                            CF-Cache-Status: DYNAMIC
                                            Server: cloudflare
                                            CF-RAY: 8c90d4f8fb417ced-EWR
                                            2024-09-26 05:25:11 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                            Data Ascii: 8.46.123.33


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.849712104.26.12.2054437500C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe
                                            TimestampBytes transferredDirectionData
                                            2024-09-26 05:25:15 UTC155OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                            Host: api.ipify.org
                                            Connection: Keep-Alive
                                            2024-09-26 05:25:15 UTC211INHTTP/1.1 200 OK
                                            Date: Thu, 26 Sep 2024 05:25:15 GMT
                                            Content-Type: text/plain
                                            Content-Length: 11
                                            Connection: close
                                            Vary: Origin
                                            CF-Cache-Status: DYNAMIC
                                            Server: cloudflare
                                            CF-RAY: 8c90d515ffc719fb-EWR
                                            2024-09-26 05:25:15 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                            Data Ascii: 8.46.123.33


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:01:25:06
                                            Start date:26/09/2024
                                            Path:C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"
                                            Imagebase:0x770000
                                            File size:991'848 bytes
                                            MD5 hash:8D310F2E831174AAC8EAA5EBA20E87AD
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1461636343.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1461636343.0000000003B49000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:3
                                            Start time:01:25:07
                                            Start date:26/09/2024
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"
                                            Imagebase:0x310000
                                            File size:433'152 bytes
                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:01:25:07
                                            Start date:26/09/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6ee680000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:5
                                            Start time:01:25:08
                                            Start date:26/09/2024
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe"
                                            Imagebase:0x310000
                                            File size:433'152 bytes
                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:6
                                            Start time:01:25:08
                                            Start date:26/09/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6ee680000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:7
                                            Start time:01:25:08
                                            Start date:26/09/2024
                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp4878.tmp"
                                            Imagebase:0x4b0000
                                            File size:187'904 bytes
                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:8
                                            Start time:01:25:08
                                            Start date:26/09/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6ee680000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:9
                                            Start time:01:25:08
                                            Start date:26/09/2024
                                            Path:C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"
                                            Imagebase:0x120000
                                            File size:991'848 bytes
                                            MD5 hash:8D310F2E831174AAC8EAA5EBA20E87AD
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:10
                                            Start time:01:25:08
                                            Start date:26/09/2024
                                            Path:C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\Telco 32pcs New Purchase Order.exe"
                                            Imagebase:0x8c0000
                                            File size:991'848 bytes
                                            MD5 hash:8D310F2E831174AAC8EAA5EBA20E87AD
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.2689533130.0000000002C0C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.2689533130.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.2689533130.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.2685907689.0000000000435000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.2685907689.0000000000435000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Target ID:11
                                            Start time:01:25:09
                                            Start date:26/09/2024
                                            Path:C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe
                                            Imagebase:0xa40000
                                            File size:991'848 bytes
                                            MD5 hash:8D310F2E831174AAC8EAA5EBA20E87AD
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 45%, ReversingLabs
                                            Reputation:low
                                            Has exited:true

                                            Target ID:12
                                            Start time:01:25:12
                                            Start date:26/09/2024
                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                            Imagebase:0x7ff605670000
                                            File size:496'640 bytes
                                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:13
                                            Start time:01:25:13
                                            Start date:26/09/2024
                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBzzGAdzqF" /XML "C:\Users\user\AppData\Local\Temp\tmp5C8D.tmp"
                                            Imagebase:0x4b0000
                                            File size:187'904 bytes
                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:14
                                            Start time:01:25:13
                                            Start date:26/09/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6ee680000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:15
                                            Start time:01:25:13
                                            Start date:26/09/2024
                                            Path:C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Roaming\zBzzGAdzqF.exe"
                                            Imagebase:0xce0000
                                            File size:991'848 bytes
                                            MD5 hash:8D310F2E831174AAC8EAA5EBA20E87AD
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000002.2689631627.0000000003141000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.2689631627.0000000003141000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.2689631627.0000000003165000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:9.4%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:5.1%
                                              Total number of Nodes:214
                                              Total number of Limit Nodes:14
                                              execution_graph 49959 71d9e19 49960 71da027 49959->49960 49961 71d9e23 49959->49961 49966 71dc7de 49961->49966 49982 71dc780 49961->49982 49997 71dc771 49961->49997 49962 71da126 49967 71dc76c 49966->49967 49968 71dc7e1 49966->49968 49978 71dc7be 49967->49978 50012 71dcdf9 49967->50012 50017 71dd062 49967->50017 50022 71dd503 49967->50022 50027 71dcda5 49967->50027 50031 71dd18a 49967->50031 50036 71dcaa8 49967->50036 50042 71dd3ed 49967->50042 50046 71dd151 49967->50046 50050 71dcc71 49967->50050 50056 71dd5db 49967->50056 50061 71dd43b 49967->50061 50065 71dd018 49967->50065 49968->49962 49978->49962 49983 71dc79a 49982->49983 49984 71dcdf9 4 API calls 49983->49984 49985 71dd018 3 API calls 49983->49985 49986 71dd43b 2 API calls 49983->49986 49987 71dd5db 3 API calls 49983->49987 49988 71dcc71 2 API calls 49983->49988 49989 71dd151 2 API calls 49983->49989 49990 71dd3ed 2 API calls 49983->49990 49991 71dcaa8 2 API calls 49983->49991 49992 71dd18a 2 API calls 49983->49992 49993 71dc7be 49983->49993 49994 71dcda5 3 API calls 49983->49994 49995 71dd503 3 API calls 49983->49995 49996 71dd062 2 API calls 49983->49996 49984->49993 49985->49993 49986->49993 49987->49993 49988->49993 49989->49993 49990->49993 49991->49993 49992->49993 49993->49962 49994->49993 49995->49993 49996->49993 49998 71dc79a 49997->49998 49999 71dc7be 49998->49999 50000 71dcdf9 4 API calls 49998->50000 50001 71dd018 3 API calls 49998->50001 50002 71dd43b 2 API calls 49998->50002 50003 71dd5db 3 API calls 49998->50003 50004 71dcc71 2 API calls 49998->50004 50005 71dd151 2 API calls 49998->50005 50006 71dd3ed 2 API calls 49998->50006 50007 71dcaa8 2 API calls 49998->50007 50008 71dd18a 2 API calls 49998->50008 50009 71dcda5 3 API calls 49998->50009 50010 71dd503 3 API calls 49998->50010 50011 71dd062 2 API calls 49998->50011 49999->49962 50000->49999 50001->49999 50002->49999 50003->49999 50004->49999 50005->49999 50006->49999 50007->49999 50008->49999 50009->49999 50010->49999 50011->49999 50070 71d95d0 50012->50070 50074 71d9691 50012->50074 50081 71d95d8 50012->50081 50013 71dce17 50018 71dd07c 50017->50018 50019 71dcccb 50018->50019 50085 71d8bd8 50018->50085 50089 71d8be0 50018->50089 50019->49978 50023 71dd504 50022->50023 50026 71d9691 2 API calls 50023->50026 50093 71d9698 50023->50093 50024 71dd52b 50026->50024 50028 71dcdba 50027->50028 50029 71d9698 WriteProcessMemory 50028->50029 50030 71d9691 2 API calls 50028->50030 50029->50028 50030->50028 50032 71dd190 50031->50032 50033 71dcccb 50032->50033 50034 71d8bd8 ResumeThread 50032->50034 50035 71d8be0 ResumeThread 50032->50035 50033->49978 50034->50032 50035->50032 50038 71dcadb 50036->50038 50037 71dd6ff 50037->49978 50038->50037 50097 71d9915 50038->50097 50101 71d9920 50038->50101 50105 71d9788 50042->50105 50109 71d9781 50042->50109 50043 71dd41b 50113 71d90c8 50046->50113 50117 71d90c2 50046->50117 50047 71dd16b 50051 71dcb72 50050->50051 50052 71dd6ff 50051->50052 50054 71d9915 CreateProcessA 50051->50054 50055 71d9920 CreateProcessA 50051->50055 50052->49978 50053 71dccac 50053->49978 50054->50053 50055->50053 50057 71dd5ec 50056->50057 50059 71d9698 WriteProcessMemory 50057->50059 50060 71d9691 2 API calls 50057->50060 50058 71dd631 50059->50058 50060->50058 50063 71d90c8 Wow64SetThreadContext 50061->50063 50064 71d90c2 Wow64SetThreadContext 50061->50064 50062 71dd455 50063->50062 50064->50062 50066 71dd504 50065->50066 50068 71d9698 WriteProcessMemory 50066->50068 50069 71d9691 2 API calls 50066->50069 50067 71dd52b 50068->50067 50069->50067 50071 71d9618 VirtualAllocEx 50070->50071 50073 71d9655 50071->50073 50073->50013 50075 71d9619 VirtualAllocEx 50074->50075 50078 71d9696 WriteProcessMemory 50074->50078 50077 71d9655 50075->50077 50077->50013 50080 71d9737 50078->50080 50080->50013 50082 71d9618 VirtualAllocEx 50081->50082 50084 71d9655 50082->50084 50084->50013 50086 71d8c20 ResumeThread 50085->50086 50088 71d8c51 50086->50088 50088->50018 50090 71d8c20 ResumeThread 50089->50090 50092 71d8c51 50090->50092 50092->50018 50094 71d96e0 WriteProcessMemory 50093->50094 50096 71d9737 50094->50096 50096->50024 50098 71d99a9 CreateProcessA 50097->50098 50100 71d9b6b 50098->50100 50100->50100 50102 71d99a9 CreateProcessA 50101->50102 50104 71d9b6b 50102->50104 50104->50104 50106 71d97d3 ReadProcessMemory 50105->50106 50108 71d9817 50106->50108 50108->50043 50110 71d9788 ReadProcessMemory 50109->50110 50112 71d9817 50110->50112 50112->50043 50114 71d910d Wow64SetThreadContext 50113->50114 50116 71d9155 50114->50116 50116->50047 50118 71d910d Wow64SetThreadContext 50117->50118 50120 71d9155 50118->50120 50120->50047 50165 11fd438 50166 11fd47e 50165->50166 50170 11fd609 50166->50170 50173 11fd618 50166->50173 50167 11fd56b 50171 11fd646 50170->50171 50176 11fb790 50170->50176 50171->50167 50174 11fb790 DuplicateHandle 50173->50174 50175 11fd646 50174->50175 50175->50167 50177 11fd680 DuplicateHandle 50176->50177 50178 11fd716 50177->50178 50178->50171 50218 11f4668 50219 11f467a 50218->50219 50220 11f4686 50219->50220 50222 11f4778 50219->50222 50223 11f479d 50222->50223 50227 11f4878 50223->50227 50231 11f4888 50223->50231 50229 11f4882 50227->50229 50228 11f498c 50228->50228 50229->50228 50235 11f44e0 50229->50235 50232 11f48af 50231->50232 50233 11f44e0 CreateActCtxA 50232->50233 50234 11f498c 50232->50234 50233->50234 50236 11f5918 CreateActCtxA 50235->50236 50238 11f59db 50236->50238 50238->50238 50121 116d01c 50122 116d034 50121->50122 50123 116d08e 50122->50123 50126 50f2808 50122->50126 50131 50f2818 50122->50131 50127 50f2818 50126->50127 50128 50f2877 50127->50128 50136 50f2d88 50127->50136 50141 50f2da8 50127->50141 50132 50f2845 50131->50132 50133 50f2877 50132->50133 50134 50f2d88 2 API calls 50132->50134 50135 50f2da8 2 API calls 50132->50135 50134->50133 50135->50133 50138 50f2da8 50136->50138 50137 50f2e48 50137->50128 50146 50f2e50 50138->50146 50150 50f2e60 50138->50150 50143 50f2dbc 50141->50143 50142 50f2e48 50142->50128 50144 50f2e50 2 API calls 50143->50144 50145 50f2e60 2 API calls 50143->50145 50144->50142 50145->50142 50147 50f2e60 50146->50147 50148 50f2e71 50147->50148 50153 50f4022 50147->50153 50148->50137 50151 50f2e71 50150->50151 50152 50f4022 2 API calls 50150->50152 50151->50137 50152->50151 50157 50f4040 50153->50157 50161 50f4050 50153->50161 50154 50f403a 50154->50148 50158 50f4050 50157->50158 50159 50f40ea CallWindowProcW 50158->50159 50160 50f4099 50158->50160 50159->50160 50160->50154 50162 50f4092 50161->50162 50164 50f4099 50161->50164 50163 50f40ea CallWindowProcW 50162->50163 50162->50164 50163->50164 50164->50154 50179 56ee5c3 50181 56ee468 50179->50181 50180 56ee47d 50181->50180 50184 56ee7b8 50181->50184 50189 56ee7b3 50181->50189 50185 56ee7cd 50184->50185 50194 56ee7f0 50185->50194 50198 56ee800 50185->50198 50186 56ee7e5 50186->50181 50190 56ee7b8 50189->50190 50192 56ee7f0 PostMessageW 50190->50192 50193 56ee800 PostMessageW 50190->50193 50191 56ee7e5 50191->50181 50192->50191 50193->50191 50196 56ee800 50194->50196 50195 56ee89a 50195->50186 50196->50195 50202 71dda17 50196->50202 50200 56ee827 50198->50200 50199 56ee89a 50199->50186 50200->50199 50201 71dda17 PostMessageW 50200->50201 50201->50200 50203 71dda22 50202->50203 50206 71dda73 50202->50206 50203->50196 50204 71ddbeb 50204->50196 50206->50204 50207 71dbf1c 50206->50207 50208 71ddce0 PostMessageW 50207->50208 50209 71ddd4c 50208->50209 50209->50206 50210 11facb0 50213 11fada8 50210->50213 50211 11facbf 50214 11faddc 50213->50214 50215 11fadb9 50213->50215 50214->50211 50215->50214 50216 11fafe0 GetModuleHandleW 50215->50216 50217 11fb00d 50216->50217 50217->50211

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 50f9700-50f972b 1 50f972d 0->1 2 50f9732-50fa3e1 call 50f9014 call 50f9024 call 50f9034 call 50f9044 * 8 call 50f9054 call 50f9064 call 50f9024 * 3 call 50f9074 call 50f9084 call 50f9064 * 2 call 50f9094 call 50f9064 call 50f9074 call 50f9064 call 50f90a4 call 50f9084 call 50f9024 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f90f4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f9104 call 11feb82 call 50f9114 * 2 call 50f9124 call 50f9114 call 50f9124 call 50f9114 0->2 1->2 612 50fa3e7 call 56edcaf 2->612 613 50fa3e7 call 56edc48 2->613 614 50fa3e7 call 56edc58 2->614 200 50fa3ed-50fa534 call 50f9134 215 50fa536-50fa53f 200->215 216 50fa541-50fa57a 200->216 217 50fa58b-50fa59e 215->217 230 50fa585 216->230 219 50fa5ca 217->219 220 50fa5a0-50fa5ac 217->220 221 50fa5d0-50fa5e8 219->221 222 50fa5ae-50fa5b4 220->222 223 50fa5b6-50fa5c6 220->223 228 50fa5ef-50fa62a call 50f9144 221->228 229 50fa5ea 221->229 225 50fa5c8 222->225 223->225 225->221 233 50fa632-50fc145 call 50f9124 call 50f9104 call 50f9114 * 2 call 50f9124 call 50f9114 call 50f9124 call 50f9114 call 50f9124 call 50f9154 call 50f9164 call 50f9174 call 50f9184 call 50f90b4 call 50f9194 call 50f90c4 call 50f91a4 call 50f90d4 call 50f90e4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f91b4 call 50f91c4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f91d4 call 50f91e4 call 50f91f4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f91b4 call 50f91c4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f91b4 call 50f91c4 call 50f9204 call 50f9214 call 50f9224 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f91b4 call 50f91c4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f91b4 call 50f91c4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f9234 call 50f9244 call 50f9254 call 50f91e4 call 50f91f4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f9264 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f9274 call 50f9284 call 50f9294 call 50f92a4 call 50f92b4 * 18 228->233 229->228 230->217 582 50fc16f 233->582 583 50fc147-50fc153 233->583 586 50fc175-50fc2c9 call 50f92c4 call 50f92f0 call 50f90c4 call 50f9300 call 50f9310 call 50f9320 * 2 582->586 584 50fc15d-50fc163 583->584 585 50fc155-50fc15b 583->585 587 50fc16d 584->587 585->587 587->586 612->200 613->200 614->200
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1467913981.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_50f0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ''q$$'q
                                              • API String ID: 0-2770139231
                                              • Opcode ID: 89c907f0c1071a8dc72dfc648d7c0b7390b243bd39881a98f129bbbc385d3bbf
                                              • Instruction ID: 82edb96c846288b58c5cc083ed00115085e4359f58888b7d40f780d2bd510b66
                                              • Opcode Fuzzy Hash: 89c907f0c1071a8dc72dfc648d7c0b7390b243bd39881a98f129bbbc385d3bbf
                                              • Instruction Fuzzy Hash: 6643B274A10219CFCB25EF24C994AD9B3B6FF89304F1146E9E509AB361DB31AE85CF40

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 615 50f96f2-50f972b 616 50f972d 615->616 617 50f9732-50f97d3 615->617 616->617 627 50f97dd-50f97e9 call 50f9014 617->627 629 50f97ee-50f9837 call 50f9024 627->629 635 50f9841-50f984d call 50f9034 629->635 637 50f9852-50f99f9 call 50f9044 * 8 635->637 671 50f9a03-50f9a0f call 50f9054 637->671 673 50f9a14-50f9b25 call 50f9064 call 50f9024 * 3 call 50f9074 671->673 695 50f9b2f-50f9b3b call 50f9084 673->695 697 50f9b40-50f9c8f call 50f9064 * 2 call 50f9094 call 50f9064 call 50f9074 call 50f9064 695->697 723 50f9c99-50f9ca5 call 50f90a4 697->723 725 50f9caa-50f9d31 call 50f9084 call 50f9024 723->725 735 50f9d38-50f9d3f 725->735 736 50f9d4b-50f9f1b call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 735->736 761 50f9f24-50f9f37 call 50f90f4 736->761 763 50f9f3c-50f9f97 761->763 767 50f9fa1-50f9faa 763->767 768 50f9fb2-50fa082 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 767->768 779 50fa087-50fa096 call 50f9104 768->779 781 50fa09b-50fa0fd 779->781 785 50fa107-50fa115 call 11feb82 781->785 786 50fa11b-50fa3cb call 50f9114 * 2 call 50f9124 call 50f9114 call 50f9124 call 50f9114 785->786 814 50fa3d1-50fa3e1 786->814 1226 50fa3e7 call 56edcaf 814->1226 1227 50fa3e7 call 56edc48 814->1227 1228 50fa3e7 call 56edc58 814->1228 815 50fa3ed-50fa534 call 50f9134 830 50fa536-50fa53f 815->830 831 50fa541-50fa567 815->831 832 50fa58b-50fa59e 830->832 839 50fa56e-50fa57a 831->839 834 50fa5ca 832->834 835 50fa5a0-50fa5ac 832->835 836 50fa5d0-50fa5d2 834->836 837 50fa5ae-50fa5b4 835->837 838 50fa5b6-50fa5c6 835->838 841 50fa5d8-50fa5e8 836->841 840 50fa5c8 837->840 838->840 845 50fa585 839->845 840->836 843 50fa5ef-50fa610 call 50f9144 841->843 844 50fa5ea 841->844 847 50fa615-50fa62a 843->847 844->843 845->832 848 50fa632-50fc145 call 50f9124 call 50f9104 call 50f9114 * 2 call 50f9124 call 50f9114 call 50f9124 call 50f9114 call 50f9124 call 50f9154 call 50f9164 call 50f9174 call 50f9184 call 50f90b4 call 50f9194 call 50f90c4 call 50f91a4 call 50f90d4 call 50f90e4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f91b4 call 50f91c4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f91d4 call 50f91e4 call 50f91f4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f91b4 call 50f91c4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f91b4 call 50f91c4 call 50f9204 call 50f9214 call 50f9224 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f91b4 call 50f91c4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f91b4 call 50f91c4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f9234 call 50f9244 call 50f9254 call 50f91e4 call 50f91f4 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f9264 call 50f90b4 call 50f90c4 call 50f90d4 call 50f90e4 call 50f9274 call 50f9284 call 50f9294 call 50f92a4 call 50f92b4 * 18 847->848 1197 50fc16f 848->1197 1198 50fc147-50fc153 848->1198 1201 50fc175-50fc2c9 call 50f92c4 call 50f92f0 call 50f90c4 call 50f9300 call 50f9310 call 50f9320 * 2 1197->1201 1199 50fc15d-50fc163 1198->1199 1200 50fc155-50fc15b 1198->1200 1202 50fc16d 1199->1202 1200->1202 1202->1201 1226->815 1227->815 1228->815
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1467913981.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_50f0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ''q$$'q
                                              • API String ID: 0-2770139231
                                              • Opcode ID: d3da952da15af935a1dfd2499811bd7b2da7cd3af2dc69ecc337e53c1e8fc11e
                                              • Instruction ID: 4eff1a27c20d3d41194acccd5a21b99401528cae68d5818959399cf8fbed1cc6
                                              • Opcode Fuzzy Hash: d3da952da15af935a1dfd2499811bd7b2da7cd3af2dc69ecc337e53c1e8fc11e
                                              • Instruction Fuzzy Hash: D643B274A10219CFCB25EF24C994AD9B3B6FF99304F1146E9E509AB361DB31AE85CF40

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1230 71d9691-71d9694 1231 71d9619-71d9653 VirtualAllocEx 1230->1231 1232 71d9696-71d96e6 1230->1232 1235 71d965c-71d9681 1231->1235 1236 71d9655-71d965b 1231->1236 1238 71d96e8-71d96f4 1232->1238 1239 71d96f6-71d9735 WriteProcessMemory 1232->1239 1236->1235 1238->1239 1243 71d973e-71d976e 1239->1243 1244 71d9737-71d973d 1239->1244 1244->1243
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 071D9646
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 071D9728
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: AllocMemoryProcessVirtualWrite
                                              • String ID:
                                              • API String ID: 645232735-0
                                              • Opcode ID: fa3202abb47943552b5431a44b97b21e9398e7542dbc76be5d6b404ddfd24c84
                                              • Instruction ID: 43e99a4fff5f9664b494accc492be6ebf6afbe48ab8841748dac18a288d8ee59
                                              • Opcode Fuzzy Hash: fa3202abb47943552b5431a44b97b21e9398e7542dbc76be5d6b404ddfd24c84
                                              • Instruction Fuzzy Hash: A54148B29003499FDF10CFAAD844BDEBBF5EF48310F14841AE519A7250C779A950DFA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 10511b45ad00db8e8a3b5b9764fea3ca8771d3a95426277ea8819e5a68bff42b
                                              • Instruction ID: 70297f909d6781ae42cad1f1db5d1e4a9527a6cb2a80889a9b09230a5b851362
                                              • Opcode Fuzzy Hash: 10511b45ad00db8e8a3b5b9764fea3ca8771d3a95426277ea8819e5a68bff42b
                                              • Instruction Fuzzy Hash: E9B1F2B4D05258CFDB18CFA9C8446ADFBF2BF8A300F15916AD408BB295D7749986CF20
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4a4c93e56002b58ee4c153101db7a6c0d6ad8e33175eb99a0b69a7e667a08cc1
                                              • Instruction ID: 1be8692e2e9d49f9620de81a4fd07998afcfc7e301c5d981926e63bc9418dbb0
                                              • Opcode Fuzzy Hash: 4a4c93e56002b58ee4c153101db7a6c0d6ad8e33175eb99a0b69a7e667a08cc1
                                              • Instruction Fuzzy Hash: D7B1D1B4D05218DFDB18DFAAC8446ADFBF6BF8A300F14912AD409B7285D7749986CF20
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6afe20a179c1380d76fda860dae9f81b5e1b0aafc7f349ea0d83fff89ba336bc
                                              • Instruction ID: c76c8d2412f00c094ef88b521696e87471e281e134c91fe56ccadf4ea7b0d7d2
                                              • Opcode Fuzzy Hash: 6afe20a179c1380d76fda860dae9f81b5e1b0aafc7f349ea0d83fff89ba336bc
                                              • Instruction Fuzzy Hash: FD81FDB4D55619CFDB28CF56C8407D9BBB6BF8A300F1095AAD40DA7290DB705E85CF50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3b0622bbd4c7c702058a59505991df14ea38d45e0730ba17d1a2091c90595560
                                              • Instruction ID: 78871ab7de163a61da9ab0ede47e09e79e06fddc546bf1df31bed93064ce09b6
                                              • Opcode Fuzzy Hash: 3b0622bbd4c7c702058a59505991df14ea38d45e0730ba17d1a2091c90595560
                                              • Instruction Fuzzy Hash: EC4125B0D09208DFDB08CFAAD4446EEBBF2AB8E301F15D06AD429A7291DB344E45CF55
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1b18688c176a917b39c339e0f1653b3f45f30589c75056b917590e9ac6563988
                                              • Instruction ID: 72cf574166e282c05118e5fa06f8599bf2b242f0799a0eb45fd1436c7175c9ab
                                              • Opcode Fuzzy Hash: 1b18688c176a917b39c339e0f1653b3f45f30589c75056b917590e9ac6563988
                                              • Instruction Fuzzy Hash: A92134B4914228CFCB24CF60D9887E9BBB0EB0A305F1094DAC44DA7281C7358ECACF54

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1249 71d9915-71d99b5 1251 71d99ee-71d9a0e 1249->1251 1252 71d99b7-71d99c1 1249->1252 1259 71d9a47-71d9a76 1251->1259 1260 71d9a10-71d9a1a 1251->1260 1252->1251 1253 71d99c3-71d99c5 1252->1253 1254 71d99e8-71d99eb 1253->1254 1255 71d99c7-71d99d1 1253->1255 1254->1251 1257 71d99d5-71d99e4 1255->1257 1258 71d99d3 1255->1258 1257->1257 1261 71d99e6 1257->1261 1258->1257 1266 71d9aaf-71d9b69 CreateProcessA 1259->1266 1267 71d9a78-71d9a82 1259->1267 1260->1259 1262 71d9a1c-71d9a1e 1260->1262 1261->1254 1264 71d9a41-71d9a44 1262->1264 1265 71d9a20-71d9a2a 1262->1265 1264->1259 1268 71d9a2c 1265->1268 1269 71d9a2e-71d9a3d 1265->1269 1280 71d9b6b-71d9b71 1266->1280 1281 71d9b72-71d9bf8 1266->1281 1267->1266 1271 71d9a84-71d9a86 1267->1271 1268->1269 1269->1269 1270 71d9a3f 1269->1270 1270->1264 1272 71d9aa9-71d9aac 1271->1272 1273 71d9a88-71d9a92 1271->1273 1272->1266 1275 71d9a94 1273->1275 1276 71d9a96-71d9aa5 1273->1276 1275->1276 1276->1276 1278 71d9aa7 1276->1278 1278->1272 1280->1281 1291 71d9c08-71d9c0c 1281->1291 1292 71d9bfa-71d9bfe 1281->1292 1293 71d9c1c-71d9c20 1291->1293 1294 71d9c0e-71d9c12 1291->1294 1292->1291 1295 71d9c00 1292->1295 1297 71d9c30-71d9c34 1293->1297 1298 71d9c22-71d9c26 1293->1298 1294->1293 1296 71d9c14 1294->1296 1295->1291 1296->1293 1300 71d9c46-71d9c4d 1297->1300 1301 71d9c36-71d9c3c 1297->1301 1298->1297 1299 71d9c28 1298->1299 1299->1297 1302 71d9c4f-71d9c5e 1300->1302 1303 71d9c64 1300->1303 1301->1300 1302->1303 1304 71d9c65 1303->1304 1304->1304
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 071D9B56
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: c4486bb1a8e52362e19bf7b70678fa30a284a665b879f9c333b26c8524c5e4eb
                                              • Instruction ID: 1bdc9d8e2dcf77fe06bb895497a8f6cade6969cf02b5f9edba4ff4eb0511d552
                                              • Opcode Fuzzy Hash: c4486bb1a8e52362e19bf7b70678fa30a284a665b879f9c333b26c8524c5e4eb
                                              • Instruction Fuzzy Hash: 3CA17EB1D10219CFDB25CFA9C840BDEBBB2FF48710F14816AD859A7280DB759985CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1306 71d9920-71d99b5 1308 71d99ee-71d9a0e 1306->1308 1309 71d99b7-71d99c1 1306->1309 1316 71d9a47-71d9a76 1308->1316 1317 71d9a10-71d9a1a 1308->1317 1309->1308 1310 71d99c3-71d99c5 1309->1310 1311 71d99e8-71d99eb 1310->1311 1312 71d99c7-71d99d1 1310->1312 1311->1308 1314 71d99d5-71d99e4 1312->1314 1315 71d99d3 1312->1315 1314->1314 1318 71d99e6 1314->1318 1315->1314 1323 71d9aaf-71d9b69 CreateProcessA 1316->1323 1324 71d9a78-71d9a82 1316->1324 1317->1316 1319 71d9a1c-71d9a1e 1317->1319 1318->1311 1321 71d9a41-71d9a44 1319->1321 1322 71d9a20-71d9a2a 1319->1322 1321->1316 1325 71d9a2c 1322->1325 1326 71d9a2e-71d9a3d 1322->1326 1337 71d9b6b-71d9b71 1323->1337 1338 71d9b72-71d9bf8 1323->1338 1324->1323 1328 71d9a84-71d9a86 1324->1328 1325->1326 1326->1326 1327 71d9a3f 1326->1327 1327->1321 1329 71d9aa9-71d9aac 1328->1329 1330 71d9a88-71d9a92 1328->1330 1329->1323 1332 71d9a94 1330->1332 1333 71d9a96-71d9aa5 1330->1333 1332->1333 1333->1333 1335 71d9aa7 1333->1335 1335->1329 1337->1338 1348 71d9c08-71d9c0c 1338->1348 1349 71d9bfa-71d9bfe 1338->1349 1350 71d9c1c-71d9c20 1348->1350 1351 71d9c0e-71d9c12 1348->1351 1349->1348 1352 71d9c00 1349->1352 1354 71d9c30-71d9c34 1350->1354 1355 71d9c22-71d9c26 1350->1355 1351->1350 1353 71d9c14 1351->1353 1352->1348 1353->1350 1357 71d9c46-71d9c4d 1354->1357 1358 71d9c36-71d9c3c 1354->1358 1355->1354 1356 71d9c28 1355->1356 1356->1354 1359 71d9c4f-71d9c5e 1357->1359 1360 71d9c64 1357->1360 1358->1357 1359->1360 1361 71d9c65 1360->1361 1361->1361
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 071D9B56
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: 98c11b96a9062865fac7d549788db712148b9fa968117f2b92e907478ad09416
                                              • Instruction ID: d6165f7c5ff132cef016878174d6b714d6f1dbf0b48a9a911cb4f56232a11e6b
                                              • Opcode Fuzzy Hash: 98c11b96a9062865fac7d549788db712148b9fa968117f2b92e907478ad09416
                                              • Instruction Fuzzy Hash: E2916DB1D10219CFEB25CFA9C840BDEBBB2FF44710F14816AD859A7280DB75A985CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1363 11fada8-11fadb7 1364 11fadb9-11fadc6 call 11fa100 1363->1364 1365 11fade3-11fade7 1363->1365 1371 11faddc 1364->1371 1372 11fadc8 1364->1372 1367 11fadfb-11fae3c 1365->1367 1368 11fade9-11fadf3 1365->1368 1374 11fae3e-11fae46 1367->1374 1375 11fae49-11fae57 1367->1375 1368->1367 1371->1365 1421 11fadce call 11fb030 1372->1421 1422 11fadce call 11fb040 1372->1422 1374->1375 1376 11fae7b-11fae7d 1375->1376 1377 11fae59-11fae5e 1375->1377 1382 11fae80-11fae87 1376->1382 1379 11fae69 1377->1379 1380 11fae60-11fae67 call 11fa10c 1377->1380 1378 11fadd4-11fadd6 1378->1371 1381 11faf18-11faf2f 1378->1381 1384 11fae6b-11fae79 1379->1384 1380->1384 1396 11faf31-11faf90 1381->1396 1385 11fae89-11fae91 1382->1385 1386 11fae94-11fae9b 1382->1386 1384->1382 1385->1386 1389 11fae9d-11faea5 1386->1389 1390 11faea8-11faeb1 call 11fa11c 1386->1390 1389->1390 1394 11faebe-11faec3 1390->1394 1395 11faeb3-11faebb 1390->1395 1397 11faec5-11faecc 1394->1397 1398 11faee1-11faeee 1394->1398 1395->1394 1414 11faf92-11fafd8 1396->1414 1397->1398 1399 11faece-11faede call 11fa12c call 11fa13c 1397->1399 1405 11faf11-11faf17 1398->1405 1406 11faef0-11faf0e 1398->1406 1399->1398 1406->1405 1416 11fafda-11fafdd 1414->1416 1417 11fafe0-11fb00b GetModuleHandleW 1414->1417 1416->1417 1418 11fb00d-11fb013 1417->1418 1419 11fb014-11fb028 1417->1419 1418->1419 1421->1378 1422->1378
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 011FAFFE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1459715695.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_11f0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: baa9b5e33909e3a9d91cd4c6c73e4baa566f6e8c4c7cca7658bccebfd9b70fe6
                                              • Instruction ID: 502bcfd9ff7a63a89af2897cee8307f9742a63eb604eb5912f2957b51a9b9726
                                              • Opcode Fuzzy Hash: baa9b5e33909e3a9d91cd4c6c73e4baa566f6e8c4c7cca7658bccebfd9b70fe6
                                              • Instruction Fuzzy Hash: 98715870A00B058FE728DF2AE44475ABBF5FF88204F00892DD69AD7B40DB79E845CB95

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1423 11f44e0-11f59d9 CreateActCtxA 1426 11f59db-11f59e1 1423->1426 1427 11f59e2-11f5a3c 1423->1427 1426->1427 1434 11f5a3e-11f5a41 1427->1434 1435 11f5a4b-11f5a4f 1427->1435 1434->1435 1436 11f5a51-11f5a5d 1435->1436 1437 11f5a60 1435->1437 1436->1437 1439 11f5a61 1437->1439 1439->1439
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 011F59C9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1459715695.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_11f0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: ef1a59f7dead0acbf32a1616cc849b55321a5727d855ff6adb5906626e8d339d
                                              • Instruction ID: f6b2fe3faf67e294ac43c06bea76e514d293c0487c1ecc96cf80bacd24c7dfdd
                                              • Opcode Fuzzy Hash: ef1a59f7dead0acbf32a1616cc849b55321a5727d855ff6adb5906626e8d339d
                                              • Instruction Fuzzy Hash: FE41C270C0071DCFDB28CFA9C884B9EBBB6BF49704F24806AD519AB251DB75594ACF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1440 11f590d-11f59d9 CreateActCtxA 1442 11f59db-11f59e1 1440->1442 1443 11f59e2-11f5a3c 1440->1443 1442->1443 1450 11f5a3e-11f5a41 1443->1450 1451 11f5a4b-11f5a4f 1443->1451 1450->1451 1452 11f5a51-11f5a5d 1451->1452 1453 11f5a60 1451->1453 1452->1453 1455 11f5a61 1453->1455 1455->1455
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 011F59C9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1459715695.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_11f0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: ddb1027db293dc729ec863a292e61ebf4388fa0e69313215d74dfa306fe456e5
                                              • Instruction ID: 6f87f09fe329209c00823c6a597e2023ababbf8419b572b8bad9414d71a91bef
                                              • Opcode Fuzzy Hash: ddb1027db293dc729ec863a292e61ebf4388fa0e69313215d74dfa306fe456e5
                                              • Instruction Fuzzy Hash: CA41E0B0C00719CFDB28CFA9C884BDEBBB2BF48304F24805AD519AB251DB75594ACF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1456 50f4050-50f408c 1457 50f413c-50f415c 1456->1457 1458 50f4092-50f4097 1456->1458 1464 50f415f-50f416c 1457->1464 1459 50f40ea-50f4122 CallWindowProcW 1458->1459 1460 50f4099-50f40d0 1458->1460 1462 50f412b-50f413a 1459->1462 1463 50f4124-50f412a 1459->1463 1467 50f40d9-50f40e8 1460->1467 1468 50f40d2-50f40d8 1460->1468 1462->1464 1463->1462 1467->1464 1468->1467
                                              APIs
                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 050F4111
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1467913981.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_50f0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: CallProcWindow
                                              • String ID:
                                              • API String ID: 2714655100-0
                                              • Opcode ID: 6f3164e6fb6f480e8b7c057694c266cc74a1b9004bc634e10958b487fdbcde02
                                              • Instruction ID: 16aff11a655b8eaf186408407b270fb388356819dea5af0d5df2a358667c4557
                                              • Opcode Fuzzy Hash: 6f3164e6fb6f480e8b7c057694c266cc74a1b9004bc634e10958b487fdbcde02
                                              • Instruction Fuzzy Hash: 7A4108B9900309CFDB14CF95D848AAEBBF6FB88314F248459D519AB321D775A841CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1470 71d9698-71d96e6 1472 71d96e8-71d96f4 1470->1472 1473 71d96f6-71d9735 WriteProcessMemory 1470->1473 1472->1473 1475 71d973e-71d976e 1473->1475 1476 71d9737-71d973d 1473->1476 1476->1475
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 071D9728
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: 659dad9de9c97d5d6032f67f64611df8b93afa626074cd2dd8fed47a21890b9f
                                              • Instruction ID: 6fc484d967a15c4a661d7d2260ebf7853569194712200efc6afff5ed05cd56ae
                                              • Opcode Fuzzy Hash: 659dad9de9c97d5d6032f67f64611df8b93afa626074cd2dd8fed47a21890b9f
                                              • Instruction Fuzzy Hash: 482125B19003499FDB10CFAAC885BDEBBF5FF48310F10842AE919A7240D779A944CFA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1480 71d9781-71d9815 ReadProcessMemory 1484 71d981e-71d984e 1480->1484 1485 71d9817-71d981d 1480->1485 1485->1484
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 071D9808
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: 9224f1ad04a3b50b7893f3cb1fd0f755d23159018aa1aafc10eeab58b4f08f49
                                              • Instruction ID: 1e784570948fd5e23c1401b972d3ae3122c8a74c7b2870336ffd19b631f14dac
                                              • Opcode Fuzzy Hash: 9224f1ad04a3b50b7893f3cb1fd0f755d23159018aa1aafc10eeab58b4f08f49
                                              • Instruction Fuzzy Hash: 112126B18003599FDB10CFAAD845BDEBBF5FF48720F14842AE918A7241C7799940DBA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1495 71d90c2-71d9113 1497 71d9115-71d9121 1495->1497 1498 71d9123-71d9153 Wow64SetThreadContext 1495->1498 1497->1498 1500 71d915c-71d918c 1498->1500 1501 71d9155-71d915b 1498->1501 1501->1500
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 071D9146
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: 5e4f01c48a9bc509d4519534e34e016f804bd531d580055f3c25d322a725ebc1
                                              • Instruction ID: f663210c9189ae4406e52a488f3157e4c1b801b55188cf99093abb3246131865
                                              • Opcode Fuzzy Hash: 5e4f01c48a9bc509d4519534e34e016f804bd531d580055f3c25d322a725ebc1
                                              • Instruction Fuzzy Hash: 102107B19003498FDB14DFAAC885BEEBBF5EF48324F14842AD459A7241C778A945CFA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1489 11fb790-11fd714 DuplicateHandle 1491 11fd71d-11fd73a 1489->1491 1492 11fd716-11fd71c 1489->1492 1492->1491
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,011FD646,?,?,?,?,?), ref: 011FD707
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1459715695.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_11f0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: cb3a0f4ac84e2bea8fcb69ee7f760fa9d05f85e3cfcdc80033142d48cd535d2b
                                              • Instruction ID: f34d5dd0d47fb903e64e1de974cc45331cae897eef90d8db75bb33555ff5839b
                                              • Opcode Fuzzy Hash: cb3a0f4ac84e2bea8fcb69ee7f760fa9d05f85e3cfcdc80033142d48cd535d2b
                                              • Instruction Fuzzy Hash: 6E21E5B5900248DFDB10CFAAD484AEEFBF9EB48314F14841AE918A7350D378A944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1515 71d9788-71d9815 ReadProcessMemory 1518 71d981e-71d984e 1515->1518 1519 71d9817-71d981d 1515->1519 1519->1518
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 071D9808
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: e2e51e857fc1caca1874be78717c57b8e78190ca1d5e98d98c0ef6647f7eb2df
                                              • Instruction ID: 588cb46370c81da8b7dc8e5b138e37f580e27e7d71f6721903feda25f3bc442c
                                              • Opcode Fuzzy Hash: e2e51e857fc1caca1874be78717c57b8e78190ca1d5e98d98c0ef6647f7eb2df
                                              • Instruction Fuzzy Hash: E12116B18003599FDB10CFAAC845BDEBBF5FF48710F10842AE519A7240C7799940DFA4

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1505 71d90c8-71d9113 1507 71d9115-71d9121 1505->1507 1508 71d9123-71d9153 Wow64SetThreadContext 1505->1508 1507->1508 1510 71d915c-71d918c 1508->1510 1511 71d9155-71d915b 1508->1511 1511->1510
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 071D9146
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: b2bdef5d42cf219bfc7b1feddb511318a3ae7e4bb5c089a3f5d0a4b1f1eca83f
                                              • Instruction ID: f2ee8557e9d11afae61880c48c3ecc074148687442c9f37320fc6e1835114806
                                              • Opcode Fuzzy Hash: b2bdef5d42cf219bfc7b1feddb511318a3ae7e4bb5c089a3f5d0a4b1f1eca83f
                                              • Instruction Fuzzy Hash: B02129B1D003099FDB10DFAAC8857EEBBF5EF48724F14842AD519A7240CB78A945CFA4
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,011FD646,?,?,?,?,?), ref: 011FD707
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1459715695.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_11f0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: aa162aebeeceed97a9a00244b7217b5d89041961f92f8639b17eedaeef0483a0
                                              • Instruction ID: ff13ffc9962dd6b2ef5907cf7256ed88bd8eedc4bcee6a29b78c1f2192d348f5
                                              • Opcode Fuzzy Hash: aa162aebeeceed97a9a00244b7217b5d89041961f92f8639b17eedaeef0483a0
                                              • Instruction Fuzzy Hash: 6E21E2B5D00248DFDB10CFAAD584AEEBBF5FB48314F14841AE918A7250D378A944CF64
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 071D9646
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: b7e8be7c41659734d372733620fa232b7e33a10b3d7c4c703a335738ffb0ff12
                                              • Instruction ID: dab8c4042af08969793cc5acaabce235915f63098003e6b017007de0124be6b7
                                              • Opcode Fuzzy Hash: b7e8be7c41659734d372733620fa232b7e33a10b3d7c4c703a335738ffb0ff12
                                              • Instruction Fuzzy Hash: D81147729002499FDB10DFAAD844BDEBFF5EF48320F24841AE515A7250C779A954CFA0
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 071D9646
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 8f33f6e350b927ce5be501da841ce5b01a45530edd055ac82b2544f3edfb205b
                                              • Instruction ID: 9d41b279295f52ad2e71b82155aeb123f5c4b1f18bd2819d5cfd8e1f76e3e306
                                              • Opcode Fuzzy Hash: 8f33f6e350b927ce5be501da841ce5b01a45530edd055ac82b2544f3edfb205b
                                              • Instruction Fuzzy Hash: 021137718003499FDB10DFAAC844BDFBBF5EF48720F14881AE515A7250C779A940CFA4
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 071DDD3D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: 2c4961fcd9ce9f2ebace08adb1d4c155da6c45e993988daf3ab1261def0afaf9
                                              • Instruction ID: 05e66762dcb7ffd8c3c3ed87435899be01a8d76c5d60bf6fa3c4e468ef505b32
                                              • Opcode Fuzzy Hash: 2c4961fcd9ce9f2ebace08adb1d4c155da6c45e993988daf3ab1261def0afaf9
                                              • Instruction Fuzzy Hash: A81106B5800349DFDB10DF9AD845BDEFBF8EB49324F10881AD558A7240C375A944CFA1
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: d7bc5936f8e5df19dbf31de61188682399c809bf051e36ff5efad24692b5b0c2
                                              • Instruction ID: 1a08b1679ce1380f85122b9e28268e8c0c8ca2fce2200a43c351ea23cec690d7
                                              • Opcode Fuzzy Hash: d7bc5936f8e5df19dbf31de61188682399c809bf051e36ff5efad24692b5b0c2
                                              • Instruction Fuzzy Hash: 171146B1900349CFDB24CFAAC5447EEFBF5EF88224F24881AD519A7240C779A944CFA4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: cea68ccd8c84d3954c78da816290591652ac9a1cccab17c2d09943d20413837d
                                              • Instruction ID: 46bb8aff752f28f61ad8803f43a52424e418b924124692576b12e3aa9387252f
                                              • Opcode Fuzzy Hash: cea68ccd8c84d3954c78da816290591652ac9a1cccab17c2d09943d20413837d
                                              • Instruction Fuzzy Hash: C91128B19003488FDB24DFAAC4447DEFBF5EF88624F24881AD519A7240CB79A944CFA4
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 071DDD3D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: 6f0437aba939ca713c95905b16aa9b452a34ee90bc12918a87b8f2b21a5d4e67
                                              • Instruction ID: 9ad46fa5de13496929b67b88f2763167e780d884c979106d08402ba69ca41972
                                              • Opcode Fuzzy Hash: 6f0437aba939ca713c95905b16aa9b452a34ee90bc12918a87b8f2b21a5d4e67
                                              • Instruction Fuzzy Hash: 3E1122B5800708DFCB10CF9AD884BDEBBF8EB48320F10841AE558A7240C3B9A944CFA4
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 011FAFFE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1459715695.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_11f0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: c5c7a0c34b981b415f1993d06325d532f416dab15eee4914a263b8dfdcfafd6c
                                              • Instruction ID: 32ddae1ecebe2bbfa4e61fde697eb74f860a68f67c42ed6a9174e419e50e8249
                                              • Opcode Fuzzy Hash: c5c7a0c34b981b415f1993d06325d532f416dab15eee4914a263b8dfdcfafd6c
                                              • Instruction Fuzzy Hash: 6F1110B5C002498FDB24CF9AD444BDEFBF4EF88224F10841AD529A7210C379A545CFA5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c02b5eef1520752278d691fce8f2fab94512a541993ac80e982d8fa64f7a8cbb
                                              • Instruction ID: 09430034c8f1be77eb36d3bf3c39b46f4e8be14f1684d3dce0fca2764c766ef9
                                              • Opcode Fuzzy Hash: c02b5eef1520752278d691fce8f2fab94512a541993ac80e982d8fa64f7a8cbb
                                              • Instruction Fuzzy Hash: 2DE1202170331287CB5AAF7D88D052EB6A7AFD4640358D87C99169F3AADF78CC09C794
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 37a9a193b2e54b0b67727aa2058db81127a0645726d662566623caecd544685e
                                              • Instruction ID: c1548a889ce92188ee8bac242d7c0d62d14dd0af96c065d73df4e09e39c14c80
                                              • Opcode Fuzzy Hash: 37a9a193b2e54b0b67727aa2058db81127a0645726d662566623caecd544685e
                                              • Instruction Fuzzy Hash: 5DE12F2170331287CB5AAF7D88D052EB6A7AFD4640358D87C99169F3AADF78CC09C794
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e118b411e153174bbb0675902f4f85f7c2fd930572a4bbbdd00a0c83434ef889
                                              • Instruction ID: 623ff09946ceefa846b24cfe8735743711a4cd4ee0741f6cf8f4c7c1c7e86418
                                              • Opcode Fuzzy Hash: e118b411e153174bbb0675902f4f85f7c2fd930572a4bbbdd00a0c83434ef889
                                              • Instruction Fuzzy Hash: C5C15D70A007589FDB14DFA5C844BEEBBB5FF89300F14819AE849A7350EB709986CF91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f8daa7b24561d912efe0c663a190756e0e638b5c74dfc5a1a7224a28215db9ec
                                              • Instruction ID: 39df715df2175cf7141884f30cd0b915dce8b5ba8b39b4bc5b5d1f15140d1e4c
                                              • Opcode Fuzzy Hash: f8daa7b24561d912efe0c663a190756e0e638b5c74dfc5a1a7224a28215db9ec
                                              • Instruction Fuzzy Hash: CE911931E11209CFCF14DF68D894ADDB7B5FF59300F1086A9E909AB225EB30AA85CF50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 16ae87cf269c39e28ea3ea527700366d44b9e9421f47813825cdef9a8dc00dc7
                                              • Instruction ID: 9c148b052ba1404811544331a4fad60e953f7d36ee10a5ed746eedb1e52e3e40
                                              • Opcode Fuzzy Hash: 16ae87cf269c39e28ea3ea527700366d44b9e9421f47813825cdef9a8dc00dc7
                                              • Instruction Fuzzy Hash: 42912C75A007589FDB14DF64C840BEEBBB1FF89700F10819AE849A7251EB70AA86CF51
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c15007f556fc46468424b7bab61480061794f85ae6f44c820045d7255d13aeed
                                              • Instruction ID: f9a101fcbbc3b3d737ec92af0408cfd46d1226f56f71d3f80f879d05919f855c
                                              • Opcode Fuzzy Hash: c15007f556fc46468424b7bab61480061794f85ae6f44c820045d7255d13aeed
                                              • Instruction Fuzzy Hash: 4F51AC30B116158FDB08DBB9D858A6EBBEAFFC8750B158569E819DB3A0DF70DC018790
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c335307f7513e7d2f845c71c33f71d5168777b064c5e047e30df775654bfb224
                                              • Instruction ID: ba5c00b8c5b2a168c40c38975b0ba2978af24c6fab967c45a1715a4c7ea8c157
                                              • Opcode Fuzzy Hash: c335307f7513e7d2f845c71c33f71d5168777b064c5e047e30df775654bfb224
                                              • Instruction Fuzzy Hash: 9C610974A5320ACFCB00EFA8E5849AEBBF6FF09300F105569E805A7354DB369E49CB55
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 36432c44f42d1ac375931ff6e587e281b0b3f0b2d99c048a0f557b814b68daeb
                                              • Instruction ID: 3e694a4369b8c41b76712d694b5b2652471ccda84f1a62f012ef2505697b6bd6
                                              • Opcode Fuzzy Hash: 36432c44f42d1ac375931ff6e587e281b0b3f0b2d99c048a0f557b814b68daeb
                                              • Instruction Fuzzy Hash: BA613831A11709DFCB14DFA9C894A9DBBF2FF88310F208159E909AB361DB71AD85CB40
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5d78745a445e0db90c0f9747e5e9eb3ce672e6bcc622f2dbb5df0e8ef257a217
                                              • Instruction ID: 2083b931755b42ce17e1a65b6ee946886abcf350dcc0661d8cdf9b4989c14c6b
                                              • Opcode Fuzzy Hash: 5d78745a445e0db90c0f9747e5e9eb3ce672e6bcc622f2dbb5df0e8ef257a217
                                              • Instruction Fuzzy Hash: 2C51D0B4D06218CFDB54CFA5D8496EEBBBAFB8A300F14902AE416B3340DBB51946CF54
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f00a7154ceebdc9192968284796793bb80dc4768edb9dd852407008684717539
                                              • Instruction ID: b09e51e5532c93b6e59691032be8d51b8a31fd4e7ce7c84cf46bcd3f8c8ed55e
                                              • Opcode Fuzzy Hash: f00a7154ceebdc9192968284796793bb80dc4768edb9dd852407008684717539
                                              • Instruction Fuzzy Hash: B4419A72A05348AFCB04DFA9D849A9EBFF9EF49210F14846AE805E7350D735A904CBA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a0b69ee9480ef09f70714810049d0ec66cdf22d6b31fc89f1067a932d3924c86
                                              • Instruction ID: f87c50e6b2593480a061f38ec261cbc356ca5b3e7312063b6ee567a5defd875a
                                              • Opcode Fuzzy Hash: a0b69ee9480ef09f70714810049d0ec66cdf22d6b31fc89f1067a932d3924c86
                                              • Instruction Fuzzy Hash: 6051D0B4D06218CFDB54CFA5D8496EEBBBAFB8A300F04902AE416B3340DBB51946CF54
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 66b4665e1b74810d954b3afb450d5b8094edb0c99209fbe434330d2fc9abf69e
                                              • Instruction ID: 02d692c8f2ab6244a27643fd17a99e12839f404d7249d7bc14071c50940fefe4
                                              • Opcode Fuzzy Hash: 66b4665e1b74810d954b3afb450d5b8094edb0c99209fbe434330d2fc9abf69e
                                              • Instruction Fuzzy Hash: 1251D231D11209CFCF11DF68D884ADDBBB1FF49310F148299D849AB315EB30A948CB90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 985f81b820b6cdf3acb7c0d9a1e8f8f9e34feb4f7f5ceba71ffac07ba9542f09
                                              • Instruction ID: d885ebccab9837caf573cc661666a705df30684827c1852c2f7531f57605ee52
                                              • Opcode Fuzzy Hash: 985f81b820b6cdf3acb7c0d9a1e8f8f9e34feb4f7f5ceba71ffac07ba9542f09
                                              • Instruction Fuzzy Hash: E6413C71A01209CFCB54DF68D88499AFBF5FF98310B14C66AD819EB345EB34E945CBA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ebd20dc0f2543deef0e1af0f2129c0442234af5a40c5f9ed33d1e5046a3574d3
                                              • Instruction ID: d97895c9dffb41fdd5d0ae0789903793935d27897ad6cbb6fa8b0656ef03134f
                                              • Opcode Fuzzy Hash: ebd20dc0f2543deef0e1af0f2129c0442234af5a40c5f9ed33d1e5046a3574d3
                                              • Instruction Fuzzy Hash: 8C416D30B056058FDB05EB68C858AADBBF6EFC9210F14849AD005DB3A1DB74DD85CB92
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 83fd8cc2c6d66dd4b9ba11f115f4949c0104bd72472609ee5c5d99f29f22c22e
                                              • Instruction ID: 136134e0fb438e886ef84cb10323ba65d21dcecdc8e02612efb9759cb7a41b64
                                              • Opcode Fuzzy Hash: 83fd8cc2c6d66dd4b9ba11f115f4949c0104bd72472609ee5c5d99f29f22c22e
                                              • Instruction Fuzzy Hash: 11317E74B023089FDB19EB7498585BEBBF6EFC9210B54886EE81597380DF308D05CB51
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3c23618e5ce549c4091e2c7679c01948448b90d7dca05c1ed1342b48d604f438
                                              • Instruction ID: 87fac7656e121c19e02b073bb8efcd4cdcfcb0ebec5778c7c2608beb2d17e828
                                              • Opcode Fuzzy Hash: 3c23618e5ce549c4091e2c7679c01948448b90d7dca05c1ed1342b48d604f438
                                              • Instruction Fuzzy Hash: 75417E31A11219CBCF10DF68D984ADDB7B5FF59300F1486A9E909AB355DB30AD89CF50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e17e2caa4608bec7f82979a474613145c1ecdc73b39310134aa14b3247bb79f8
                                              • Instruction ID: 0b275c44814aad1e942b28399e188d90ff5bd3867e41f551e3bf1b92a49f96ea
                                              • Opcode Fuzzy Hash: e17e2caa4608bec7f82979a474613145c1ecdc73b39310134aa14b3247bb79f8
                                              • Instruction Fuzzy Hash: 90315778D05209EFCB04DFA9D684AADBBF5FB89300F1080A9D814B3360EB749A55CF91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 35ae2dc4549ba0b510ff7178da9452b3d074dfc9fd9cc10bb3bb9a8949d5f0fd
                                              • Instruction ID: 26e85993633874b305b87b2830b3d07d9a82b3c23a19a321ffa4faea373c0e25
                                              • Opcode Fuzzy Hash: 35ae2dc4549ba0b510ff7178da9452b3d074dfc9fd9cc10bb3bb9a8949d5f0fd
                                              • Instruction Fuzzy Hash: 14312375E06209DFCB04DFA9E8846EEBBFABB89310F10842AE415B7350DB725D45CB94
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 72c762eb710b5ef2865ff983144bc3917504811438ad1b2b650847bdf69f2bab
                                              • Instruction ID: fef67369d3ec93b290f6be54d3e18afc9ddc27e7cfe09e73b6ba90206d24917e
                                              • Opcode Fuzzy Hash: 72c762eb710b5ef2865ff983144bc3917504811438ad1b2b650847bdf69f2bab
                                              • Instruction Fuzzy Hash: A4311374E06218DFDB04DFA9E484AEEBBBABF89310F109429E415B7350DB725D41CB54
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2bc90e51cb909c93a077e179430ac0ed072b36c202f36e4b6dbaa85970800578
                                              • Instruction ID: 16960aa3f4d7dddd38ec6bdb71a7c0d5756cdd38420b1ee7243049e12ca3b862
                                              • Opcode Fuzzy Hash: 2bc90e51cb909c93a077e179430ac0ed072b36c202f36e4b6dbaa85970800578
                                              • Instruction Fuzzy Hash: 7C2107B2901318DFD714CF69D844B9ABBF5FF45360F24C669E9159B390DB719802CB90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ac98f2d877f2b9fb2ff161964a66d84f5c41174b6e15318b227afc8783f39899
                                              • Instruction ID: b3d8ee334c2989122e6b9f0d7b77ad9ebc3c9b2590448d91138640f4c11707c0
                                              • Opcode Fuzzy Hash: ac98f2d877f2b9fb2ff161964a66d84f5c41174b6e15318b227afc8783f39899
                                              • Instruction Fuzzy Hash: C0316B35A063189FCB04DFA9E844ADDBBB2BF88310F0484AAE405AB361D730E945CB64
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 686ef29f4bc54c59502519e2bcad2e9fdb807af8d9daad13c4696dcf6c6b5ee6
                                              • Instruction ID: fbc3bc9988757107bab38eb1a4cbbffe56bb98cd58661c8c1a553e5fb109e2a8
                                              • Opcode Fuzzy Hash: 686ef29f4bc54c59502519e2bcad2e9fdb807af8d9daad13c4696dcf6c6b5ee6
                                              • Instruction Fuzzy Hash: F221A0735073908FE3128B7CCC51BDA3BA1FF82651F04095AC4888B352DA58D946C7A5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 92ef524116f57cb233b1524780d4e31ee9481ecf29ea1748249e90fc53b1c22e
                                              • Instruction ID: 2b2b0921801ad15577632477fb65f95f7fd362fcd6501013b47236c1b1a7841b
                                              • Opcode Fuzzy Hash: 92ef524116f57cb233b1524780d4e31ee9481ecf29ea1748249e90fc53b1c22e
                                              • Instruction Fuzzy Hash: 49216034B016098FCB00EB68C849AAEBBF6EF89710F05415AE406DB371DB70DD45CB91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1459348359.000000000115D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0115D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_115d000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c1735d6f05d7f2091a9a7fe6f4a8a0b31264f0c7d6f3c0ecdfa718167faf6c0e
                                              • Instruction ID: 0c5ffe010eabdaa296ec0934801a5e2cb57d458284b6f3f2a5a9607f700d48eb
                                              • Opcode Fuzzy Hash: c1735d6f05d7f2091a9a7fe6f4a8a0b31264f0c7d6f3c0ecdfa718167faf6c0e
                                              • Instruction Fuzzy Hash: 3521F1B1510344DFDF59DF94E9C0B26BF75FB88218F20C569EC090A256C336D456CBA2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1459411597.000000000116D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0116D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_116d000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3666edeac18893a4ce440840ac7f70501fd1ffd325e2ba82756e9a0809b874fc
                                              • Instruction ID: c90eff962978c9a27729fe167f416c02d352dae192e178b02f55641b72f18f5c
                                              • Opcode Fuzzy Hash: 3666edeac18893a4ce440840ac7f70501fd1ffd325e2ba82756e9a0809b874fc
                                              • Instruction Fuzzy Hash: 1921F5B1604344EFDF19DF94E9C0B25BB69FB84324F24C56DE8894B252C33BD456CA62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1459411597.000000000116D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0116D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_116d000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8b06f3b55b0db99f1fc887ad15b770891f6133178550ed6b0bbd0b43458b5519
                                              • Instruction ID: da5710f366b52ff6f2be36e59a99206e1af379a8d8ad4253fa726699d4979d51
                                              • Opcode Fuzzy Hash: 8b06f3b55b0db99f1fc887ad15b770891f6133178550ed6b0bbd0b43458b5519
                                              • Instruction Fuzzy Hash: 4D210371604340DFDF19DF54E880B16BB69FB84214F20C569D8890B242C33BD417CA62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9e329d19a341a599ff07795fef85efe27b8c195dbb79adfc81ea6f164fe81c6d
                                              • Instruction ID: 6dce7b65f557943172ef644c0761a85c8607813756c90a89e2227ade0aab1d3a
                                              • Opcode Fuzzy Hash: 9e329d19a341a599ff07795fef85efe27b8c195dbb79adfc81ea6f164fe81c6d
                                              • Instruction Fuzzy Hash: 2911F8353125208FCB29BB78D41866D3297AFC9645B1444BDD14BCB3B0DE36DC42C799
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a75575216b3c6501862d9667578ec5807ae8d648d057a5fd0cfbfa82e339182d
                                              • Instruction ID: a0e8640b7783e1724b9ab721d6920ae24a87a5b932de3b1759cf8a64a158619e
                                              • Opcode Fuzzy Hash: a75575216b3c6501862d9667578ec5807ae8d648d057a5fd0cfbfa82e339182d
                                              • Instruction Fuzzy Hash: 5231C0B0C12318DFDB20DF9AC984B8EBBF5BB48714F24801AE804BB291C7B55845CFA4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9cdb5098f9d73c798f60dc3100e0e062db249511b991969acd6fc0b024666e7e
                                              • Instruction ID: b80e015694d4e5f11c2048ff8a0e1d0cd8c78f51fc6103205cc383f56be8066d
                                              • Opcode Fuzzy Hash: 9cdb5098f9d73c798f60dc3100e0e062db249511b991969acd6fc0b024666e7e
                                              • Instruction Fuzzy Hash: A511BC71B016259FCB19DB69D888D2EBBFAFF8975070584A9E805DB360EE70DC01CB90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 976f717bd59af0ab3218de9b3fc34c7844d45d9fe8a4fa2d6f2429c88033087d
                                              • Instruction ID: e6a99a78b041a1ca32ed96d90c806e9927ba3b93c55d559efced7059ffa0a789
                                              • Opcode Fuzzy Hash: 976f717bd59af0ab3218de9b3fc34c7844d45d9fe8a4fa2d6f2429c88033087d
                                              • Instruction Fuzzy Hash: DE31DFB0D12358DFDB60DF9AC588B9EBBF5BB48714F24801AE805BB290C7B55845CFA4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ccace845b9634866660289e98faf1908c6d9f5e4413cfaff4f46bcf0849aafdb
                                              • Instruction ID: 55ce4caa90688d0c793a74ff1c19bb7a7342e09dbec4f1e4870fda2aba608ad8
                                              • Opcode Fuzzy Hash: ccace845b9634866660289e98faf1908c6d9f5e4413cfaff4f46bcf0849aafdb
                                              • Instruction Fuzzy Hash: 0811A3717026595BCB11DE69CC859EFFBBAEFE4610B14852AE905D3240DA30D906C7A2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6292a8dab949fac585248def99fc940950cae3d421322ed4a1a988a53fb95567
                                              • Instruction ID: daaf7729b5f6cc5d1d337230ced3727d864e06a305692d25dbb08d88dcd57ebf
                                              • Opcode Fuzzy Hash: 6292a8dab949fac585248def99fc940950cae3d421322ed4a1a988a53fb95567
                                              • Instruction Fuzzy Hash: EE21E771E00215DFCB10DF68DC44A9BBBB5FF94320B14C659D8099B249EB70E941CBA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d03b80c0c4d9ff1b3d3f07cdc393f8d0f361fbf4dc4e36d39f3d393635c18b8e
                                              • Instruction ID: 38d614ff9643c0bc9d4b6032f0384a9b4d11cc0ab239e7545cae90bbe6a2fda7
                                              • Opcode Fuzzy Hash: d03b80c0c4d9ff1b3d3f07cdc393f8d0f361fbf4dc4e36d39f3d393635c18b8e
                                              • Instruction Fuzzy Hash: E911E371B023154B8B16DB798C548BFB7F7FFC4260714492DE468A7340EF3089058765
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1459411597.000000000116D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0116D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_116d000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b19dce04b7e0fd6b073ea31a689decd77a36c6b0c9190dd9ad4bfc0d46d3edcf
                                              • Instruction ID: a4ff6a899baa16507b6e47eefd5da5da90627d2559b58acdd2a746cca9b96f0d
                                              • Opcode Fuzzy Hash: b19dce04b7e0fd6b073ea31a689decd77a36c6b0c9190dd9ad4bfc0d46d3edcf
                                              • Instruction Fuzzy Hash: EE2180755093808FCB06CF64D994B15BF71EB46214F28C5DAD8898B6A7C33B981ACB62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0f426b4fde7c8b82b61f4f4074c685c56c9bc2f4ea1a47d79a1ae97546ca880b
                                              • Instruction ID: d2f4ca0909959b7e97b39315952d99bbcfe7b7d9d390e9b06ddcbd0f8afdf2c3
                                              • Opcode Fuzzy Hash: 0f426b4fde7c8b82b61f4f4074c685c56c9bc2f4ea1a47d79a1ae97546ca880b
                                              • Instruction Fuzzy Hash: 87118271B027155B8B15EA798C449BFB7FBEFC4160B65892DD424D7340EF309D058764
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: aa24502060ec152ad778356674920a3186798c90f05e09e4aea8dccbbd8e940d
                                              • Instruction ID: 64903a5e831f203a25fb96d8e9ff47f72d8e251bb38fe1f8b0e69361665c11ec
                                              • Opcode Fuzzy Hash: aa24502060ec152ad778356674920a3186798c90f05e09e4aea8dccbbd8e940d
                                              • Instruction Fuzzy Hash: 52115E71B012198BCB14EBB899105FFBBFABF88710B104069D505F7340EB329D01CBA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 12eb040edd6eb438f7a17ead31ed581d75ac3b0688a17a63a6685be1366b8dd2
                                              • Instruction ID: 677970552fa7330c3d6803f19a3e0d3523fa56fd522d942cb059deb4ada9266a
                                              • Opcode Fuzzy Hash: 12eb040edd6eb438f7a17ead31ed581d75ac3b0688a17a63a6685be1366b8dd2
                                              • Instruction Fuzzy Hash: D3114271E0021A9FCB44DFA8D4516AEBBF5FF49350F10815AE919E7385EB309A04CBD1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d469bb56b13b9e927a9cff487b038a3291983500ff9a255b0455b2f13bf3aaeb
                                              • Instruction ID: 9e8a43a3676fd7d1c3b47e1b64d597375f4a0fa049e9668833a49ef3497aff06
                                              • Opcode Fuzzy Hash: d469bb56b13b9e927a9cff487b038a3291983500ff9a255b0455b2f13bf3aaeb
                                              • Instruction Fuzzy Hash: 57117C327056148FCB29AB38E84866EB7B6EBC6715B14842EE106C7790CF35DC42CB50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1459348359.000000000115D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0115D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_115d000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d9902afee9e3b44ff2e822c933ca4f9850614e81a5517644e66c67081f9efd2f
                                              • Instruction ID: e106c26803871605b2812a7ad1fd4706940445acd8791ecdb38311350013456c
                                              • Opcode Fuzzy Hash: d9902afee9e3b44ff2e822c933ca4f9850614e81a5517644e66c67081f9efd2f
                                              • Instruction Fuzzy Hash: 45119D76504280CFCF16CF54E5C4B16BF72FB84218F2486A9DC490B656C336D45ACBA2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 74dd3fd8eaa48cf1d367f4fed334249e434728a648bc448f6dc2865b35ebebe1
                                              • Instruction ID: a2c8ad09ffbc77a58e76ceaa268f24cc9851ea67d096ef2db25b3ee5ace162f8
                                              • Opcode Fuzzy Hash: 74dd3fd8eaa48cf1d367f4fed334249e434728a648bc448f6dc2865b35ebebe1
                                              • Instruction Fuzzy Hash: B821D6B5901749DFCB10CF9AD884ADEBBF5FB48314F10841AE919A7310C375A554CFA5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1459411597.000000000116D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0116D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_116d000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dd2c54e641c636489e18f71c5e932094e1140b5f592d34fffac0146327057262
                                              • Instruction ID: 2cd2b62345e27f259c76fb2928a8695e5b8c2ffeedaafe40d13c614296937de0
                                              • Opcode Fuzzy Hash: dd2c54e641c636489e18f71c5e932094e1140b5f592d34fffac0146327057262
                                              • Instruction Fuzzy Hash: 7711BBB5604280DFCB16CF54D5C4B15BFA2FB84224F28C6ADDC894B696C33BD45ACB62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 50d9db8a4641642dd30262d7aaf9314ac6c175d0d335e926035561e3e1261606
                                              • Instruction ID: 12dcdf521af03fa10d9b4546dd60fc3dd8e5de95b2b3ffff361328dd60441b72
                                              • Opcode Fuzzy Hash: 50d9db8a4641642dd30262d7aaf9314ac6c175d0d335e926035561e3e1261606
                                              • Instruction Fuzzy Hash: 13110DB1E0021A9FCB40DFA9D8517AEBBF0FF49700F14815AD859E7385E630AA41CBD1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 57b39c76bd772e5ac97cc650599cf76f39aa41755fee0e0b050a2a784554412e
                                              • Instruction ID: 1483250da18e3a64acfe8099723cf998935fd00907be34f8024dfa938cbe0a6c
                                              • Opcode Fuzzy Hash: 57b39c76bd772e5ac97cc650599cf76f39aa41755fee0e0b050a2a784554412e
                                              • Instruction Fuzzy Hash: 5901D4353026098FCB289A6DD455E6AB3B2BFC5650B15807EEA46CB724EA31EC42C790
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e704b039c025a201bb134b0b3f95563d556f3d6b885b51bad57e826d6f0cbfca
                                              • Instruction ID: dd274339cd6296f009454d3abded5bddac38e30bf79ef9f2f1145279760d4b26
                                              • Opcode Fuzzy Hash: e704b039c025a201bb134b0b3f95563d556f3d6b885b51bad57e826d6f0cbfca
                                              • Instruction Fuzzy Hash: 94116675A002189BDB10EBA4C8447BFB7FAFF88300F01885DD919A7390E7789A05CBA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a94fac26c2da3e4a1879f9f7bff9cb95e245d225244b92b5b7c641ec7ba99b0b
                                              • Instruction ID: 9dbc3e054ba3c7467852b51b10cc0d6361486dbb1144088d8761844d1e3913e5
                                              • Opcode Fuzzy Hash: a94fac26c2da3e4a1879f9f7bff9cb95e245d225244b92b5b7c641ec7ba99b0b
                                              • Instruction Fuzzy Hash: 27115775A012189BDB10EBA4C844BBFB7BAFFC8700F00481CD919A7350EB789A41CBA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 56b32b3e81ac12ddcbdab810b35e04e048abd484e1fbf7dd9d3de5265cc2c940
                                              • Instruction ID: 1d4884d704b6cff88cd1e45568ff7ef830877e69baba28d3fd5eb2810a724aa4
                                              • Opcode Fuzzy Hash: 56b32b3e81ac12ddcbdab810b35e04e048abd484e1fbf7dd9d3de5265cc2c940
                                              • Instruction Fuzzy Hash: 49014736A042089BCB04F764D8449EEF7B9EFCA310F008269E50597340DF309D42C7E1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1459348359.000000000115D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0115D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_115d000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 76a3e0606698f7ddae2d6d641b0b25591ae5aa4b04fde0da0ec7e4ef8327faea
                                              • Instruction ID: c53266a0ca41e3397a69970ef8ecbccff724c50176ed25e678bcdbf9f720fe8a
                                              • Opcode Fuzzy Hash: 76a3e0606698f7ddae2d6d641b0b25591ae5aa4b04fde0da0ec7e4ef8327faea
                                              • Instruction Fuzzy Hash: 6B012B71004B80DFFB588F95DD84B67FB98EF81628F08C55AED290B282D3799400CB72
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fac6daa379307f39e353e99a6596f4882ee3439e9655cbce8a2711bb5f100704
                                              • Instruction ID: 159cb1c4b7be5541bcb025769aa5936dbbc4c9aee54195dd4f1d6a037e3948b4
                                              • Opcode Fuzzy Hash: fac6daa379307f39e353e99a6596f4882ee3439e9655cbce8a2711bb5f100704
                                              • Instruction Fuzzy Hash: F7119CB5D1061DAFCB40EFA8D5455EEBBF5EF48200F10865AE858B7350E7709A50CBA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b121e81784b35304b408da3551bb48fc78f2861bb4754c88fd75a3683d73825e
                                              • Instruction ID: 48f382a83a7b121d7643a7de57d89e5a950b1caa8f8e934d41f16eb29f0d9d6b
                                              • Opcode Fuzzy Hash: b121e81784b35304b408da3551bb48fc78f2861bb4754c88fd75a3683d73825e
                                              • Instruction Fuzzy Hash: 10F044353025058FCB28DA69D464D6A73F7BFC4650715806EEA578B764EF31EC01C790
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ef77f75b8919a515a9dd918dd24cb9222da606f0d45b9cbd165476be5b9f260c
                                              • Instruction ID: d3ceb1c1a647d6c4191be8f8933612460aafb40d3a211ac6d6e049f381c24f34
                                              • Opcode Fuzzy Hash: ef77f75b8919a515a9dd918dd24cb9222da606f0d45b9cbd165476be5b9f260c
                                              • Instruction Fuzzy Hash: E101D136A006089BCB04EA64E8448EEF7B9EFCA310F108269E91567310EB709E41CBE1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 79d3b0a800b3c1d87803d098f451c893aebb891180032c6a3f3e5d06bc783c53
                                              • Instruction ID: 68153dc97f17bb57301514ac9fc643bf88fd7d37e6f6a074a058cc0df5941326
                                              • Opcode Fuzzy Hash: 79d3b0a800b3c1d87803d098f451c893aebb891180032c6a3f3e5d06bc783c53
                                              • Instruction Fuzzy Hash: 88F03676702108AFDF05DA94DD45EFA77EEEF54218F148069E404D7315E631EE05D750
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 65e88638544aa40903f7fb64f311181af68a748b2cae8d6c17618352bfb0d9f7
                                              • Instruction ID: 3ed248daf0647b0737cf651ff8a41e30e755eca1817bbdc93969b5681143df40
                                              • Opcode Fuzzy Hash: 65e88638544aa40903f7fb64f311181af68a748b2cae8d6c17618352bfb0d9f7
                                              • Instruction Fuzzy Hash: 9DF0272235751417CF3D71B6885423FB2574FC1B10B188A2D910ACB384CD69C803C2C9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 46e74469c2dd22456593418fe3788bfd1a19efa2670d500dcf5a86b47a27e01c
                                              • Instruction ID: 6a038a62113cb7f3c14383b435b30f2059d59d4f44bda44d8f87cfaa7b097037
                                              • Opcode Fuzzy Hash: 46e74469c2dd22456593418fe3788bfd1a19efa2670d500dcf5a86b47a27e01c
                                              • Instruction Fuzzy Hash: C8019775D10619AFCB40EFA8C5449EEBBF4EF48200F10855AE858B7310E7709A50CBA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0ab692883efe750ea7ea9096c42471a5e74df4f6711006d73f8eef83d0d60656
                                              • Instruction ID: fc0c95c407e620ce3e1ccf05972c713fe4d7c8fffe546bbc784824c7bedef25c
                                              • Opcode Fuzzy Hash: 0ab692883efe750ea7ea9096c42471a5e74df4f6711006d73f8eef83d0d60656
                                              • Instruction Fuzzy Hash: E5F0A771367514178F3D72BA589453F72575FC1B10715892D511A8B394CE69D803C2DA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1459348359.000000000115D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0115D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_115d000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 89c9d9918b3176a71d8962fd029835485c30dd6e3190abf59633e3ea619535c1
                                              • Instruction ID: 9939a5f0b0810c5fbd4136fd6f78da2c7c34b46d73f39de34ac1e6435ece997a
                                              • Opcode Fuzzy Hash: 89c9d9918b3176a71d8962fd029835485c30dd6e3190abf59633e3ea619535c1
                                              • Instruction Fuzzy Hash: 9AF06271405784DEFB148E5ADC88B62FF98EB41638F18C45AED185B286C3799844CBB1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 07dc8f047b86a773efafed7486e029f6984ff82e78096153d3309376a7f9d375
                                              • Instruction ID: 34476c5b393bb209fd207258e6be6d5e5206b4ccc9e6573c40a2383b09325c9d
                                              • Opcode Fuzzy Hash: 07dc8f047b86a773efafed7486e029f6984ff82e78096153d3309376a7f9d375
                                              • Instruction Fuzzy Hash: 9FF04FB9D45208EFCB44DF78E64569DBBF5FB49300F1091A9D814A3355E7349901CF44
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b51adb94c7db8ec70671ee6c964727ac7d43e282c57f8c793e16d827dc3fe9d3
                                              • Instruction ID: 1738b6333793667daae0665db550729304daae1356418f11edc660a9ceef0aef
                                              • Opcode Fuzzy Hash: b51adb94c7db8ec70671ee6c964727ac7d43e282c57f8c793e16d827dc3fe9d3
                                              • Instruction Fuzzy Hash: 51F0273634160487CB14E660E4456EDF3B6FBC9210F508279CA0287740DB346D02C7B5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6396c827efe13b33aab60301caf7c655e5c840709a95fb63173388ed98923a6c
                                              • Instruction ID: adee4216a67cafaa48d42a84a4fb7f8f2e95bc67fd10160b9d029c44fca81ea1
                                              • Opcode Fuzzy Hash: 6396c827efe13b33aab60301caf7c655e5c840709a95fb63173388ed98923a6c
                                              • Instruction Fuzzy Hash: B001ECB0802219DEDB15CF65C4483EEBBB1FF44350F148629E425AB290D7744A85CB91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c3f1467aee2da8391eff0e7ce4f31a489a99fc92d631ec07dfcc8de184f54abd
                                              • Instruction ID: f3b02a9b862a81dda6c3ebc64fc3e825d95a1faf0e2df8156d70e3a6d4b4173b
                                              • Opcode Fuzzy Hash: c3f1467aee2da8391eff0e7ce4f31a489a99fc92d631ec07dfcc8de184f54abd
                                              • Instruction Fuzzy Hash: CBF082727006285FD304D6AADC84E2BBBEDFBC93B4B958079F518D7350D9319C01C6A0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d4167ef740ddb5070a59f5a70db1052accce04956046f748f6968bc4cd7bf774
                                              • Instruction ID: 41bc58e50cea791a1db28774f44be525c3c2f2c7ac334d6fc3d5d24f32bb1f86
                                              • Opcode Fuzzy Hash: d4167ef740ddb5070a59f5a70db1052accce04956046f748f6968bc4cd7bf774
                                              • Instruction Fuzzy Hash: 7FF05E72601118AFDF04DF54D845A9ABBEAEF05224F1481AAE908D7360EA32E941C754
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f20d34caf6a199d9acf1dc6332d37a336e589861b036635e7a0a3e178f10652a
                                              • Instruction ID: 02142e5bde52b5f430197a488a166b402a01c5961f971904e60e0bcef295cbbc
                                              • Opcode Fuzzy Hash: f20d34caf6a199d9acf1dc6332d37a336e589861b036635e7a0a3e178f10652a
                                              • Instruction Fuzzy Hash: 6501FBB0802219DFDB14CFAAC4083AEBBF5FF48360F148625E825AB290D7744A81CF90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: aa34b7cec4516fb668519c687eb671351ec8e75e6fba1aa09c44170265980343
                                              • Instruction ID: 2c3494b3a77fc7714fdc35515b14fef393660bd931e20e80970c08fa81f30493
                                              • Opcode Fuzzy Hash: aa34b7cec4516fb668519c687eb671351ec8e75e6fba1aa09c44170265980343
                                              • Instruction Fuzzy Hash: 78F08231601108AF9F08DF98DC88DAE7BEAFF45214B10806AA408D7210EA71E900C758
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6debbc0ca3ccf5b90e75d3ad5d764d09b1ad30a2330d348360675520dda32f40
                                              • Instruction ID: d200800fe9a5bad466e44229c846f7f76f5df8179ea2d11cef76be2d7c811c5c
                                              • Opcode Fuzzy Hash: 6debbc0ca3ccf5b90e75d3ad5d764d09b1ad30a2330d348360675520dda32f40
                                              • Instruction Fuzzy Hash: 68F0653B2C2615CBC3319A74D485BE573A5EF44621F0444B5E14987BA1C666E853D690
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d68d76b6780c3271c4454dba81ec6e75fd3cf798eac966240c35036a58428d88
                                              • Instruction ID: abc1b6f2111549bb7b12411282b12d06b75d311761e93592203606aa60f5fcf1
                                              • Opcode Fuzzy Hash: d68d76b6780c3271c4454dba81ec6e75fd3cf798eac966240c35036a58428d88
                                              • Instruction Fuzzy Hash: E3F05E31B003149FCB29AB79E8185AEB7FAEBC5715F00882EE506C7340CF34A846DB90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0cf2efe066f96467170cbe114085a798b8ac04a1828fa68c10ccc5f762ba1780
                                              • Instruction ID: c0ede9068f7771a996dcab637d4b148ae0f6830b5b0f18854ce2bb34830d1962
                                              • Opcode Fuzzy Hash: 0cf2efe066f96467170cbe114085a798b8ac04a1828fa68c10ccc5f762ba1780
                                              • Instruction Fuzzy Hash: 94E030727001245F5304966AD884D6BB7EDFBCC6743518079F518D7310D9319C00C6A0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ec5cccac2b7178f44e3c3ec1834a198ef4f96283c052c4ca3a2dc302fbb905d2
                                              • Instruction ID: 11130977a4b1bfa169c0f83dd5527179e69e8f7abab67f8d7f169a0a8a49e971
                                              • Opcode Fuzzy Hash: ec5cccac2b7178f44e3c3ec1834a198ef4f96283c052c4ca3a2dc302fbb905d2
                                              • Instruction Fuzzy Hash: 7CF06536352704CBE315A678C841BD7B3BAEFC5750F54482DD85A97741CBB6EC06C6A0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0d5d8c6ae5513e0439a987442ef22e06ab45fa724267713c9102507701e03bac
                                              • Instruction ID: f16758e0081370284300a5af6974cd2dc655807210db224bf47500a9efd78bd5
                                              • Opcode Fuzzy Hash: 0d5d8c6ae5513e0439a987442ef22e06ab45fa724267713c9102507701e03bac
                                              • Instruction Fuzzy Hash: 1EE092B776355506DB2A65F5AD1837F22835FE0B26F09892D815ACABC0EE25C002C2A0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4563d34017278260ea88fa2354b4f91bebfd0d59d2d68e6d4a9328cf43e9c952
                                              • Instruction ID: 2c977dac2ce8efcbd9657d6907f9aa629fc9d50f59f2e4264deae88746e09743
                                              • Opcode Fuzzy Hash: 4563d34017278260ea88fa2354b4f91bebfd0d59d2d68e6d4a9328cf43e9c952
                                              • Instruction Fuzzy Hash: C0E0DF23B639A407CE1461BCA81B37E269FDBC9A21F95003EE50AC3BC1CD558D02C3E9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b8ec89ed5f3ef7ceb7d30b7893681e0508544fa292acb66afc6d70a781283a54
                                              • Instruction ID: e51deafd03e21a3ce869237b97b677ca6dd6e0d2ba04a4c721b1f9137fea62dc
                                              • Opcode Fuzzy Hash: b8ec89ed5f3ef7ceb7d30b7893681e0508544fa292acb66afc6d70a781283a54
                                              • Instruction Fuzzy Hash: C4F0DAB8D15208EFCB44EFB9E64899DBBF5FB49300F1081A9D819A3354E7709A50CF41
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 673700bd89c46118abf8e56e27fd8877e51967a4c9b89a9f61854b7e543e8932
                                              • Instruction ID: 999ca5aecff54bdc306074f65be4580eb1252ebd2cebee709ea0998f33b2bcaf
                                              • Opcode Fuzzy Hash: 673700bd89c46118abf8e56e27fd8877e51967a4c9b89a9f61854b7e543e8932
                                              • Instruction Fuzzy Hash: 3EF0B7B0E1520A9FDB84DFA9D845AAEBBF4BB48300F1085AA9918E7240E7749641CB90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 53f79f89cdfbfeb460ad6c5c5b96ded2edbde826204c7fa58c8fdd1d321a4fa7
                                              • Instruction ID: 167dc480e90653ccee3daa5da3dcdde5c96bfd680e2b7ff2bdbbe07d9096b6c0
                                              • Opcode Fuzzy Hash: 53f79f89cdfbfeb460ad6c5c5b96ded2edbde826204c7fa58c8fdd1d321a4fa7
                                              • Instruction Fuzzy Hash: 26F0E2B4E1520A9FEB44DFA8C8496AEBFF1BB08300F15886A9504E7240D7748A41DB90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bb0713a439da4ac51e2b96acaee8c76eebb899ec3709e4c735aa60dc780835f0
                                              • Instruction ID: 92c2382c06bb78b1e21e5d3ad9c859feac541f065425b2578c6827240575d46f
                                              • Opcode Fuzzy Hash: bb0713a439da4ac51e2b96acaee8c76eebb899ec3709e4c735aa60dc780835f0
                                              • Instruction Fuzzy Hash: 0BE06D31393300CBE215A668C854FDBB3AAFFC9751F40082DD45A87340CBB6EC0AC6A1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 596fd517608395eaef9c9c8804b58f74993d554f4f3fe337b1dbecdcc9b535d6
                                              • Instruction ID: 59240be299f12678e7f2dddc2020a66a308ae9d921936660cdfeb0fe984be6b9
                                              • Opcode Fuzzy Hash: 596fd517608395eaef9c9c8804b58f74993d554f4f3fe337b1dbecdcc9b535d6
                                              • Instruction Fuzzy Hash: 4FE03935D16208EFCB10DBA4E44679CBBF4EB4A200F1081A99815A3B40D6745A41DB40
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f9f638f539c843bb73788225a8788b328e4dc15771a81b55c8033b7fca06a26e
                                              • Instruction ID: 1c9d22b3762e8fc0ff807435c17e7cb7c2608b5aa2099e8356063cebc22a45fd
                                              • Opcode Fuzzy Hash: f9f638f539c843bb73788225a8788b328e4dc15771a81b55c8033b7fca06a26e
                                              • Instruction Fuzzy Hash: 18E06D30D06208AFCB54DFB4E94539CFBF4EB4A300F1081AA9804E3340D6705A44DF40
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c82ecf6fb5a31a835eef7126b56247299eb70b7254c08262c71d5ebeeb2c2e2b
                                              • Instruction ID: 35121145b6c0b14eaa5bf0782f25116b61c30965a8b84f6213718aae0d385045
                                              • Opcode Fuzzy Hash: c82ecf6fb5a31a835eef7126b56247299eb70b7254c08262c71d5ebeeb2c2e2b
                                              • Instruction Fuzzy Hash: F0E08622B275A00BC51432BC741E56E299FDBC6651F51003EE50AC77C0CD644D02C3E6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 55c656e509c8b2f0912ab9aab50c85bf0822820859b511d7d3de28301a0e0080
                                              • Instruction ID: c6821f5bc23334a52c6ab4d35919b3f9dd1d4111188433a984ec4e4cccaa753e
                                              • Opcode Fuzzy Hash: 55c656e509c8b2f0912ab9aab50c85bf0822820859b511d7d3de28301a0e0080
                                              • Instruction Fuzzy Hash: 7AD05E3244B20CABDB54C675C843BADB7FDE703A40F281A68A80563AA1DB766E05D354
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bc13e609368a2484d24d9d27ac35c53d91a8a74fc5c352ccc6b650d0af61aeee
                                              • Instruction ID: a397758c896906e6faf460ff4b9b54c7e9c4d73a4369614c90e7e5116551ebf0
                                              • Opcode Fuzzy Hash: bc13e609368a2484d24d9d27ac35c53d91a8a74fc5c352ccc6b650d0af61aeee
                                              • Instruction Fuzzy Hash: D1E01274D1A208EFCB64DFA8E4456ACBBF8AB8A300F1080AA9809A3300DA745A44DF40
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 715739f02e5dc33ae63fb949f56d16d8a178005b09500846c4c9a1f32c43f295
                                              • Instruction ID: f67e9bc31e38af82e07319ac174e87cb5e1aae8b84209abd259e03905ab5f283
                                              • Opcode Fuzzy Hash: 715739f02e5dc33ae63fb949f56d16d8a178005b09500846c4c9a1f32c43f295
                                              • Instruction Fuzzy Hash: 5DE08C3A502609DFCB14AF60D845E48BBB6FB00705F19C165E9054F775C732E85ACF54
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: deb2d42614fc69353b29b480e4809dd27095140de09c724a99ef54aee680214e
                                              • Instruction ID: a68887c1db02681c19e071e1286a364290d35750c947f7ad944757fa4f4d8881
                                              • Opcode Fuzzy Hash: deb2d42614fc69353b29b480e4809dd27095140de09c724a99ef54aee680214e
                                              • Instruction Fuzzy Hash: 55E04F70D16248EFCB54DFB9E44569CFBF4EB4A300F1091AAD808A3300E7705A54DF40
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5e905c9177873387c94c29722a0043467def6a92f5b6a27c10fb31a1c92f183f
                                              • Instruction ID: 952fa66e8e2b009a368f40853fc42fcf2a9955d7ba6afe74f2c1567a35a4b910
                                              • Opcode Fuzzy Hash: 5e905c9177873387c94c29722a0043467def6a92f5b6a27c10fb31a1c92f183f
                                              • Instruction Fuzzy Hash: 65D02B2034B3601BC604522D3C99396BECFAF55220F40041EF14D83301CE565804835B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d7fc037f7f57fd4957fe2c92834023ed3cb416d2479a8c04d093de11605c45fe
                                              • Instruction ID: 093bc784c5c2982c8ecc8ffaa719dcc26c3bb533d82e950a4c2463818814cda3
                                              • Opcode Fuzzy Hash: d7fc037f7f57fd4957fe2c92834023ed3cb416d2479a8c04d093de11605c45fe
                                              • Instruction Fuzzy Hash: B4E0C23481A20CEFCB24DFA0D8456ACBFB9FB07311F108169E80423740CB716EA5EB84
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b0a070e986ecc953622e473affaf02910b6ea793b33fc5451823373cacae7d10
                                              • Instruction ID: 77bc1d1a4410bda3a1ceb0bac948de786e4fb361f22fa0e33bb748b9635b8f7a
                                              • Opcode Fuzzy Hash: b0a070e986ecc953622e473affaf02910b6ea793b33fc5451823373cacae7d10
                                              • Instruction Fuzzy Hash: 09E0C23481A20CEFCB24DFA0D4055ACBF79EB07311F108069E80423740CB711EA5EB84
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fef361a5ebfc95033d1c4d221ed12e41e51def848323a38d51e03ae0f577326b
                                              • Instruction ID: 687447bef11ee222a5811ba2161dc30518ddc64df00f222a3b3cdf5252268934
                                              • Opcode Fuzzy Hash: fef361a5ebfc95033d1c4d221ed12e41e51def848323a38d51e03ae0f577326b
                                              • Instruction Fuzzy Hash: ACD0223044F20CDFCB54CAB9C402B7DB7EDE703600F101498A408232618F721D00E254
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 24fa87704eb57d3cafac75cc5a8e519d8bd9350704cc178265c55207e5e9f161
                                              • Instruction ID: 07c08ba9193983681dc543198758ee984dbd313203374296d6185820f8061bbe
                                              • Opcode Fuzzy Hash: 24fa87704eb57d3cafac75cc5a8e519d8bd9350704cc178265c55207e5e9f161
                                              • Instruction Fuzzy Hash: 1BC0807F187A80B6C5029B748F42BDDED1356F3B10319C755A34C51E62C52CD813D215
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9296fe41c4a1cd56810d2949c1d90a6b56101f5081020890588c18286a42b790
                                              • Instruction ID: 24887cb8db00c60509f0404ec6aaa40503cd14cac2d6f34cdac0f290510262e8
                                              • Opcode Fuzzy Hash: 9296fe41c4a1cd56810d2949c1d90a6b56101f5081020890588c18286a42b790
                                              • Instruction Fuzzy Hash: CDD012332152085E4B51EED5F804C6677DDBB247007418422E508CB520E621E424DB51
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 645d9e78dd8beea9f9d91ca16b712fc289bceee07c40bf2b7aa09a9d2a163398
                                              • Instruction ID: a64adfdf1cca22356f692521e0b04ac2506c833bd3fdf09003a7bf939935d042
                                              • Opcode Fuzzy Hash: 645d9e78dd8beea9f9d91ca16b712fc289bceee07c40bf2b7aa09a9d2a163398
                                              • Instruction Fuzzy Hash: 7DC01260145B856BD7078A304C06DCA3A359AA3B00346C0567D05DA0D6C2754555C633
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 61b51cac815c347262edd74a13760c40381f2a5d1ee8d74180bf4239feed860f
                                              • Instruction ID: 08b852aea64a84050733f5d354c0be2b7bdda517fc8d8ef8b15fbb658fab822b
                                              • Opcode Fuzzy Hash: 61b51cac815c347262edd74a13760c40381f2a5d1ee8d74180bf4239feed860f
                                              • Instruction Fuzzy Hash: CEC08C3F00340C6AC310EAA0CC43FA1B7B4FB02600F94C519B34851D30CA31F8269713
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 38e171e66e89f46699170becd88f090bc66255401890e13d35e8db12408e0561
                                              • Instruction ID: 6cfd5baf4018a549f7c3d7554aeb968b8447ea95788cae4404af890683c90c0a
                                              • Opcode Fuzzy Hash: 38e171e66e89f46699170becd88f090bc66255401890e13d35e8db12408e0561
                                              • Instruction Fuzzy Hash: C7C04C391171149A8601E7508984D15B6B5BB967007808C59618545125CB22D81CD716
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 78d30870b0f345ecfd06767252d51e74445006b265bfecdbfbaa8d9eedbb29c5
                                              • Instruction ID: 3f743957aae1595096dff59f0f8f630bba624168e301381881334a712edb2bcb
                                              • Opcode Fuzzy Hash: 78d30870b0f345ecfd06767252d51e74445006b265bfecdbfbaa8d9eedbb29c5
                                              • Instruction Fuzzy Hash: 9DB0123A257A64F35411A3648D89F6E9061BFF3F00B80CC05724400051CE65842DD21F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e60400a0b01180c1f53fe809174f63fa63edf4b599821829c5b8a925dad9aa82
                                              • Instruction ID: b6a774a1aadb2023ecfc3586c7e1e2bb625d59babb2c3588baa3edc1c446a2b1
                                              • Opcode Fuzzy Hash: e60400a0b01180c1f53fe809174f63fa63edf4b599821829c5b8a925dad9aa82
                                              • Instruction Fuzzy Hash: 2FB012477DF7C50ECE4332744C1A1087F307997500BC941C79840CF1D2D4086504C372
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9e05360e1260283b26e584adde883dce18137f7412de426544dc2eb5c61b121f
                                              • Instruction ID: 2a4c62fb307561941aba2c0e8998e4dd377a1a041eb3891c571109e5b41ff771
                                              • Opcode Fuzzy Hash: 9e05360e1260283b26e584adde883dce18137f7412de426544dc2eb5c61b121f
                                              • Instruction Fuzzy Hash: 62A22731E002598FDB15DB68C8587EDB7B2FF99300F1582A9D90AA7350EB74AE81CF50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c4bd9edc8307a9ed4a2f9c93b67e7ba4dc086f04aab16304a695a0c2a9168240
                                              • Instruction ID: 6a8292402bb4364d5553f654d0385f9652956bf5ad9a07a39a8fe50f19815331
                                              • Opcode Fuzzy Hash: c4bd9edc8307a9ed4a2f9c93b67e7ba4dc086f04aab16304a695a0c2a9168240
                                              • Instruction Fuzzy Hash: 41E11BB4E102198FDB14DFA8C590AAEFBB2FF89305F248169D414AB355D730AD41CF64
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1467913981.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_50f0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f1039d69d6d6c64c545c23c293fe29b20e328c28812cdde22b645a3efba6232e
                                              • Instruction ID: edffd71a93bb8aaa0e73caf44dff599e87afc5cf112e86d0033ef264fc6c3d66
                                              • Opcode Fuzzy Hash: f1039d69d6d6c64c545c23c293fe29b20e328c28812cdde22b645a3efba6232e
                                              • Instruction Fuzzy Hash: 751282B04017458AE730CF69F94D1897BB1BBE6718B904389D2616B2E9DFB9114BCF84
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0c2dc5f13b6eac8dbf4aecd0652020dc3e434134bb177e48ff9a20e15d92b3e0
                                              • Instruction ID: 014209abfb0de255a615263a89c8cdd39c46a7d6d8e7b98c868bb5abc3fafa33
                                              • Opcode Fuzzy Hash: 0c2dc5f13b6eac8dbf4aecd0652020dc3e434134bb177e48ff9a20e15d92b3e0
                                              • Instruction Fuzzy Hash: B6E1F8B4E102198FDB14DFA9C580AAEFBB2FF89305F248169D418AB355DB31AD41CF60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: aa63d9f76bf95dc17e799ec0b21d0dad0179500f9f1e9788088a18bfed057e36
                                              • Instruction ID: 4e7aaccb75ccae3b5c28c3b9e4bb1d758c9d083c4b54366986ba60aea786c852
                                              • Opcode Fuzzy Hash: aa63d9f76bf95dc17e799ec0b21d0dad0179500f9f1e9788088a18bfed057e36
                                              • Instruction Fuzzy Hash: 36E108B4E102198FDB14DFA9C590AAEFBB2FF89305F248169D818AB355D731AD41CF60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 36e1d65c87878747165e1216b9e2ac843fa1863d4c30f97558076c86cf1defd7
                                              • Instruction ID: cf49b21c30e1d3fea061604075d41a7e976fcbf73a7844c50453e39f40191b98
                                              • Opcode Fuzzy Hash: 36e1d65c87878747165e1216b9e2ac843fa1863d4c30f97558076c86cf1defd7
                                              • Instruction Fuzzy Hash: 11E109B4E102198FDB14DFA9C990AAEFBB2FF89305F248169D414AB355D731AD41CF60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 960c7e6c506b4b9a589a5e4f4ecb41e6df2bbc7f7254d4ff26b5f167f0d5402b
                                              • Instruction ID: 3bc749290bf384724b55a04aa4ce9d028fe5d9b4bdda3dc55838c0e12086243f
                                              • Opcode Fuzzy Hash: 960c7e6c506b4b9a589a5e4f4ecb41e6df2bbc7f7254d4ff26b5f167f0d5402b
                                              • Instruction Fuzzy Hash: 1DE1F9B4E102198FDB14DFA9C590AAEFBB2FF89305F248269D414AB355D731AD41CF60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2711bb78c5669d506c7c0d5991f0e5691eb6d518281fa580296524fff13b3da3
                                              • Instruction ID: 04e6992223acf5639c7e3d95191e1ac7c0cf065ead8764dc0ff8d356fa6ade05
                                              • Opcode Fuzzy Hash: 2711bb78c5669d506c7c0d5991f0e5691eb6d518281fa580296524fff13b3da3
                                              • Instruction Fuzzy Hash: B7D1063592075A8ACB11EFA4D990AD9F7B1FF96300F50CB9AE41937610EF706AC4CB91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1459715695.00000000011F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_11f0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 25283e3f8a734a016ad1a1dc5aa298c769153edd9316cdd176edecef5d0229d7
                                              • Instruction ID: 0617dda552d02d9409ea539d85c01a78b073dc39fefd01e7f3d6fd987c311eee
                                              • Opcode Fuzzy Hash: 25283e3f8a734a016ad1a1dc5aa298c769153edd9316cdd176edecef5d0229d7
                                              • Instruction Fuzzy Hash: 20A19236E0020ACFCF19DFB4C84459EBBB2FF85304B15856EEA05AB265DB75D906CB40
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cb4db0716fdbe93c600c020090059397ea4391fe2ed272c712b74a78ab61518f
                                              • Instruction ID: 177a803b3869dbc3416f5add45f44f34a204eb2c61d48bc69bbaffa683dcb83e
                                              • Opcode Fuzzy Hash: cb4db0716fdbe93c600c020090059397ea4391fe2ed272c712b74a78ab61518f
                                              • Instruction Fuzzy Hash: 34D1063592075ACACB11EFA4D990AD9B7B1FF96300F50CB9AE41937610EF706AC4CB91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1467913981.00000000050F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050F0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_50f0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 850bdf297e78aebd6041b5a73c25b45211f2c0c1dc3c72bfbeb6dfd6a546945c
                                              • Instruction ID: ec8338d1b586a2a7ddda3040381ffdd1a1e3b12e42a8791985d6957078370e20
                                              • Opcode Fuzzy Hash: 850bdf297e78aebd6041b5a73c25b45211f2c0c1dc3c72bfbeb6dfd6a546945c
                                              • Instruction Fuzzy Hash: 67C1D7B08117458BD720CF69F84C28A7BB1BBE6724FA04399D1616B2E9DFB8154BCF44
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: daff7392f045c5406815d0a765b2c3c192677d1ac709c1616bd6d58be7530107
                                              • Instruction ID: fad7f3392effc1ab5a2379a831217b83b058f462aeb683bb17377e916e0ad147
                                              • Opcode Fuzzy Hash: daff7392f045c5406815d0a765b2c3c192677d1ac709c1616bd6d58be7530107
                                              • Instruction Fuzzy Hash: 1F81C174D0621CDFEB14CFAAD8846EDFBB6BF89300F10906AE419A7251DB74594ACF40
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1477512999.00000000056E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_56e0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0d2b6809ffee07cc23c6d8a49c27ebd855cb7814dbd1619e0ad8dba79ca1abd0
                                              • Instruction ID: e8f3b26758ccf2449753c4ea326c361bb55ece45a88181f049c9403ba1dd026a
                                              • Opcode Fuzzy Hash: 0d2b6809ffee07cc23c6d8a49c27ebd855cb7814dbd1619e0ad8dba79ca1abd0
                                              • Instruction Fuzzy Hash: 1681A274D0A21DDFEB14CFAAD8846EDFBB6BF89300F10906AE419A7251DB74594ACF40
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1482525895.00000000071D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_71d0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bbed7bc95ea50a5a93bd96ffafb71d1210ae30a2e164627a07e07dc802d83b26
                                              • Instruction ID: ce7d1f3c1c6a7952adc0401e886fa764830f9e27259ea61fe855884b42cbb02d
                                              • Opcode Fuzzy Hash: bbed7bc95ea50a5a93bd96ffafb71d1210ae30a2e164627a07e07dc802d83b26
                                              • Instruction Fuzzy Hash: 9C512AB4E102198FDB18CFA9C9815AEFBF2BF89305F24816AD418AB355D7309D41CFA0
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6a8f90672ce58a9cbbee1e6fad12f9039e4383e9fdfb5fc605d97c70b9e20722
                                              • Instruction ID: a2056798b13802a69e7fd7f144fb1cbf6b97b934ec6632bb02e42d3ac8499403
                                              • Opcode Fuzzy Hash: 6a8f90672ce58a9cbbee1e6fad12f9039e4383e9fdfb5fc605d97c70b9e20722
                                              • Instruction Fuzzy Hash: 2C53F831D10B1A8ACB55EF68C8806A9F7B1FF99300F51D79AE45877121FB70AAD4CB81
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a1d9401b558f054478e79fb374392962654e95fc35ff5cb3619a5a3c1688dc79
                                              • Instruction ID: f567a4d7e61b22152248c9634c04541cb6976ade3da2dd07ccd76a7bada75e52
                                              • Opcode Fuzzy Hash: a1d9401b558f054478e79fb374392962654e95fc35ff5cb3619a5a3c1688dc79
                                              • Instruction Fuzzy Hash: C9B18F70E042098FDF18CFA9D8A17EDBBF2AF98B14F14852DD814E7654EB749841CB85
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d0fdfd5fabf879818867d9f61779b4291e04af3f4e7d86f6b4f6d7f6484ede35
                                              • Instruction ID: 78625944b9b0b0045d8f7b2f1fda0d97e77df8b70f3cf90af352f240cfbc7f85
                                              • Opcode Fuzzy Hash: d0fdfd5fabf879818867d9f61779b4291e04af3f4e7d86f6b4f6d7f6484ede35
                                              • Instruction Fuzzy Hash: 65918C70E002098FDF18CFA9C8957DEBBF2BF98B14F14852DE454A7254EB749845CB82
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b9f8b07e363442963097b5b2dd6f067661258938274018ededc17512037d8ca3
                                              • Instruction ID: 27d99cf7387b595da5809c777c745167ab77f3564ab0b917bfe39a4e203eafbe
                                              • Opcode Fuzzy Hash: b9f8b07e363442963097b5b2dd6f067661258938274018ededc17512037d8ca3
                                              • Instruction Fuzzy Hash: EE129334700206EBDB2AAB2CEA9866D73A2FBC5755B105D29D505CF345CF35EC4ACB81
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 99efde3ed916f66806ea204eaa834dc105e2d95f853d423d77d191138a28cb47
                                              • Instruction ID: f4863e0ff81dfdf35af559dac63e3cb21e7bb5343ceb2e59ea1884b0ada9528d
                                              • Opcode Fuzzy Hash: 99efde3ed916f66806ea204eaa834dc105e2d95f853d423d77d191138a28cb47
                                              • Instruction Fuzzy Hash: 2EE1C534B002088FDF1ADB68E594AADBBB2FF98714F148469E906DB351EB34EC41CB51
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 22d12d4ca788967dfb93e41c5341a3a675cbae1cde81b700007ba59662cce190
                                              • Instruction ID: 93519088ac3d5c9846b81c48c599861d11b9a4ee8a2638542113dbba0dec4146
                                              • Opcode Fuzzy Hash: 22d12d4ca788967dfb93e41c5341a3a675cbae1cde81b700007ba59662cce190
                                              • Instruction Fuzzy Hash: B0A18D70E04209CFEB18CFA9D8A17EDBBF1AF68B14F14812DD814E7654EB749841CB95
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 127a97d0621ba3adafac3f808483ba03b967512f09aa5d9b268bbc488bf33586
                                              • Instruction ID: 2de26f25f7107a665eab64846ab03ed813defe3dd4ec565fa0a134876c0285fb
                                              • Opcode Fuzzy Hash: 127a97d0621ba3adafac3f808483ba03b967512f09aa5d9b268bbc488bf33586
                                              • Instruction Fuzzy Hash: 48A17870E00209CFDF18CFA9D8957DEBBF2BFA8B14F148529E454A7254EB349845CB92
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9d33ac31dfd1cace06c1bc27d25b4817817e0ececaf70586b2fa170ac426c853
                                              • Instruction ID: 38757bb80462d6bdfcf0ff3763db7ecc18b87408565e318b0688e24975149aba
                                              • Opcode Fuzzy Hash: 9d33ac31dfd1cace06c1bc27d25b4817817e0ececaf70586b2fa170ac426c853
                                              • Instruction Fuzzy Hash: 0D7187B0E042498FDB18CFA9C8907EEBBF2AF98B14F14812DE415A7654EB749841CB95
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 67fdf0bbacffdefc75af937c72abffb72b57fbaae37d887cd1da49e78fd6572c
                                              • Instruction ID: b37a48c40f4c281bfb2c24148b11975c1b50ad56f9e19b8ff689c3040afdda60
                                              • Opcode Fuzzy Hash: 67fdf0bbacffdefc75af937c72abffb72b57fbaae37d887cd1da49e78fd6572c
                                              • Instruction Fuzzy Hash: 1E7177B0E042498FDB18CFADC8947DEBBF2AF98B14F14812DE415A7650EB749841CB95
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d8e2bb63b4c01873f86210aedc77ebbcec83bf233a82f66407b3d7694285196d
                                              • Instruction ID: fde5a5c53ac086fabe1d3a9092773bcd8d59acc2f8a5d9fcdbf6ab10261df285
                                              • Opcode Fuzzy Hash: d8e2bb63b4c01873f86210aedc77ebbcec83bf233a82f66407b3d7694285196d
                                              • Instruction Fuzzy Hash: EC517E347002158FDB18DB68C558AAE7BB6FF99B04F2044ADE406EB7A1DB759C40CBA1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a51a852638b8871eb2ae948add1c934ed4865b0688a90cb1e4747dee270ae9f3
                                              • Instruction ID: a15e4eebbaa11d2060846b483c608c719bd83fafbd8ea06f0e785d17ab62c837
                                              • Opcode Fuzzy Hash: a51a852638b8871eb2ae948add1c934ed4865b0688a90cb1e4747dee270ae9f3
                                              • Instruction Fuzzy Hash: 8C514A75A00208DFDB04DFA9E884B99FBB1FF88310F14C1A9E9099B355E771D945CB90
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b30c0ef37dbd9cdcd299e89ec578ba5a51586a8dbb3b9f79668f1b90cbacf714
                                              • Instruction ID: 8f048ea75d0c2b098723814efd70e83eb105e8980c6450cecb817a1ec1aeac32
                                              • Opcode Fuzzy Hash: b30c0ef37dbd9cdcd299e89ec578ba5a51586a8dbb3b9f79668f1b90cbacf714
                                              • Instruction Fuzzy Hash: 66510470D102288FDB18CFA9C885BEDBBB1BF58B14F14851EE815AB351D774A844CF95
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c4b389da41a5e065dc84cd55c889aa7c35d70eaab672d3b132b6ec744f1183fa
                                              • Instruction ID: 3869d3ffbb4ba2d35b03cd058a2c837cb6a7bbcb1f9917c448c676089be3ea35
                                              • Opcode Fuzzy Hash: c4b389da41a5e065dc84cd55c889aa7c35d70eaab672d3b132b6ec744f1183fa
                                              • Instruction Fuzzy Hash: 4E511370D002688FDB18CFAAD894BAEBBB1BF58B10F15811EE815AB351D774A844CF95
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 34ac69e4d5fec85c99fad89a5b4e89c09f83ad9ef87dd78c4d337a7268f17e44
                                              • Instruction ID: c5c11dd5d8c7e6636b71d7ff1b9d795497038e21d78a5c79448de2dcc0cf7c7e
                                              • Opcode Fuzzy Hash: 34ac69e4d5fec85c99fad89a5b4e89c09f83ad9ef87dd78c4d337a7268f17e44
                                              • Instruction Fuzzy Hash: F4510570D002288FDB18CFA9D895BAEBBB1FF58B14F14811EE815AB351D774A844CF95
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 73982fa928a6a17fd0c97fcc20d22c89bba29f7169e0c418348e688bfe46f949
                                              • Instruction ID: 339840994702bdfbc8119756f68a19757ef8466ab05e52fa87787b90b45395a3
                                              • Opcode Fuzzy Hash: 73982fa928a6a17fd0c97fcc20d22c89bba29f7169e0c418348e688bfe46f949
                                              • Instruction Fuzzy Hash: 71512230616249AFDB06FF28FB84D553BB6B79A708304495BD0488FA3ED7356A05CB91
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5d87d1876a554eba9c8ae5c3e4cfdeb534dfa53ff952e09cd9262561ee38fcea
                                              • Instruction ID: 145f5977cb12e8d9385947d0c6ec415a11f6cd308882f409bb7510c899395111
                                              • Opcode Fuzzy Hash: 5d87d1876a554eba9c8ae5c3e4cfdeb534dfa53ff952e09cd9262561ee38fcea
                                              • Instruction Fuzzy Hash: 58511330616249AFDB06FF28FB84D553BB6B79A308304495BD0488FA3DD7756A05CB91
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 72d756ce62f4eb4cac1dc0675158c988b77b568924c2e13df61abc5557390314
                                              • Instruction ID: 96ce099be49995cc3ce5fe43e616be0e0cdaed388ef0296336224b39de90e172
                                              • Opcode Fuzzy Hash: 72d756ce62f4eb4cac1dc0675158c988b77b568924c2e13df61abc5557390314
                                              • Instruction Fuzzy Hash: B2316E75B00615EFD709DB68D890E3AB77AFBC4B00F54C168E4029B299CB35EC42DBA0
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f0c7e90cf196c04f930a1c771afa9bf539bb380e42938e50ff3ec5d16ef39cce
                                              • Instruction ID: a98375831cc27238106de9296d4a3e63787c790c309ebaa972075bde52872b3d
                                              • Opcode Fuzzy Hash: f0c7e90cf196c04f930a1c771afa9bf539bb380e42938e50ff3ec5d16ef39cce
                                              • Instruction Fuzzy Hash: 05316F32E10219DFDB19DBA9D5507AEB7B2FF95710F208529E405EB280EBB0AD41CF51
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ba7e2519b9c90cc645ba61caf94a76ecb8ef19a80ca24c7694a0d7fe24df040c
                                              • Instruction ID: b6f19bc15435a6e394862c3f17b4b91a72955c203efd6aadb31ae51988b1fd86
                                              • Opcode Fuzzy Hash: ba7e2519b9c90cc645ba61caf94a76ecb8ef19a80ca24c7694a0d7fe24df040c
                                              • Instruction Fuzzy Hash: AB41EFB4D003489FEB14CFA9C884ADEBBF5EF58710F248429E809AB250DB75A945CF90
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 893cc331ff9d973a828c2df21123f1ad4b9ac3ff23f11318ac19e0daac68df77
                                              • Instruction ID: c62594d5193ab95b7125d205bf1fd4ab041f931ed3112d52b00bbcb8535d5eaa
                                              • Opcode Fuzzy Hash: 893cc331ff9d973a828c2df21123f1ad4b9ac3ff23f11318ac19e0daac68df77
                                              • Instruction Fuzzy Hash: 35316031E102599FDB1ADFA9C4507AEBBB2FF95700F204519E401EB281DBB09841CF51
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b9a7d4a462ad743e05d2111bb0de8262128c8084b6d3434351f88e24fe45460d
                                              • Instruction ID: f141b7fb7600394ba67c5329ec96507d77af60b1549bf313d9391bde16074c67
                                              • Opcode Fuzzy Hash: b9a7d4a462ad743e05d2111bb0de8262128c8084b6d3434351f88e24fe45460d
                                              • Instruction Fuzzy Hash: 37317C30B00215EFDB5DEB78CA546AE77F2AF99A44F10056CD801AB395DB3AED01CB91
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5caafdc3c0456266fb1bd136ec87a9a2121d0976a1bd794354770fc65ce8d902
                                              • Instruction ID: a06f1d1e1bd6f917406e1d6f2ac23dc705b27a12ef30ec3daa84fd971317ad3b
                                              • Opcode Fuzzy Hash: 5caafdc3c0456266fb1bd136ec87a9a2121d0976a1bd794354770fc65ce8d902
                                              • Instruction Fuzzy Hash: 2C310C39640210EBEF2AEB7CE95871937B9F758B08F440D1AD009CB75BDB68CC418792
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0ea5ba0c906be293b593884746e3d9e7fbf898a5858bb23dbc2b5a1cf3baf9cb
                                              • Instruction ID: 042a487e4745a952b1bae141c3e5de31f7b0c4749845a20a1c07a3281e77ddb5
                                              • Opcode Fuzzy Hash: 0ea5ba0c906be293b593884746e3d9e7fbf898a5858bb23dbc2b5a1cf3baf9cb
                                              • Instruction Fuzzy Hash: B641EEB4D00348DFDB14CFAAC884ADEBBF5EF58710F248429E809AB250DB75A945CB90
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cf7aff57a529ebd176f70f99bf26518f2fb1ff23cdd772c277712d90593ed516
                                              • Instruction ID: 846bb499584b425dcb16b17f3232f40f3611d15e155f50444855d0482a3708df
                                              • Opcode Fuzzy Hash: cf7aff57a529ebd176f70f99bf26518f2fb1ff23cdd772c277712d90593ed516
                                              • Instruction Fuzzy Hash: FD315C30B00214DFDB5DEB78CA646AE77B3AF98A44F10056CD402AB395DB3AED01CB91
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 53b6c7142e3bb34f1b0170ba7430ceeaaaa57ebcbbcac083d226bf4daa272a49
                                              • Instruction ID: 1b8e38429867b8d4c025f92dd3a37399a178f586c52e753d82f2b0a0aa2d42e6
                                              • Opcode Fuzzy Hash: 53b6c7142e3bb34f1b0170ba7430ceeaaaa57ebcbbcac083d226bf4daa272a49
                                              • Instruction Fuzzy Hash: 21319534E102499BDB1ACF68D95079EFBB2FF89740F50861AE905EB241EB71A845CB50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2687067270.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_106d000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1370cae38ee0687c016633135249e7cb83441f51523ef5879695c790d6ee8323
                                              • Instruction ID: 4aea1e23ab27a0608e6a7b1fc63e17f99a15cfd7f811fa290bb327ad5cc24865
                                              • Opcode Fuzzy Hash: 1370cae38ee0687c016633135249e7cb83441f51523ef5879695c790d6ee8323
                                              • Instruction Fuzzy Hash: 943159715093C49FDB13CB64C894711BFB5AF46214F29C5DBD9898F2A3C23A984ACB62
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 49bf78d103d8e00680395e9608420e1895d5ff78ec916ed45d566a69558cf3a7
                                              • Instruction ID: bfe44e38906dfc0ba25112d0943c97e844bd3ea61dd35052be4d7e4b1938a8b4
                                              • Opcode Fuzzy Hash: 49bf78d103d8e00680395e9608420e1895d5ff78ec916ed45d566a69558cf3a7
                                              • Instruction Fuzzy Hash: D1219634E102099BDB1ADF68D95069EFBB2FF89740F10C619E905EB341EB719C41CB50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 64478a4097d99873e66606b2cae81fd0da1645e53233ee362da3145648db2e80
                                              • Instruction ID: 6fbc0b9e1898d7250e7e51532869a53becc4caec1070bed09d44da87a39f71f6
                                              • Opcode Fuzzy Hash: 64478a4097d99873e66606b2cae81fd0da1645e53233ee362da3145648db2e80
                                              • Instruction Fuzzy Hash: 3121A431E1020D9BDB19CF68D4906DEBBB2FF99710F50861AE812F7381EB70A845CB52
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b2c72c02f9031fd000f765152f1232db19fcbf794169bd31fdf82d14b3233f7d
                                              • Instruction ID: 3323a783146b8eb6c86dabf6798e30757cec4a0fb16a580d91f6d69b1f26fc88
                                              • Opcode Fuzzy Hash: b2c72c02f9031fd000f765152f1232db19fcbf794169bd31fdf82d14b3233f7d
                                              • Instruction Fuzzy Hash: E921C534B001088FEB19DBA9D855BEE7BF5BF88B24F11812DE505EB3A4EB719D008791
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 64c14d46d9810fd7ebe3c02df67ff78a38fd3acd0d8413ea040973b8b2f9fa80
                                              • Instruction ID: 7eac97a101fa8a6ebc789bff48479498ccb274ca8dab98caa4f1a455ac430228
                                              • Opcode Fuzzy Hash: 64c14d46d9810fd7ebe3c02df67ff78a38fd3acd0d8413ea040973b8b2f9fa80
                                              • Instruction Fuzzy Hash: BD217C30B44205EFDB28EB78C5257AE7BF2AF59A44F20046CD401EB256EB36DD40CBA1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2687067270.000000000106D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0106D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_106d000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 22abf4292a7dcca32881a89456459560c03862c8f877f29639601cd1878c8aec
                                              • Instruction ID: d04e9375dfaa20a6725a18baea3398ff34fd18eddedc2bca36bfa6e4b3f8a021
                                              • Opcode Fuzzy Hash: 22abf4292a7dcca32881a89456459560c03862c8f877f29639601cd1878c8aec
                                              • Instruction Fuzzy Hash: 5821D0B1604344EFEB15DF94D980B26BBA9FB84214F24C5A9E9C94B252C33AD446CB62
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d273f9d68f00b432fa2f41153e1217f3a088dacaf73b5ba48fa0c2eda38c1c3f
                                              • Instruction ID: f0672f80017971e477f33a041f44241b05297f1d4117f4c98009953706d9fb17
                                              • Opcode Fuzzy Hash: d273f9d68f00b432fa2f41153e1217f3a088dacaf73b5ba48fa0c2eda38c1c3f
                                              • Instruction Fuzzy Hash: FA212434644200EBEB3B6B6CE88876D7761F716B28F10082EE446C7687DB29C885C782
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c5565bbe8c2fb44ae57784c41c496be4609ce6a8015a6efe856923887e4c66f1
                                              • Instruction ID: c1efdd803f97be6cd29d3107adfeee096f9e564a75ead5f7efa812689877c32d
                                              • Opcode Fuzzy Hash: c5565bbe8c2fb44ae57784c41c496be4609ce6a8015a6efe856923887e4c66f1
                                              • Instruction Fuzzy Hash: E121CF71B101098FEB19CBA8D855BAE7BF5BF98B10F118029E501EB3A0EB719C008B90
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 63c0e1340470d6e830e5e5dfa2d3a24c46b16b7ff672019cdfcf892725e3aced
                                              • Instruction ID: f53b01550301996930f5fec4753c89d3d0fd3c93d4e03eaef826cbe832e78867
                                              • Opcode Fuzzy Hash: 63c0e1340470d6e830e5e5dfa2d3a24c46b16b7ff672019cdfcf892725e3aced
                                              • Instruction Fuzzy Hash: 29212834B00208CFDB59EB78C559A9D77F2FB89B14F100568E406EB365DB36AD01CB91
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3aa7002510890ef08d2dcf4ac0381a2dfab0022a49ce4b89d01e1f16f464e45d
                                              • Instruction ID: d511ad247947eb60804578301a4dea19f34c682aa851dfb67d7ce446d8a182f9
                                              • Opcode Fuzzy Hash: 3aa7002510890ef08d2dcf4ac0381a2dfab0022a49ce4b89d01e1f16f464e45d
                                              • Instruction Fuzzy Hash: 96213030B44209EFDB18EB78C5257AE7BF2AB59A44F20046CD506EB355EB35DD40CBA1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6c5e7e4a38d1dccbfe6f7fff565cf771b1627b27ed7841e75d6acb4fe7c9ab5f
                                              • Instruction ID: 5a63f287f00100a2c73741aae65aab2cbe8262e3b3284b2e8fe131197f2c2c5b
                                              • Opcode Fuzzy Hash: 6c5e7e4a38d1dccbfe6f7fff565cf771b1627b27ed7841e75d6acb4fe7c9ab5f
                                              • Instruction Fuzzy Hash: F8215331E0020D9BCB19CF68D45069EFBB2BF99710F50861AE916F7341EB70A845CB51
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 87e025fcd33506573c71a04adef107cf384e269dfde7eb60a78636c30b003d5f
                                              • Instruction ID: 6f9b50310ff1ada160a9f1a6faf30f352983ae7752a253334a446d8c938428f4
                                              • Opcode Fuzzy Hash: 87e025fcd33506573c71a04adef107cf384e269dfde7eb60a78636c30b003d5f
                                              • Instruction Fuzzy Hash: 792139386506009BDF26EB7CEE54B1937A9F749B08F504926D009C7A5BDB78DC418B91
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 36c2b680bd0ef925a5c29cf134812d63c5fd73fbc495475f5cb260e09460f6af
                                              • Instruction ID: dbbb17f18ec48dfd069a35d4652468ffa843f703db18e355a76a88a34cbf8aa9
                                              • Opcode Fuzzy Hash: 36c2b680bd0ef925a5c29cf134812d63c5fd73fbc495475f5cb260e09460f6af
                                              • Instruction Fuzzy Hash: 5E211934B00209CFDB58EB78C559AAE77F2FB89714F100568E406EB365DB369D00CB91
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 08923c0368c9abde0e16e72a4b68d845578cbaeabd1f7e32485f2ac4f41a32a9
                                              • Instruction ID: ed2127170a94c9e9d09d75d766c04146f4a6a1d6b3d21848ecb2d5ecd27d7250
                                              • Opcode Fuzzy Hash: 08923c0368c9abde0e16e72a4b68d845578cbaeabd1f7e32485f2ac4f41a32a9
                                              • Instruction Fuzzy Hash: FC118638F00308CBEF69967CC95476A3355FB5DA14F10C86DE006CB252DB25CC818BC1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9bf19dcd1a88a462d2f9df89c607200310f6f7fdeefc587e021e83e54c0a58d3
                                              • Instruction ID: 1c5a9665c1585acec2504acc3a91f04a6d153d5ef1809466ee84af9099422a62
                                              • Opcode Fuzzy Hash: 9bf19dcd1a88a462d2f9df89c607200310f6f7fdeefc587e021e83e54c0a58d3
                                              • Instruction Fuzzy Hash: F6119438E00304CBEF695668D94077B3354F7A9A14F10C92EF406CB252EB25CC818BC1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d13ed85dcd0677b8388ea962fa92e612be262343c038d4cdde6bece8097392a0
                                              • Instruction ID: 2455572007f2734ea3ac6fe0a12f72f4a5708df2e984214f6dc1bec90c2a7e25
                                              • Opcode Fuzzy Hash: d13ed85dcd0677b8388ea962fa92e612be262343c038d4cdde6bece8097392a0
                                              • Instruction Fuzzy Hash: AA11B235E00252EFDB1AAFB885901ADBBB1EF69614F1504AEE805E7342E775C841CB91
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4f28d081d887f6f60e579fd7f4f0d453918fb19b6ed5f0eac52b3a9b5f2c5f63
                                              • Instruction ID: 6c2091f5eb6d00b6379d6d5c05bf49213b994e5a76462c62e8ad941d93806502
                                              • Opcode Fuzzy Hash: 4f28d081d887f6f60e579fd7f4f0d453918fb19b6ed5f0eac52b3a9b5f2c5f63
                                              • Instruction Fuzzy Hash: 9111027AF00315AFCB18ABF8E90866E3FF5FB48A10F100829E905E3305EB34C9028790
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7d39fd7c1e134b63be9543c73e8c2f5541c5f3961f0a90e30e6575e1775abbfb
                                              • Instruction ID: 79505a612667eff632a9527281fb1e6fcb86463bd2a6237d3f09ea873750cb82
                                              • Opcode Fuzzy Hash: 7d39fd7c1e134b63be9543c73e8c2f5541c5f3961f0a90e30e6575e1775abbfb
                                              • Instruction Fuzzy Hash: 13014035A00216EBCB29EFB884641AEBBF5EB69A14F25047DD805E7302E735C881CBD5
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e1fa0660e6a9b02ec15127c869cd306096a110f7ae61934ea7a0edcdb467ca18
                                              • Instruction ID: 0997184d2df77792836e7b70e8f95b0a4c509d96e9e00e81ed21545f38cb6d75
                                              • Opcode Fuzzy Hash: e1fa0660e6a9b02ec15127c869cd306096a110f7ae61934ea7a0edcdb467ca18
                                              • Instruction Fuzzy Hash: AA01D2317142049FC719ABBCD81179E7BA2EFCA700F1448AED146DB390DB359841D796
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 800b146baf7d5d77d099227de3fbe30dfdf72d0c4164c4d8e4fb9eff7e5b21ce
                                              • Instruction ID: 1b18022acf4813f119a8e64a6753da87f0e92055b74911e9d9899866c0ce49d5
                                              • Opcode Fuzzy Hash: 800b146baf7d5d77d099227de3fbe30dfdf72d0c4164c4d8e4fb9eff7e5b21ce
                                              • Instruction Fuzzy Hash: D301B531A002048FDB18DF98D984B8ABBB5FFD4310F54C668C84C5F295E774E905CBA1
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ef5ffbdeb6ec8b0f3b70bfe0eab1c231c966833ba2f7f60043106ec15bc4406d
                                              • Instruction ID: 1b91be8b1925f2c9f7f022ea246ad90b5d608c362d83591eacb7198b8c7bf3c2
                                              • Opcode Fuzzy Hash: ef5ffbdeb6ec8b0f3b70bfe0eab1c231c966833ba2f7f60043106ec15bc4406d
                                              • Instruction Fuzzy Hash: F8110930E08249DEDF2CDA9CD9A87ECBB71AFB4B19F14152ED051A2990DB3069C5CB15
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d9f11d49dfbe0849209cfd6c48fd270bb7a37c9c105565d04164c865b35cfddf
                                              • Instruction ID: e628c0ea13fc289d06c3c3546c912d0e0d4d3d58c870e8e792231705b1b95c7a
                                              • Opcode Fuzzy Hash: d9f11d49dfbe0849209cfd6c48fd270bb7a37c9c105565d04164c865b35cfddf
                                              • Instruction Fuzzy Hash: 4A018F30D00208AFDF55EFA8EE90A8D7BB5FF84304F504A69C4089B209DB345E049B51
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8fb06209e67cc7c3bc8a6ca534aa5ae745d9754c0783d92d7643cc1e97826116
                                              • Instruction ID: d9de86e0b0759e01bf6242aff754d90cdf6dae07a5c629bb22b79bf6b4443a67
                                              • Opcode Fuzzy Hash: 8fb06209e67cc7c3bc8a6ca534aa5ae745d9754c0783d92d7643cc1e97826116
                                              • Instruction Fuzzy Hash: BAF05077A44110EFD72A8BE894501ACBFB0FE7991171D00DFD846DB202D335D442C752
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 221fa0544349ca7234771a9511cfc25bb45c2a29217a1aab5335a3b908ef45a7
                                              • Instruction ID: b4ba0b73d753b4057d46ec6ba82472b141b4e2c69df0d13461b6072470fae8f2
                                              • Opcode Fuzzy Hash: 221fa0544349ca7234771a9511cfc25bb45c2a29217a1aab5335a3b908ef45a7
                                              • Instruction Fuzzy Hash: 45F0E739B00518CFD714EB78E698B6D77B2EF89B15F1144A8E5069B3A4DB31AD02CF50
                                              Memory Dump Source
                                              • Source File: 0000000A.00000002.2688827368.00000000011C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 011C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_10_2_11c0000_Telco 32pcs New Purchase Order.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0be7cd0e4fa96c14f595831e5758e2da00bc71d8ed0c76e6d72e393c1bd8b0ee
                                              • Instruction ID: 0bc0eb565a9af4b5f6761a23228b8f9e84f80a497b0479fcf67beadf6b8a9556
                                              • Opcode Fuzzy Hash: 0be7cd0e4fa96c14f595831e5758e2da00bc71d8ed0c76e6d72e393c1bd8b0ee
                                              • Instruction Fuzzy Hash: EDF0813490020CAFCB05FFA8FE60A8D7BB5FF84704F405A69C4089B244DF346E049B91

                                              Execution Graph

                                              Execution Coverage:11.8%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:226
                                              Total number of Limit Nodes:18
                                              execution_graph 35926 1484668 35927 148467a 35926->35927 35928 1484686 35927->35928 35932 1484778 35927->35932 35937 1484218 35928->35937 35930 14846a5 35933 148479d 35932->35933 35941 148487b 35933->35941 35945 1484888 35933->35945 35934 14847a7 35934->35928 35938 1484223 35937->35938 35953 1485c6c 35938->35953 35940 1487048 35940->35930 35942 14848af 35941->35942 35943 148498c 35942->35943 35949 14844e0 35942->35949 35943->35934 35947 14848af 35945->35947 35946 148498c 35946->35934 35947->35946 35948 14844e0 CreateActCtxA 35947->35948 35948->35946 35950 1485918 CreateActCtxA 35949->35950 35952 14859db 35950->35952 35954 1485c77 35953->35954 35957 1485c8c 35954->35957 35956 14870ed 35956->35940 35958 1485c97 35957->35958 35961 1485cbc 35958->35961 35960 14871c2 35960->35956 35962 1485cc7 35961->35962 35965 1485cec 35962->35965 35964 14872c5 35964->35960 35966 1485cf7 35965->35966 35968 14885cb 35966->35968 35971 148ac78 35966->35971 35967 1488609 35967->35964 35968->35967 35975 148cd60 35968->35975 35980 148aca0 35971->35980 35984 148acb0 35971->35984 35972 148ac8e 35972->35968 35977 148cd91 35975->35977 35976 148cdb5 35976->35967 35977->35976 35992 148cf10 35977->35992 35996 148cf20 35977->35996 35981 148acb0 35980->35981 35987 148ada8 35981->35987 35982 148acbf 35982->35972 35986 148ada8 GetModuleHandleW 35984->35986 35985 148acbf 35985->35972 35986->35985 35988 148addc 35987->35988 35989 148adb9 35987->35989 35988->35982 35989->35988 35990 148afe0 GetModuleHandleW 35989->35990 35991 148b00d 35990->35991 35991->35982 35993 148cf20 35992->35993 35994 148cf67 35993->35994 36000 148b780 35993->36000 35994->35976 35997 148cf2d 35996->35997 35998 148cf67 35997->35998 35999 148b780 GetModuleHandleW 35997->35999 35998->35976 35999->35998 36001 148b78b 36000->36001 36003 148dc78 36001->36003 36004 148d084 36001->36004 36003->36003 36005 148d08f 36004->36005 36006 1485cec GetModuleHandleW 36005->36006 36007 148dce7 36006->36007 36007->36003 36198 148d438 36199 148d47e GetCurrentProcess 36198->36199 36201 148d4c9 36199->36201 36202 148d4d0 GetCurrentThread 36199->36202 36201->36202 36203 148d50d GetCurrentProcess 36202->36203 36204 148d506 36202->36204 36205 148d543 36203->36205 36204->36203 36206 148d56b GetCurrentThreadId 36205->36206 36207 148d59c 36206->36207 35917 73ec7f8 35918 73ec983 35917->35918 35920 73ec81e 35917->35920 35920->35918 35921 73eacac 35920->35921 35922 73eca78 PostMessageW 35921->35922 35923 73ecae4 35922->35923 35923->35920 36008 73e9e19 36009 73ea027 36008->36009 36010 73e9e23 36008->36010 36015 73eb618 36010->36015 36034 73eb676 36010->36034 36054 73eb608 36010->36054 36011 73ea126 36016 73eb632 36015->36016 36073 73ec022 36016->36073 36078 73ec285 36016->36078 36082 73ec444 36016->36082 36087 73ebfe9 36016->36087 36091 73ebb09 36016->36091 36097 73ec22a 36016->36097 36102 73ebb6d 36016->36102 36107 73ebc91 36016->36107 36111 73ebeb0 36016->36111 36116 73ec473 36016->36116 36121 73ec2d3 36016->36121 36125 73ec159 36016->36125 36130 73ec39b 36016->36130 36135 73ebefa 36016->36135 36140 73ebc3d 36016->36140 36144 73eb940 36016->36144 36017 73eb656 36017->36011 36035 73eb604 36034->36035 36037 73eb679 36034->36037 36038 73ebc3d 2 API calls 36035->36038 36039 73ebefa 2 API calls 36035->36039 36040 73ec39b 2 API calls 36035->36040 36041 73ec159 2 API calls 36035->36041 36042 73ec2d3 2 API calls 36035->36042 36043 73ec473 2 API calls 36035->36043 36044 73ebeb0 2 API calls 36035->36044 36045 73ebc91 2 API calls 36035->36045 36046 73ebb6d 2 API calls 36035->36046 36047 73ec22a 2 API calls 36035->36047 36048 73ebb09 2 API calls 36035->36048 36049 73ebfe9 2 API calls 36035->36049 36050 73ec444 2 API calls 36035->36050 36051 73ec285 2 API calls 36035->36051 36052 73ec022 2 API calls 36035->36052 36053 73eb940 2 API calls 36035->36053 36036 73eb656 36036->36011 36037->36011 36038->36036 36039->36036 36040->36036 36041->36036 36042->36036 36043->36036 36044->36036 36045->36036 36046->36036 36047->36036 36048->36036 36049->36036 36050->36036 36051->36036 36052->36036 36053->36036 36055 73eb632 36054->36055 36057 73ebc3d 2 API calls 36055->36057 36058 73ebefa 2 API calls 36055->36058 36059 73ec39b 2 API calls 36055->36059 36060 73ec159 2 API calls 36055->36060 36061 73ec2d3 2 API calls 36055->36061 36062 73ec473 2 API calls 36055->36062 36063 73ebeb0 2 API calls 36055->36063 36064 73ebc91 2 API calls 36055->36064 36065 73ebb6d 2 API calls 36055->36065 36066 73ec22a 2 API calls 36055->36066 36067 73ebb09 2 API calls 36055->36067 36068 73ebfe9 2 API calls 36055->36068 36069 73ec444 2 API calls 36055->36069 36070 73ec285 2 API calls 36055->36070 36071 73ec022 2 API calls 36055->36071 36072 73eb940 2 API calls 36055->36072 36056 73eb656 36056->36011 36057->36056 36058->36056 36059->36056 36060->36056 36061->36056 36062->36056 36063->36056 36064->36056 36065->36056 36066->36056 36067->36056 36068->36056 36069->36056 36070->36056 36071->36056 36072->36056 36074 73ebb63 36073->36074 36075 73ebb75 36074->36075 36150 73e8bd8 36074->36150 36154 73e8be0 36074->36154 36075->36017 36158 73e9788 36078->36158 36162 73e9781 36078->36162 36079 73ec2b3 36083 73ebb63 36082->36083 36083->36082 36084 73ebb75 36083->36084 36085 73e8bd8 ResumeThread 36083->36085 36086 73e8be0 ResumeThread 36083->36086 36084->36017 36085->36083 36086->36083 36166 73e90c8 36087->36166 36170 73e90c3 36087->36170 36088 73ec003 36093 73eba0a 36091->36093 36092 73ec597 36092->36017 36093->36092 36174 73e9920 36093->36174 36178 73e9915 36093->36178 36099 73ebb63 36097->36099 36098 73ebb75 36098->36017 36099->36098 36100 73e8bd8 ResumeThread 36099->36100 36101 73e8be0 ResumeThread 36099->36101 36100->36099 36101->36099 36104 73ebb63 36102->36104 36103 73ebb75 36103->36017 36104->36103 36105 73e8bd8 ResumeThread 36104->36105 36106 73e8be0 ResumeThread 36104->36106 36105->36104 36106->36104 36182 73e95d8 36107->36182 36186 73e95d0 36107->36186 36108 73ebcaf 36112 73ec39c 36111->36112 36190 73e9698 36112->36190 36194 73e9691 36112->36194 36113 73ec3c3 36118 73ec484 36116->36118 36117 73ec4c9 36119 73e9698 WriteProcessMemory 36118->36119 36120 73e9691 WriteProcessMemory 36118->36120 36119->36117 36120->36117 36123 73e90c8 Wow64SetThreadContext 36121->36123 36124 73e90c3 Wow64SetThreadContext 36121->36124 36122 73ec2ed 36123->36122 36124->36122 36126 73ebb63 36125->36126 36127 73ebb75 36126->36127 36128 73e8bd8 ResumeThread 36126->36128 36129 73e8be0 ResumeThread 36126->36129 36127->36017 36128->36126 36129->36126 36131 73ec39c 36130->36131 36133 73e9698 WriteProcessMemory 36131->36133 36134 73e9691 WriteProcessMemory 36131->36134 36132 73ec3c3 36133->36132 36134->36132 36137 73ebb63 36135->36137 36136 73ebb75 36136->36017 36137->36136 36138 73e8bd8 ResumeThread 36137->36138 36139 73e8be0 ResumeThread 36137->36139 36138->36137 36139->36137 36141 73ebc52 36140->36141 36142 73e9698 WriteProcessMemory 36141->36142 36143 73e9691 WriteProcessMemory 36141->36143 36142->36141 36143->36141 36146 73eb973 36144->36146 36145 73ec597 36145->36017 36146->36145 36148 73e9915 CreateProcessA 36146->36148 36149 73e9920 CreateProcessA 36146->36149 36147 73ebb44 36147->36017 36148->36147 36149->36147 36151 73e8c20 ResumeThread 36150->36151 36153 73e8c51 36151->36153 36153->36074 36155 73e8c20 ResumeThread 36154->36155 36157 73e8c51 36155->36157 36157->36074 36159 73e97d3 ReadProcessMemory 36158->36159 36161 73e9817 36159->36161 36161->36079 36163 73e9788 ReadProcessMemory 36162->36163 36165 73e9817 36163->36165 36165->36079 36167 73e910d Wow64SetThreadContext 36166->36167 36169 73e9155 36167->36169 36169->36088 36171 73e910d Wow64SetThreadContext 36170->36171 36173 73e9155 36171->36173 36173->36088 36175 73e99a9 CreateProcessA 36174->36175 36177 73e9b6b 36175->36177 36177->36177 36179 73e99a9 CreateProcessA 36178->36179 36181 73e9b6b 36179->36181 36181->36181 36183 73e9618 VirtualAllocEx 36182->36183 36185 73e9655 36183->36185 36185->36108 36187 73e95d8 VirtualAllocEx 36186->36187 36189 73e9655 36187->36189 36189->36108 36191 73e96e0 WriteProcessMemory 36190->36191 36193 73e9737 36191->36193 36193->36113 36195 73e9698 WriteProcessMemory 36194->36195 36197 73e9737 36195->36197 36197->36113 35924 148d680 DuplicateHandle 35925 148d716 35924->35925

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 0148D4B6
                                              • GetCurrentThread.KERNEL32 ref: 0148D4F3
                                              • GetCurrentProcess.KERNEL32 ref: 0148D530
                                              • GetCurrentThreadId.KERNEL32 ref: 0148D589
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1509703303.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_1480000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 0376f0bbbe5dc89d5a681d43ce99703737066577cfa66dd3e39f3bca5bd06215
                                              • Instruction ID: 682612733d163ba38c655f9bff25f81c2f999178a8448cfdfad7d0b674ef74d5
                                              • Opcode Fuzzy Hash: 0376f0bbbe5dc89d5a681d43ce99703737066577cfa66dd3e39f3bca5bd06215
                                              • Instruction Fuzzy Hash: B35146B0D013098FEB14DFA9D548BDEBBF1AF88314F20845AE419A73A0D7746944CB65

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 0148D4B6
                                              • GetCurrentThread.KERNEL32 ref: 0148D4F3
                                              • GetCurrentProcess.KERNEL32 ref: 0148D530
                                              • GetCurrentThreadId.KERNEL32 ref: 0148D589
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1509703303.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_1480000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 1e00f49ae6cf38cd4229a3397b38bae532f9c0cee62ade384b4d58b19b4000c1
                                              • Instruction ID: bb042a982e333c3eb55da5f0e5ff9f307bfbaa8b87a04fd2bcf972d232c65342
                                              • Opcode Fuzzy Hash: 1e00f49ae6cf38cd4229a3397b38bae532f9c0cee62ade384b4d58b19b4000c1
                                              • Instruction Fuzzy Hash: AE5115B0D017098FEB14DFAAD548BDEBBF1AB88314F20845AE419A73A0D7746944CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 44 73e9915-73e99b5 46 73e99ee-73e9a0e 44->46 47 73e99b7-73e99c1 44->47 54 73e9a47-73e9a76 46->54 55 73e9a10-73e9a1a 46->55 47->46 48 73e99c3-73e99c5 47->48 49 73e99e8-73e99eb 48->49 50 73e99c7-73e99d1 48->50 49->46 52 73e99d5-73e99e4 50->52 53 73e99d3 50->53 52->52 56 73e99e6 52->56 53->52 61 73e9aaf-73e9b69 CreateProcessA 54->61 62 73e9a78-73e9a82 54->62 55->54 57 73e9a1c-73e9a1e 55->57 56->49 59 73e9a20-73e9a2a 57->59 60 73e9a41-73e9a44 57->60 63 73e9a2e-73e9a3d 59->63 64 73e9a2c 59->64 60->54 75 73e9b6b-73e9b71 61->75 76 73e9b72-73e9bf8 61->76 62->61 66 73e9a84-73e9a86 62->66 63->63 65 73e9a3f 63->65 64->63 65->60 67 73e9a88-73e9a92 66->67 68 73e9aa9-73e9aac 66->68 70 73e9a96-73e9aa5 67->70 71 73e9a94 67->71 68->61 70->70 73 73e9aa7 70->73 71->70 73->68 75->76 86 73e9bfa-73e9bfe 76->86 87 73e9c08-73e9c0c 76->87 86->87 88 73e9c00 86->88 89 73e9c0e-73e9c12 87->89 90 73e9c1c-73e9c20 87->90 88->87 89->90 91 73e9c14 89->91 92 73e9c22-73e9c26 90->92 93 73e9c30-73e9c34 90->93 91->90 92->93 94 73e9c28 92->94 95 73e9c46-73e9c4d 93->95 96 73e9c36-73e9c3c 93->96 94->93 97 73e9c4f-73e9c5e 95->97 98 73e9c64 95->98 96->95 97->98 100 73e9c65 98->100 100->100
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073E9B56
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1515134801.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_73e0000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: 025f8ad8ed8e55acf9458d1a7bcf591ebc5b880f1d1031323bc95591a2414afb
                                              • Instruction ID: b3383168a3ee2dd84733fc9216bdd49b87903ce7298a212934777883fb7da9f5
                                              • Opcode Fuzzy Hash: 025f8ad8ed8e55acf9458d1a7bcf591ebc5b880f1d1031323bc95591a2414afb
                                              • Instruction Fuzzy Hash: D8A150B1D0062ACFEB14DF69C841BDEBBF6BF44310F148169D849A7290DB749985CF92

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 101 73e9920-73e99b5 103 73e99ee-73e9a0e 101->103 104 73e99b7-73e99c1 101->104 111 73e9a47-73e9a76 103->111 112 73e9a10-73e9a1a 103->112 104->103 105 73e99c3-73e99c5 104->105 106 73e99e8-73e99eb 105->106 107 73e99c7-73e99d1 105->107 106->103 109 73e99d5-73e99e4 107->109 110 73e99d3 107->110 109->109 113 73e99e6 109->113 110->109 118 73e9aaf-73e9b69 CreateProcessA 111->118 119 73e9a78-73e9a82 111->119 112->111 114 73e9a1c-73e9a1e 112->114 113->106 116 73e9a20-73e9a2a 114->116 117 73e9a41-73e9a44 114->117 120 73e9a2e-73e9a3d 116->120 121 73e9a2c 116->121 117->111 132 73e9b6b-73e9b71 118->132 133 73e9b72-73e9bf8 118->133 119->118 123 73e9a84-73e9a86 119->123 120->120 122 73e9a3f 120->122 121->120 122->117 124 73e9a88-73e9a92 123->124 125 73e9aa9-73e9aac 123->125 127 73e9a96-73e9aa5 124->127 128 73e9a94 124->128 125->118 127->127 130 73e9aa7 127->130 128->127 130->125 132->133 143 73e9bfa-73e9bfe 133->143 144 73e9c08-73e9c0c 133->144 143->144 145 73e9c00 143->145 146 73e9c0e-73e9c12 144->146 147 73e9c1c-73e9c20 144->147 145->144 146->147 148 73e9c14 146->148 149 73e9c22-73e9c26 147->149 150 73e9c30-73e9c34 147->150 148->147 149->150 151 73e9c28 149->151 152 73e9c46-73e9c4d 150->152 153 73e9c36-73e9c3c 150->153 151->150 154 73e9c4f-73e9c5e 152->154 155 73e9c64 152->155 153->152 154->155 157 73e9c65 155->157 157->157
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 073E9B56
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1515134801.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_73e0000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: b446e38ebc458d184398d6b5e9f7e800cfed4bc59f56eba4f24c79978c4de51d
                                              • Instruction ID: 2a7558c84be5b4d31953327ef1a802aad949c87cd26803cee006e35aefbae0db
                                              • Opcode Fuzzy Hash: b446e38ebc458d184398d6b5e9f7e800cfed4bc59f56eba4f24c79978c4de51d
                                              • Instruction Fuzzy Hash: D7914FB1D0022ACFEB14DFA9C841BDEBBB6BF44310F148169D849A7290DB759985CF92

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 158 148ada8-148adb7 159 148adb9-148adc6 call 148a100 158->159 160 148ade3-148ade7 158->160 167 148adc8 159->167 168 148addc 159->168 161 148ade9-148adf3 160->161 162 148adfb-148ae3c 160->162 161->162 169 148ae49-148ae57 162->169 170 148ae3e-148ae46 162->170 217 148adce call 148b040 167->217 218 148adce call 148b030 167->218 168->160 172 148ae59-148ae5e 169->172 173 148ae7b-148ae7d 169->173 170->169 171 148add4-148add6 171->168 174 148af18-148af2f 171->174 176 148ae69 172->176 177 148ae60-148ae67 call 148a10c 172->177 175 148ae80-148ae87 173->175 191 148af31-148af90 174->191 179 148ae89-148ae91 175->179 180 148ae94-148ae9b 175->180 178 148ae6b-148ae79 176->178 177->178 178->175 179->180 183 148aea8-148aeb1 call 148a11c 180->183 184 148ae9d-148aea5 180->184 189 148aebe-148aec3 183->189 190 148aeb3-148aebb 183->190 184->183 192 148aee1-148aeee 189->192 193 148aec5-148aecc 189->193 190->189 209 148af92-148af94 191->209 200 148aef0-148af0e 192->200 201 148af11-148af17 192->201 193->192 194 148aece-148aede call 148a12c call 148a13c 193->194 194->192 200->201 210 148afc0-148afd8 209->210 211 148af96-148afbe 209->211 212 148afda-148afdd 210->212 213 148afe0-148b00b GetModuleHandleW 210->213 211->210 212->213 214 148b00d-148b013 213->214 215 148b014-148b028 213->215 214->215 217->171 218->171
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0148AFFE
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1509703303.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_1480000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 219222547ccf39e495ccc87a779fabfa117aebbe925e07cb5c51070815841d62
                                              • Instruction ID: 870a01d6c202c374aa74af67c1ea19cf73b8e5d672b6f948de2f22e817ef2a5e
                                              • Opcode Fuzzy Hash: 219222547ccf39e495ccc87a779fabfa117aebbe925e07cb5c51070815841d62
                                              • Instruction Fuzzy Hash: 49814870A00B058FD724EF2AD45576ABBF1FF88214F10892ED586D7B60D7B5E846CB90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 219 148590d-1485916 220 1485918-14859d9 CreateActCtxA 219->220 222 14859db-14859e1 220->222 223 14859e2-1485a3c 220->223 222->223 230 1485a4b-1485a4f 223->230 231 1485a3e-1485a41 223->231 232 1485a60 230->232 233 1485a51-1485a5d 230->233 231->230 235 1485a61 232->235 233->232 235->235
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 014859C9
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1509703303.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_1480000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 4840e78a807b0fd1134878fa7c150515f3ade77592718ab4d58437e44b395216
                                              • Instruction ID: 2519d4a31426a97f95b52214c6b32d4a59611ea064218ba27cfc1602219b6dfb
                                              • Opcode Fuzzy Hash: 4840e78a807b0fd1134878fa7c150515f3ade77592718ab4d58437e44b395216
                                              • Instruction Fuzzy Hash: 1841C1B0C00719CBEB24DFA9D884BCEBBB5BF49704F20846AD409AB251DB75594ACF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 236 14844e0-14859d9 CreateActCtxA 239 14859db-14859e1 236->239 240 14859e2-1485a3c 236->240 239->240 247 1485a4b-1485a4f 240->247 248 1485a3e-1485a41 240->248 249 1485a60 247->249 250 1485a51-1485a5d 247->250 248->247 252 1485a61 249->252 250->249 252->252
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 014859C9
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1509703303.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_1480000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 62b27edb849291e9adee71da1302014047889b8d86618032fe352b7015491cbe
                                              • Instruction ID: 46191fa677b83e63ec43e2531c71265a072c1db8b308c1b7ae7dbf41bb56d7f8
                                              • Opcode Fuzzy Hash: 62b27edb849291e9adee71da1302014047889b8d86618032fe352b7015491cbe
                                              • Instruction Fuzzy Hash: 9341B270C00719CBEB24DFA9D884BDEBBB5BF49704F24806AD409AB251DB75594ACF90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 253 73e9691-73e96e6 256 73e96e8-73e96f4 253->256 257 73e96f6-73e9735 WriteProcessMemory 253->257 256->257 259 73e973e-73e976e 257->259 260 73e9737-73e973d 257->260 260->259
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073E9728
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1515134801.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_73e0000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: cc6270b87efdf780fa4b9f1d79735e80a3224297025c8619700b9da75c2d6e10
                                              • Instruction ID: 451f4f9e7ebc7313a80f0024b4d5785c2587f94823bd784cacfe33947497bc44
                                              • Opcode Fuzzy Hash: cc6270b87efdf780fa4b9f1d79735e80a3224297025c8619700b9da75c2d6e10
                                              • Instruction Fuzzy Hash: CE215AB59003599FDB10CFAAC885BDEBBF5FF48310F14842AE918A7240C778A944CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 264 73e9698-73e96e6 266 73e96e8-73e96f4 264->266 267 73e96f6-73e9735 WriteProcessMemory 264->267 266->267 269 73e973e-73e976e 267->269 270 73e9737-73e973d 267->270 270->269
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 073E9728
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1515134801.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_73e0000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: 143f1731b432acc93dac68074c6d84642b128ca11965f18b17a1cfc71228e057
                                              • Instruction ID: 35cbc966976150efc33e7934e652c15f755a847a9fa45a69232de6def267d8ef
                                              • Opcode Fuzzy Hash: 143f1731b432acc93dac68074c6d84642b128ca11965f18b17a1cfc71228e057
                                              • Instruction Fuzzy Hash: F32139B59003599FDB10CFAAC885BDEBBF5FF48310F10842AE918A7240D778A944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 274 73e9781-73e9815 ReadProcessMemory 278 73e981e-73e984e 274->278 279 73e9817-73e981d 274->279 279->278
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073E9808
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1515134801.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_73e0000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: 818044864544431f682c845ce96ecd3e49188c033d43eb9a2a917a3cf10c08a2
                                              • Instruction ID: 37d371f905b7cfd6b5a8295da98eef75a04bfa552c7542fa325315a9a620e861
                                              • Opcode Fuzzy Hash: 818044864544431f682c845ce96ecd3e49188c033d43eb9a2a917a3cf10c08a2
                                              • Instruction Fuzzy Hash: BE2139B1C003599FDB10CFAAC845BDEBBF5FF48310F10842AE918A3250C738A540CBA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 283 73e90c3-73e9113 285 73e9115-73e9121 283->285 286 73e9123-73e9153 Wow64SetThreadContext 283->286 285->286 288 73e915c-73e918c 286->288 289 73e9155-73e915b 286->289 289->288
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 073E9146
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1515134801.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_73e0000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: d4990d3ffb71e62504f49fa85bc3284a73482375fc16106dff21b05f9d96f9da
                                              • Instruction ID: 065cb94e9e6cc1d037f6b4ad351afbb5c9869d8e8dda6f722cab3e645227b08c
                                              • Opcode Fuzzy Hash: d4990d3ffb71e62504f49fa85bc3284a73482375fc16106dff21b05f9d96f9da
                                              • Instruction Fuzzy Hash: EA213AB1D003198FDB10DFAAC4847EEBBF5EF48310F14842AD859A7240C7789945CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 303 73e9788-73e9815 ReadProcessMemory 306 73e981e-73e984e 303->306 307 73e9817-73e981d 303->307 307->306
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073E9808
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1515134801.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_73e0000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: 6da38d3ffcaf0c250dada757bba25a4c57423431e3006d9d38d3c4a3f66be20e
                                              • Instruction ID: 36a022803fab10ddcf34a55bc40c8f5e513ca4e59af019d1c9a8bd97a8fe11ea
                                              • Opcode Fuzzy Hash: 6da38d3ffcaf0c250dada757bba25a4c57423431e3006d9d38d3c4a3f66be20e
                                              • Instruction Fuzzy Hash: 452128B1C003599FDB10DFAAC844BDEBBF5FF48310F108429E918A7250C7799544CBA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 293 73e90c8-73e9113 295 73e9115-73e9121 293->295 296 73e9123-73e9153 Wow64SetThreadContext 293->296 295->296 298 73e915c-73e918c 296->298 299 73e9155-73e915b 296->299 299->298
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 073E9146
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1515134801.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_73e0000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: c71831f9a3871911bcf1abe0842f6929adba0f8dedba17cbe68537cf18ef4934
                                              • Instruction ID: 75ab9d800ab23047ceb3c1bdcbaccdd6f0c278daffd6be4fcc860e6a05da8d5e
                                              • Opcode Fuzzy Hash: c71831f9a3871911bcf1abe0842f6929adba0f8dedba17cbe68537cf18ef4934
                                              • Instruction Fuzzy Hash: 192129B1D003198FDB10DFAAC8857EEBBF5EF48720F148429D919A7240CB78A945CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 311 148d680-148d714 DuplicateHandle 312 148d71d-148d73a 311->312 313 148d716-148d71c 311->313 313->312
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0148D707
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1509703303.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_1480000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: a2a9a141e5b0fd697e4a1499e56135df2da1c6989ca671c8e94db7125324d230
                                              • Instruction ID: f3982952ea8e7b937c99fd2cb06d55f4e2ba04be1a65cb6ad64c3c826f60ce08
                                              • Opcode Fuzzy Hash: a2a9a141e5b0fd697e4a1499e56135df2da1c6989ca671c8e94db7125324d230
                                              • Instruction Fuzzy Hash: A121C4B5D012489FDB10DFAAD984ADEBBF9FB48310F14841AE914A3350D378A944CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 316 148d679-148d714 DuplicateHandle 317 148d71d-148d73a 316->317 318 148d716-148d71c 316->318 318->317
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0148D707
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1509703303.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_1480000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 9b77b826bda5d584c51d34f21401a2f80053965225a3e421f6917db0761cc06c
                                              • Instruction ID: ac991618036e6de25cf92d2ca84a85395e99e161a4424f6d19ad6ce5e9691cd4
                                              • Opcode Fuzzy Hash: 9b77b826bda5d584c51d34f21401a2f80053965225a3e421f6917db0761cc06c
                                              • Instruction Fuzzy Hash: 0E21E2B5D002489FDB10DFAAD984ADEBBF5FB48320F14841AE918B3350D378A944CF60
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073E9646
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1515134801.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_73e0000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 32617e9569139f2ebf224ac19fcc32f9e0f0d04a43b6bdac31bbf75f5b06e6e7
                                              • Instruction ID: 8999189e830676bc18f9c8b7f3014d145e3e4c07cefdfeaa704ec85210974ac0
                                              • Opcode Fuzzy Hash: 32617e9569139f2ebf224ac19fcc32f9e0f0d04a43b6bdac31bbf75f5b06e6e7
                                              • Instruction Fuzzy Hash: 831147768002499FDB10DFAAD845BDEBBF5FF48720F14881AE519A7250CB79A540CFA1
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 073E9646
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1515134801.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_73e0000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 38fe3c04f138ce3a6f8a25cde996fc387622bbd3c2739cd7423bb785e96eaf1d
                                              • Instruction ID: a772a4253fd2c5a27bdcedabc42141eed05ef1404f36a5114950c5d9211dae40
                                              • Opcode Fuzzy Hash: 38fe3c04f138ce3a6f8a25cde996fc387622bbd3c2739cd7423bb785e96eaf1d
                                              • Instruction Fuzzy Hash: 6C1126718003499FDB10DFAAC844BDEBBF5EF88720F14881AE919A7250CB79A544CFA5
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1515134801.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_73e0000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: 1a62f3dc4bcc6f8200a00565eedf9ab042e85f4c6e837462b5f1dd798712d76e
                                              • Instruction ID: 6ec279467b8a184184d1e557cac3276fd3c84d6df58d01538f99ca9bc553dd0e
                                              • Opcode Fuzzy Hash: 1a62f3dc4bcc6f8200a00565eedf9ab042e85f4c6e837462b5f1dd798712d76e
                                              • Instruction Fuzzy Hash: EE1128B1D003588BDB14DFAAD4457DEFBF9EF88720F248819D519A7240CB79A544CFA4
                                              APIs
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1515134801.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_73e0000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: 73a8a380e197660c44d26d726d7aa588e464d6bcb653c4db6a49367a5974cb56
                                              • Instruction ID: 376ce437f1116f66ad5bc6c7a5fb7e13f7070bef596d42f492b0f50b8b7a0ac0
                                              • Opcode Fuzzy Hash: 73a8a380e197660c44d26d726d7aa588e464d6bcb653c4db6a49367a5974cb56
                                              • Instruction Fuzzy Hash: DD1134B1D003498BDB24DFAAC5487DEFBF5AF88220F24881AD519A7250CB799544CFA4
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 073ECAD5
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1515134801.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_73e0000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: 29d7c2178abd7c9eba169fe0aee027ef6cfda23f2ede36087b986ddd056b8319
                                              • Instruction ID: 1eddd64f57d6caacbc4bd717b961cd895c803b9ceca15cc2faca7efe2555b79e
                                              • Opcode Fuzzy Hash: 29d7c2178abd7c9eba169fe0aee027ef6cfda23f2ede36087b986ddd056b8319
                                              • Instruction Fuzzy Hash: E511F5B58003599FDB10CF9AD845BDEFFF8EB48320F20841AD558A7641C379A544CFA5
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0148AFFE
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1509703303.0000000001480000.00000040.00000800.00020000.00000000.sdmp, Offset: 01480000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_1480000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: bbee5fa389042f807ef065f084a1003e911634220b2e37fde588fd565e7e4d68
                                              • Instruction ID: 9c7dbc4a5ea7b6912cb90b659a52ce26cc5d2da90081198be180564a67ebbae1
                                              • Opcode Fuzzy Hash: bbee5fa389042f807ef065f084a1003e911634220b2e37fde588fd565e7e4d68
                                              • Instruction Fuzzy Hash: D5110FB5C006498FDB24DF9AC444BDEFBF5EB88224F10841AD928A7220C379A545CFA1
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 073ECAD5
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1515134801.00000000073E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 073E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_73e0000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: 99d8b8a512fe07c66587bcd9813ad2917f3e536af3edc83ff2eae12a8dee6b85
                                              • Instruction ID: a0ab87a7f7764ba02f537b8ffe3f905bf5d80ce038f2c902ab9c6fabe949e25c
                                              • Opcode Fuzzy Hash: 99d8b8a512fe07c66587bcd9813ad2917f3e536af3edc83ff2eae12a8dee6b85
                                              • Instruction Fuzzy Hash: 8D11F5B58003599FDB10DF9AD449BEEBBF8EB48310F108819E918A7340C379A944CFA5
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1508195502.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_10fd000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7927fb89333ff773b6803c55b9dd6d7adcea1f5150ab7cdcbb6109cc13dba8ad
                                              • Instruction ID: a562aabbbbe5bff1afe7871744dea8b8dd8ca3ac5e24d107f778ad86146dcdca
                                              • Opcode Fuzzy Hash: 7927fb89333ff773b6803c55b9dd6d7adcea1f5150ab7cdcbb6109cc13dba8ad
                                              • Instruction Fuzzy Hash: 1F210876504340DFDB45DF94D8C1B1ABBA5FB94324F20C5ADEA450B646C336D416CBA1
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1508195502.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_10fd000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dedaf83702c3f1907370bdaecfc826e47ff9e321ffbe84bcfa4bf7b8b8a49c58
                                              • Instruction ID: 0c4b65087711e8061cb3e4fccf42fb7bf34e9d15fb658e2ef3aad20a9a135f62
                                              • Opcode Fuzzy Hash: dedaf83702c3f1907370bdaecfc826e47ff9e321ffbe84bcfa4bf7b8b8a49c58
                                              • Instruction Fuzzy Hash: 2D2136B1500240DFDB05DF94D8C5F2ABFA1FB84718F20C1ADDA890B656C336D446CBA2
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1508276352.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_111d000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7ae22616d93b3fb5d9aada4b6d6231c553534fd36e871d61418830db5c59273e
                                              • Instruction ID: 2b673a65f155e652489b4e5156e0a5bc95db07a0914c6bc3701df00d24ff9d81
                                              • Opcode Fuzzy Hash: 7ae22616d93b3fb5d9aada4b6d6231c553534fd36e871d61418830db5c59273e
                                              • Instruction Fuzzy Hash: 4E210371504300AFDF09DF94E9C8B55FBA1FB84224F20C67DE8094B25AC33AD406CA62
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1508276352.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_111d000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b05825b4a316eea62947c2cc5ec4e2be6080bb06eec133ccdb61f93e43692f83
                                              • Instruction ID: 3046f6cccad99aad5267e287fa0be04b43bb462bb0d431beba4d3a5a79f18e58
                                              • Opcode Fuzzy Hash: b05825b4a316eea62947c2cc5ec4e2be6080bb06eec133ccdb61f93e43692f83
                                              • Instruction Fuzzy Hash: 5C210075604300EFDF19DF94E888B16FB61FB84214F20C5BDD80A0B24AC33AD447CA62
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1508195502.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_10fd000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 788e04879303f038a4119c50adcc9150c8354023de2962495192c323b19cba65
                                              • Instruction ID: bb3f40cc26d10f773291c6199331a259b5ccf117751594e0abd398f5b6f4df28
                                              • Opcode Fuzzy Hash: 788e04879303f038a4119c50adcc9150c8354023de2962495192c323b19cba65
                                              • Instruction Fuzzy Hash: AD21DF76404240CFCB46CF44D9C4B16BFB2FB84324F24C1AADD480B656C33AD426CBA1
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1508195502.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_10fd000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d9902afee9e3b44ff2e822c933ca4f9850614e81a5517644e66c67081f9efd2f
                                              • Instruction ID: e328ff5dc70efc49b29dba94ff81322e7999a0bd6e1b0c3d55eb89669142a906
                                              • Opcode Fuzzy Hash: d9902afee9e3b44ff2e822c933ca4f9850614e81a5517644e66c67081f9efd2f
                                              • Instruction Fuzzy Hash: 3511DF72404280CFCB02CF54D5C4B16BFB2FB84718F24C6ADD9490B656C33AD45ADBA2
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1508276352.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_111d000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dd2c54e641c636489e18f71c5e932094e1140b5f592d34fffac0146327057262
                                              • Instruction ID: 143c19cb619fd346b515ff4af60bd2d699bef26c9cd20adce205cbb980245b4e
                                              • Opcode Fuzzy Hash: dd2c54e641c636489e18f71c5e932094e1140b5f592d34fffac0146327057262
                                              • Instruction Fuzzy Hash: B7119075504280DFDB16CF54E5C8B15FF62FB44314F24C6A9D8494B65AC33BD44ACB62
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1508276352.000000000111D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0111D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_111d000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dd2c54e641c636489e18f71c5e932094e1140b5f592d34fffac0146327057262
                                              • Instruction ID: c4ded9f54b11794d42865d527bbd07d03c8c46b3e6b4311edeb7199ac2c012c0
                                              • Opcode Fuzzy Hash: dd2c54e641c636489e18f71c5e932094e1140b5f592d34fffac0146327057262
                                              • Instruction Fuzzy Hash: 3C11BB75504280DFCB06CF54D5C8B15FFA2FB84224F24C6A9D8494B69AC33AD44ACB62
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1508195502.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_10fd000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 492e74d72050b17ec4c4b859559409aa95653f386198abd638f7c277b6e6b21f
                                              • Instruction ID: 6c78260375ee63ed54de20585abfb6f7258bd7c3307e2fed665bfcdec53f9b2e
                                              • Opcode Fuzzy Hash: 492e74d72050b17ec4c4b859559409aa95653f386198abd638f7c277b6e6b21f
                                              • Instruction Fuzzy Hash: 2301F7710043849FF7115A95CD85B6ABBD8FF81620F14C55EEE480FA82E3399400CB72
                                              Memory Dump Source
                                              • Source File: 0000000B.00000002.1508195502.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_11_2_10fd000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8db09fdf0678a87615df2d06d62bd9f43df0fa97329f59fe206cf266c2d48033
                                              • Instruction ID: 373e725ccb2bd2827960fa557d2b414ec31d0562b98baf29991da78d0b3ba20c
                                              • Opcode Fuzzy Hash: 8db09fdf0678a87615df2d06d62bd9f43df0fa97329f59fe206cf266c2d48033
                                              • Instruction Fuzzy Hash: D0F0C2314043849FE7118E19CC88B66FFD8EB81634F18C05AEE480F697D2799840CBB1

                                              Execution Graph

                                              Execution Coverage:8.5%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:21
                                              Total number of Limit Nodes:4
                                              execution_graph 25520 1790848 25522 179084e 25520->25522 25521 179091b 25522->25521 25524 179138c 25522->25524 25526 1791396 25524->25526 25525 1791484 25525->25522 25526->25525 25528 1797ea8 25526->25528 25529 1797eb2 25528->25529 25530 1797ecc 25529->25530 25533 5d5d9f0 25529->25533 25539 5d5d9e0 25529->25539 25530->25526 25535 5d5da05 25533->25535 25534 5d5dc1a 25534->25530 25535->25534 25536 5d5dc31 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25535->25536 25537 5d5dc40 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25535->25537 25538 5d5de88 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25535->25538 25536->25535 25537->25535 25538->25535 25540 5d5d9f0 25539->25540 25541 5d5dc1a 25540->25541 25542 5d5dc31 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25540->25542 25543 5d5dc40 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25540->25543 25544 5d5de88 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25540->25544 25541->25530 25542->25540 25543->25540 25544->25540
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b89f7b9ed2f2e0541bf3de22810426f2a404aa477be732a6d750b797fb28e926
                                              • Instruction ID: 7dee078cbb1c49154d9b085c5f6741acb058f76ea88305f36798f624480b4c72
                                              • Opcode Fuzzy Hash: b89f7b9ed2f2e0541bf3de22810426f2a404aa477be732a6d750b797fb28e926
                                              • Instruction Fuzzy Hash: F6630B31D10B1A8ADB11EF68C8805ADF7B1FF99300F55D79AE4587B121EB70AAD4CB81

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2568 1794a98-1794afe 2570 1794b48-1794b4a 2568->2570 2571 1794b00-1794b0b 2568->2571 2572 1794b4c-1794b65 2570->2572 2571->2570 2573 1794b0d-1794b19 2571->2573 2580 1794bb1-1794bb3 2572->2580 2581 1794b67-1794b73 2572->2581 2574 1794b1b-1794b25 2573->2574 2575 1794b3c-1794b46 2573->2575 2577 1794b29-1794b38 2574->2577 2578 1794b27 2574->2578 2575->2572 2577->2577 2579 1794b3a 2577->2579 2578->2577 2579->2575 2583 1794bb5-1794bcd 2580->2583 2581->2580 2582 1794b75-1794b81 2581->2582 2584 1794b83-1794b8d 2582->2584 2585 1794ba4-1794baf 2582->2585 2589 1794bcf-1794bda 2583->2589 2590 1794c17-1794c19 2583->2590 2587 1794b8f 2584->2587 2588 1794b91-1794ba0 2584->2588 2585->2583 2587->2588 2588->2588 2591 1794ba2 2588->2591 2589->2590 2592 1794bdc-1794be8 2589->2592 2593 1794c1b-1794c33 2590->2593 2591->2585 2594 1794c0b-1794c15 2592->2594 2595 1794bea-1794bf4 2592->2595 2600 1794c7d-1794c7f 2593->2600 2601 1794c35-1794c40 2593->2601 2594->2593 2596 1794bf8-1794c07 2595->2596 2597 1794bf6 2595->2597 2596->2596 2599 1794c09 2596->2599 2597->2596 2599->2594 2602 1794c81-1794cf4 2600->2602 2601->2600 2603 1794c42-1794c4e 2601->2603 2612 1794cfa-1794d08 2602->2612 2604 1794c71-1794c7b 2603->2604 2605 1794c50-1794c5a 2603->2605 2604->2602 2606 1794c5c 2605->2606 2607 1794c5e-1794c6d 2605->2607 2606->2607 2607->2607 2609 1794c6f 2607->2609 2609->2604 2613 1794d0a-1794d10 2612->2613 2614 1794d11-1794d71 2612->2614 2613->2614 2621 1794d81-1794d85 2614->2621 2622 1794d73-1794d77 2614->2622 2624 1794d95-1794d99 2621->2624 2625 1794d87-1794d8b 2621->2625 2622->2621 2623 1794d79 2622->2623 2623->2621 2627 1794da9-1794dad 2624->2627 2628 1794d9b-1794d9f 2624->2628 2625->2624 2626 1794d8d 2625->2626 2626->2624 2630 1794dbd-1794dc1 2627->2630 2631 1794daf-1794db3 2627->2631 2628->2627 2629 1794da1 2628->2629 2629->2627 2633 1794dd1-1794dd5 2630->2633 2634 1794dc3-1794dc7 2630->2634 2631->2630 2632 1794db5 2631->2632 2632->2630 2636 1794de5 2633->2636 2637 1794dd7-1794ddb 2633->2637 2634->2633 2635 1794dc9-1794dcc call 1790ab8 2634->2635 2635->2633 2641 1794de6 2636->2641 2637->2636 2638 1794ddd-1794de0 call 1790ab8 2637->2638 2638->2636 2641->2641
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cd5b1f7725e279b5565e929da3efbc92eb5b2f274135b843f431ee8e0ce2fd6d
                                              • Instruction ID: 3068df9b1afe36ea669c0baf5ca0db67c0367ab595435e7a1d3db5d798747d5b
                                              • Opcode Fuzzy Hash: cd5b1f7725e279b5565e929da3efbc92eb5b2f274135b843f431ee8e0ce2fd6d
                                              • Instruction Fuzzy Hash: C1B16170E002498FDF14CFA9E9857ADFBF2AF48714F148129D816E7354EB74988ACB85
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7f3dcbf1c395f46df78b99b1088cb1b948828af88a111d47b7c96f86e4befd40
                                              • Instruction ID: c3a9ff5371dc8d0b186a266954acf83439df745a54647c4cf8678718c1b3e71e
                                              • Opcode Fuzzy Hash: 7f3dcbf1c395f46df78b99b1088cb1b948828af88a111d47b7c96f86e4befd40
                                              • Instruction Fuzzy Hash: 07915E70E002098FDF14CFA9E9857AEFBF2BF88714F148129E415A7254EB74984ACB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 662 5d5e960-5d5e96b 663 5d5e995-5d5e9b4 call 5d5e550 662->663 664 5d5e96d-5d5e994 call 5d5d1d0 662->664 670 5d5e9b6-5d5e9b9 663->670 671 5d5e9ba-5d5ea19 663->671 678 5d5ea1f-5d5eaac GlobalMemoryStatusEx 671->678 679 5d5ea1b-5d5ea1e 671->679 683 5d5eab5-5d5eadd 678->683 684 5d5eaae-5d5eab4 678->684 684->683
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2700390099.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_5d50000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 246c5bdfb0231ebce13d61e0a5d39bb1753b88ebd256857854773de694ae054a
                                              • Instruction ID: f76d7205db6e8df80abf894cb6dab9659a7f23f8b644bbead2f4d822594a1e0e
                                              • Opcode Fuzzy Hash: 246c5bdfb0231ebce13d61e0a5d39bb1753b88ebd256857854773de694ae054a
                                              • Instruction Fuzzy Hash: 6641E332D043599FDB14DFBAD80469EBBF5EF89220F15856BD808A7340EB749885CBE0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 687 5d5e550-5d5eaac GlobalMemoryStatusEx 690 5d5eab5-5d5eadd 687->690 691 5d5eaae-5d5eab4 687->691 691->690
                                              APIs
                                              • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05D5E9B2), ref: 05D5EA9F
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2700390099.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_5d50000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: ded1bab76d0826cefab45c581cc819bc9d36f81acdbd698488a86a6491dd0e8b
                                              • Instruction ID: e593f6365b69478d1e3a691ee8bf056326a0df2d7025ad122241d0f394a3e909
                                              • Opcode Fuzzy Hash: ded1bab76d0826cefab45c581cc819bc9d36f81acdbd698488a86a6491dd0e8b
                                              • Instruction Fuzzy Hash: 541117B1C006599BDB10DFAAC4447DEFBF9FF48220F14816AD818A7240D378A944CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 694 5d5ea30-5d5ea76 695 5d5ea7e-5d5eaac GlobalMemoryStatusEx 694->695 696 5d5eab5-5d5eadd 695->696 697 5d5eaae-5d5eab4 695->697 697->696
                                              APIs
                                              • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05D5E9B2), ref: 05D5EA9F
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2700390099.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_5d50000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID: GlobalMemoryStatus
                                              • String ID:
                                              • API String ID: 1890195054-0
                                              • Opcode ID: e151cc7d32adaeea43eab35a25fc8b09bae27e1b60d60a55ec09312a88f5dd87
                                              • Instruction ID: e8eb5e879942e9eb8e84ff7fd9784d9c05190fecf791040ae7a82d7fed4eeda6
                                              • Opcode Fuzzy Hash: e151cc7d32adaeea43eab35a25fc8b09bae27e1b60d60a55ec09312a88f5dd87
                                              • Instruction Fuzzy Hash: AE1136B1D106599BCB10DFAAC4487DEFBF5FF48220F14816AE818A7240D378AA41CFA5

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1484 1798720-1798722 1485 1798725-179872a 1484->1485 1486 1798724 1484->1486 1487 179872b-179872c 1485->1487 1488 179872d-179872e 1485->1488 1486->1485 1487->1488 1489 1798731-1798737 1488->1489 1490 1798730 1488->1490 1491 1798739-179873c 1489->1491 1490->1489 1492 1798769-179876c 1491->1492 1493 179873e-1798764 1491->1493 1494 1798799-179879c 1492->1494 1495 179876e-1798794 1492->1495 1493->1492 1496 17987c9-17987cc 1494->1496 1497 179879e-17987c4 1494->1497 1495->1494 1499 17987f9-17987fc 1496->1499 1500 17987ce-17987f4 1496->1500 1497->1496 1502 1798829-179882c 1499->1502 1503 17987fe-1798824 1499->1503 1500->1499 1506 1798859-179885c 1502->1506 1507 179882e-1798854 1502->1507 1503->1502 1511 1798889-179888c 1506->1511 1512 179885e-1798884 1506->1512 1507->1506 1515 17988b9-17988bc 1511->1515 1516 179888e-17988b4 1511->1516 1512->1511 1521 17988cd-17988d0 1515->1521 1522 17988be-17988c0 1515->1522 1516->1515 1528 17988fd-1798900 1521->1528 1529 17988d2-17988f8 1521->1529 1704 17988c2 call 1799f78 1522->1704 1705 17988c2 call 1799f68 1522->1705 1706 17988c2 call 179a01b 1522->1706 1531 179892d-1798930 1528->1531 1532 1798902-1798928 1528->1532 1529->1528 1538 179895d-1798960 1531->1538 1539 1798932-1798958 1531->1539 1532->1531 1533 17988c8 1533->1521 1541 179898d-1798990 1538->1541 1542 1798962-1798988 1538->1542 1539->1538 1547 17989bd-17989c0 1541->1547 1548 1798992-17989b8 1541->1548 1542->1541 1549 17989ed-17989f0 1547->1549 1550 17989c2-17989e8 1547->1550 1548->1547 1556 1798a1d-1798a20 1549->1556 1557 17989f2-1798a18 1549->1557 1550->1549 1558 1798a4d-1798a50 1556->1558 1559 1798a22-1798a48 1556->1559 1557->1556 1566 1798a7d-1798a80 1558->1566 1567 1798a52-1798a78 1558->1567 1559->1558 1568 1798aad-1798ab0 1566->1568 1569 1798a82-1798aa8 1566->1569 1567->1566 1576 1798add-1798ae0 1568->1576 1577 1798ab2-1798ad8 1568->1577 1569->1568 1578 1798b0d-1798b10 1576->1578 1579 1798ae2-1798b08 1576->1579 1577->1576 1586 1798b3d-1798b40 1578->1586 1587 1798b12-1798b38 1578->1587 1579->1578 1588 1798b6d-1798b70 1586->1588 1589 1798b42-1798b68 1586->1589 1587->1586 1596 1798b9d-1798ba0 1588->1596 1597 1798b72-1798b98 1588->1597 1589->1588 1598 1798bcd-1798bd0 1596->1598 1599 1798ba2-1798bc8 1596->1599 1597->1596 1606 1798bed-1798bf0 1598->1606 1607 1798bd2-1798be8 1598->1607 1599->1598 1608 1798c1d-1798c20 1606->1608 1609 1798bf2-1798c18 1606->1609 1607->1606 1616 1798c4d-1798c50 1608->1616 1617 1798c22-1798c48 1608->1617 1609->1608 1618 1798c6b-1798c6e 1616->1618 1619 1798c52-1798c5e 1616->1619 1617->1616 1625 1798c9b-1798c9e 1618->1625 1626 1798c70-1798c96 1618->1626 1640 1798c66 1619->1640 1628 1798ccb-1798cce 1625->1628 1629 1798ca0-1798cc6 1625->1629 1626->1625 1634 1798cfb-1798cfe 1628->1634 1635 1798cd0-1798cf6 1628->1635 1629->1628 1637 1798d2b-1798d2e 1634->1637 1638 1798d00-1798d26 1634->1638 1635->1634 1643 1798d5b-1798d5e 1637->1643 1644 1798d30-1798d56 1637->1644 1638->1637 1640->1618 1647 1798d8b-1798d8e 1643->1647 1648 1798d60-1798d86 1643->1648 1644->1643 1652 1798dbb-1798dbe 1647->1652 1653 1798d90-1798db6 1647->1653 1648->1647 1656 1798deb-1798dee 1652->1656 1657 1798dc0-1798de6 1652->1657 1653->1652 1662 1798e1b-1798e1e 1656->1662 1663 1798df0-1798e16 1656->1663 1657->1656 1666 1798e2b-1798e2e 1662->1666 1667 1798e20 1662->1667 1663->1662 1672 1798e5b-1798e5e 1666->1672 1673 1798e30-1798e56 1666->1673 1676 1798e26 1667->1676 1679 1798e8b-1798e8e 1672->1679 1680 1798e60-1798e86 1672->1680 1673->1672 1676->1666 1682 1798ebb-1798ebe 1679->1682 1683 1798e90-1798eb6 1679->1683 1680->1679 1688 1798eeb-1798eed 1682->1688 1689 1798ec0-1798ee6 1682->1689 1683->1682 1691 1798eef 1688->1691 1692 1798ef4-1798ef7 1688->1692 1689->1688 1691->1692 1692->1491 1697 1798efd-1798f03 1692->1697 1704->1533 1705->1533 1706->1533
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: defddb1e6c859d35b27a860c1feb7a644aaec3329666a881a9dd349401291b54
                                              • Instruction ID: f8c80fbd1d571207e51704e9704b27782cecf084a6321d4fce9d63413cdc9990
                                              • Opcode Fuzzy Hash: defddb1e6c859d35b27a860c1feb7a644aaec3329666a881a9dd349401291b54
                                              • Instruction Fuzzy Hash: 752253307012069BDB299B2CF89461D73E6FBCA314B544939D006CF755CF79EC8A8B92

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1849 179a1aa-179a1b0 1850 179a1b1-179a1b4 1849->1850 1851 179a1c7-179a1ca 1850->1851 1852 179a1b6-179a1c2 1850->1852 1853 179a1cc-179a1fa 1851->1853 1854 179a1ff-179a202 1851->1854 1852->1851 1853->1854 1856 179a208-179a20b 1854->1856 1857 179a4c6-179a4cf 1854->1857 1859 179a20d-179a216 1856->1859 1861 179a228-179a22b 1856->1861 1857->1859 1860 179a4d5-179a4df 1857->1860 1862 179a21c-179a223 1859->1862 1863 179a4e2-179a4ea 1859->1863 1864 179a22d-179a232 1861->1864 1865 179a235-179a238 1861->1865 1862->1861 1875 179a4ed-179a4f2 1863->1875 1876 179a4ec 1863->1876 1864->1865 1867 179a25b-179a25e 1865->1867 1868 179a23a-179a256 1865->1868 1869 179a27a-179a27c 1867->1869 1870 179a260-179a26f 1867->1870 1868->1867 1873 179a27e 1869->1873 1874 179a283-179a286 1869->1874 1883 179a4c3 1870->1883 1884 179a275 1870->1884 1873->1874 1874->1850 1878 179a28c-179a29a 1874->1878 1879 179a4f5-179a512 1875->1879 1880 179a4f4 1875->1880 1876->1875 1990 179a29d call 179a6c8 1878->1990 1991 179a29d call 179a6b8 1878->1991 1992 179a29d call 179a6c5 1878->1992 1881 179a514-179a517 1879->1881 1880->1879 1885 179a519-179a51c 1881->1885 1886 179a566-179a56f 1881->1886 1883->1857 1884->1869 1888 179a53c-179a53f 1885->1888 1889 179a51e-179a537 1885->1889 1890 179a5fd-179a606 1886->1890 1891 179a575 1886->1891 1896 179a561-179a564 1888->1896 1897 179a541-179a55c 1888->1897 1889->1888 1894 179a6ab-179a6c0 1890->1894 1895 179a60c-179a610 1890->1895 1892 179a57a-179a57d 1891->1892 1898 179a598-179a59b 1892->1898 1899 179a57f-179a58d 1892->1899 1893 179a2a3-179a2bf call 179de6a 1893->1883 1919 179a2c5-179a2ca 1893->1919 1902 179a615-179a618 1895->1902 1896->1886 1896->1892 1897->1896 1904 179a5ad-179a5b0 1898->1904 1905 179a59d 1898->1905 1914 179a63c-179a65e 1899->1914 1918 179a593 1899->1918 1906 179a61a-179a632 1902->1906 1907 179a637-179a63a 1902->1907 1912 179a5b2-179a5ca 1904->1912 1913 179a5d5-179a5d8 1904->1913 1920 179a5a5-179a5a8 1905->1920 1906->1907 1907->1914 1915 179a65f-179a662 1907->1915 1917 179a664-179a667 1912->1917 1937 179a5d0 1912->1937 1923 179a5da-179a5dd 1913->1923 1924 179a5e2-179a5e5 1913->1924 1916 179a66c-179a66f 1915->1916 1915->1917 1927 179a68e-179a690 1916->1927 1928 179a671-179a689 1916->1928 1917->1916 1918->1898 1933 179a2d2-179a2d3 1919->1933 1920->1904 1923->1924 1925 179a5ef-179a5f2 1924->1925 1926 179a5e7-179a5ec 1924->1926 1931 179a5f8-179a5fb 1925->1931 1932 179a6a0-179a6aa 1925->1932 1926->1925 1934 179a692 1927->1934 1935 179a697-179a69a 1927->1935 1928->1927 1931->1890 1931->1902 1933->1883 1940 179a2d9-179a336 1933->1940 1934->1935 1935->1881 1935->1932 1937->1913 1947 179a33c-179a38f 1940->1947 1948 179a407-179a421 1940->1948 1967 179a3af-179a3d2 call 17979d4 1947->1967 1968 179a391-179a3ad 1947->1968 1953 179a423-179a425 1948->1953 1955 179a433 1953->1955 1956 179a427-179a431 1953->1956 1957 179a438-179a43a 1955->1957 1956->1957 1959 179a4ab-179a4bd 1957->1959 1960 179a43c-179a440 1957->1960 1959->1883 1959->1940 1961 179a451 1960->1961 1962 179a442-179a44f 1960->1962 1963 179a456-179a458 1961->1963 1962->1963 1963->1959 1966 179a45a-179a45c 1963->1966 1966->1959 1969 179a45e-179a4a4 1966->1969 1979 179a3d4-179a405 1967->1979 1968->1979 1969->1959 1979->1953 1990->1893 1991->1893 1992->1893
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bcfee92325393021eceac6465494ae7e344fba216c626e90196b4e62c32bf399
                                              • Instruction ID: 5b67e9a6b1474838961473d598b83b983674f10cee57ad7ac12ce04d1e7d6063
                                              • Opcode Fuzzy Hash: bcfee92325393021eceac6465494ae7e344fba216c626e90196b4e62c32bf399
                                              • Instruction Fuzzy Hash: 6CE18B34B012058FDF15CBACE994AADBBB2FB89310F24856AE506DB351DB34DC46CB90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2642 1794a90-1794afe 2645 1794b48-1794b4a 2642->2645 2646 1794b00-1794b0b 2642->2646 2647 1794b4c-1794b65 2645->2647 2646->2645 2648 1794b0d-1794b19 2646->2648 2655 1794bb1-1794bb3 2647->2655 2656 1794b67-1794b73 2647->2656 2649 1794b1b-1794b25 2648->2649 2650 1794b3c-1794b46 2648->2650 2652 1794b29-1794b38 2649->2652 2653 1794b27 2649->2653 2650->2647 2652->2652 2654 1794b3a 2652->2654 2653->2652 2654->2650 2658 1794bb5-1794bcd 2655->2658 2656->2655 2657 1794b75-1794b81 2656->2657 2659 1794b83-1794b8d 2657->2659 2660 1794ba4-1794baf 2657->2660 2664 1794bcf-1794bda 2658->2664 2665 1794c17-1794c19 2658->2665 2662 1794b8f 2659->2662 2663 1794b91-1794ba0 2659->2663 2660->2658 2662->2663 2663->2663 2666 1794ba2 2663->2666 2664->2665 2667 1794bdc-1794be8 2664->2667 2668 1794c1b-1794c33 2665->2668 2666->2660 2669 1794c0b-1794c15 2667->2669 2670 1794bea-1794bf4 2667->2670 2675 1794c7d-1794c7f 2668->2675 2676 1794c35-1794c40 2668->2676 2669->2668 2671 1794bf8-1794c07 2670->2671 2672 1794bf6 2670->2672 2671->2671 2674 1794c09 2671->2674 2672->2671 2674->2669 2677 1794c81-1794cb7 2675->2677 2676->2675 2678 1794c42-1794c4e 2676->2678 2686 1794cbf-1794cf4 2677->2686 2679 1794c71-1794c7b 2678->2679 2680 1794c50-1794c5a 2678->2680 2679->2677 2681 1794c5c 2680->2681 2682 1794c5e-1794c6d 2680->2682 2681->2682 2682->2682 2684 1794c6f 2682->2684 2684->2679 2687 1794cfa-1794d08 2686->2687 2688 1794d0a-1794d10 2687->2688 2689 1794d11-1794d71 2687->2689 2688->2689 2696 1794d81-1794d85 2689->2696 2697 1794d73-1794d77 2689->2697 2699 1794d95-1794d99 2696->2699 2700 1794d87-1794d8b 2696->2700 2697->2696 2698 1794d79 2697->2698 2698->2696 2702 1794da9-1794dad 2699->2702 2703 1794d9b-1794d9f 2699->2703 2700->2699 2701 1794d8d 2700->2701 2701->2699 2705 1794dbd-1794dc1 2702->2705 2706 1794daf-1794db3 2702->2706 2703->2702 2704 1794da1 2703->2704 2704->2702 2708 1794dd1-1794dd5 2705->2708 2709 1794dc3-1794dc7 2705->2709 2706->2705 2707 1794db5 2706->2707 2707->2705 2711 1794de5 2708->2711 2712 1794dd7-1794ddb 2708->2712 2709->2708 2710 1794dc9-1794dcc call 1790ab8 2709->2710 2710->2708 2716 1794de6 2711->2716 2712->2711 2713 1794ddd-1794de0 call 1790ab8 2712->2713 2713->2711 2716->2716
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d1358dfede354f02584cd6f2bbc55178d61a910aec4b9111b3159eaf6047e217
                                              • Instruction ID: dd38e02ce1e5e3107712b0931143ec7356dad64e3f7649258d39c40425e4a5ad
                                              • Opcode Fuzzy Hash: d1358dfede354f02584cd6f2bbc55178d61a910aec4b9111b3159eaf6047e217
                                              • Instruction Fuzzy Hash: 97A17C70E002498FDF10CFA9E9857ADFBF1BF48714F148129D81AA7254EB74988ACB91
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a07f3a7094934e08468cbbe82848fb3339f4948357bdd1b982f4e9859e1dde51
                                              • Instruction ID: a12dc43eb574a87291411ccd8fd37eddbd0ee0196cf3d4e34fb1f200064f95de
                                              • Opcode Fuzzy Hash: a07f3a7094934e08468cbbe82848fb3339f4948357bdd1b982f4e9859e1dde51
                                              • Instruction Fuzzy Hash: 9CA15AB1E002099FDF10CFA9E9857DEFBF2BF48714F148129E415A7254EB34984ACB91
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 21de4c6e701e0cf5c2877cdd97fdda264d820603de60e2301ba3e631c95672db
                                              • Instruction ID: d9ff924ed4c695861e59bd36b7584fde39e325f0d33c423cdcfcdf94e43e6240
                                              • Opcode Fuzzy Hash: 21de4c6e701e0cf5c2877cdd97fdda264d820603de60e2301ba3e631c95672db
                                              • Instruction Fuzzy Hash: AD618E34A10205CFDF14DB68D558AADBBB6FF89700F2041A9E406EB7A1DB75DC48CBA1
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 466aac8b0a8745ba9c11941100333736bd974de7f663e97a01b0c8d75dfd3381
                                              • Instruction ID: e25445e848aa17c30c4cb3b389e0eaf1d55d15904227f85e04759ca649b2edc9
                                              • Opcode Fuzzy Hash: 466aac8b0a8745ba9c11941100333736bd974de7f663e97a01b0c8d75dfd3381
                                              • Instruction Fuzzy Hash: 86715E70D002498FDF14CFA9E984BDEFBF1EF48714F148129E416AB254DB78984ACB95
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2d395aee9a5d3bd5f8545f6eb338436bf26771a00ed9f54ffc3ce5165542bd22
                                              • Instruction ID: 02ff756cd1aa0cc0a393cbd862e560a8832514e6e67a686e16bff94561873b11
                                              • Opcode Fuzzy Hash: 2d395aee9a5d3bd5f8545f6eb338436bf26771a00ed9f54ffc3ce5165542bd22
                                              • Instruction Fuzzy Hash: 69716F70E003498FDF14CFA9D984B9EFBF2EF48714F148129E416A7254EB789846CB95
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 81c36082bafa7e04b828eaeeb151c65003e62d83d0a9fd3ab78ed1582640ab22
                                              • Instruction ID: 5c521b33a4dae9134e1b15e9c98499ab496b22bf8a05c894b5a5b3cecbf1dc1c
                                              • Opcode Fuzzy Hash: 81c36082bafa7e04b828eaeeb151c65003e62d83d0a9fd3ab78ed1582640ab22
                                              • Instruction Fuzzy Hash: 7F511374D102188FDF18CFA9D888B9DFBB1FF48714F148219E819AB355D774A888CB95
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7bb96cf49197f80d1e829f6a83308e8946fdb241c8a749a469222efc5fa1122a
                                              • Instruction ID: 63f86e65927903053e97a7089294e15cc2635c3c204938e8cbefe3131a5add8b
                                              • Opcode Fuzzy Hash: 7bb96cf49197f80d1e829f6a83308e8946fdb241c8a749a469222efc5fa1122a
                                              • Instruction Fuzzy Hash: B9513875A01204DFDB04DFA9E884B99FBB2FF88310F14C2AAE9089B355E7709845CB90
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9212a550c2fbcab3c6c1c93b5ecf7019a55000be83c88cdc193e5d02982364cd
                                              • Instruction ID: a7b489756e937dc51befe43243c329ab044511253b51b46d897e1a150c078b0e
                                              • Opcode Fuzzy Hash: 9212a550c2fbcab3c6c1c93b5ecf7019a55000be83c88cdc193e5d02982364cd
                                              • Instruction Fuzzy Hash: 3351E370D102188FDF18CFA9D898B9EFBB1FF48714F148219E819AB355D774A888CB95
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3e3634288de9c1183bf70adb390b4e2205c3942cde82cc8de001640a9dd0322a
                                              • Instruction ID: f00b4f34eb63a145eec15538305bdf734aaf5a565105f0c52ae6eb5cdaedc9fd
                                              • Opcode Fuzzy Hash: 3e3634288de9c1183bf70adb390b4e2205c3942cde82cc8de001640a9dd0322a
                                              • Instruction Fuzzy Hash: 93510AB02122428FDB09EF28F9C4D583B7AF7D170470486BDD5056BA26EB3E6D05CB86
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 897fef7d9ea0daa815062fdc91c12608d6f47bfa68ddb6fb72153f36678ffd22
                                              • Instruction ID: 3eec1c080d84636efa5307c746542dce8ee23ebe6f31c47f61fed025d5b2b10e
                                              • Opcode Fuzzy Hash: 897fef7d9ea0daa815062fdc91c12608d6f47bfa68ddb6fb72153f36678ffd22
                                              • Instruction Fuzzy Hash: DB510CB02122428FDB09EF28F9C4D583B76F7D170470486BDD5056BA26EB3E6D05CB86
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 48031d25890b9c881dc17139aba84af9de2a7dd4355f2d580a6ec61e9dc13f42
                                              • Instruction ID: c044a5ff4854b8cb2f81441ad8c0a8bacc14fe0d8a13d34a6d5613b0f9b03258
                                              • Opcode Fuzzy Hash: 48031d25890b9c881dc17139aba84af9de2a7dd4355f2d580a6ec61e9dc13f42
                                              • Instruction Fuzzy Hash: 97315A75B00615EFD705CB69D890E7AB77AFBC8700F54C168E4029B299CB36EC42DBA0
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 860ce184cd63f30ba34f31c8056139956dc43187e5a8ef491a11b02b122e0a13
                                              • Instruction ID: caaff70cce18e12dbbaf781628fa1cbd50150d9ccfe8a2bef1c471b201fc0347
                                              • Opcode Fuzzy Hash: 860ce184cd63f30ba34f31c8056139956dc43187e5a8ef491a11b02b122e0a13
                                              • Instruction Fuzzy Hash: 92315E31E206099BDF29DFA9D8547AEF7B2FF89700F108529E405FB241E7749985CB50
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 77f53e25cb6421f538b311c3841aa8795c06b76b56efc37a8402bb9bc4a2cba8
                                              • Instruction ID: 53451c0dd9ea356df331e98c661750ecc86943236da761aeac2b975b48d8558d
                                              • Opcode Fuzzy Hash: 77f53e25cb6421f538b311c3841aa8795c06b76b56efc37a8402bb9bc4a2cba8
                                              • Instruction Fuzzy Hash: 01313C31E202099BDF19DFA9E4547AEF7B2FF89710F608529E505FB240EB70A9858B50
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d56d85d60b348c8b4a48acb8a0a7b64a5cc367d5c1dc586f2c4c1a85ec13e290
                                              • Instruction ID: 8db130c628aa8729f6a73f565a2e4ec571c2a700dca36d960f9c0cc4a24fafa2
                                              • Opcode Fuzzy Hash: d56d85d60b348c8b4a48acb8a0a7b64a5cc367d5c1dc586f2c4c1a85ec13e290
                                              • Instruction Fuzzy Hash: 5E41EF74900749EFDF14DF99D884A9EFBF5FF48314F148029E809AB250DB75A949CB90
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f2c86ca6600a02df0811a850c1805edc897825816812c7fdfd4d054344c5258b
                                              • Instruction ID: 29aead50e6bc23c5ae756235b00de42bf2376d5704d5a4c0e0bf81d94abd3ffb
                                              • Opcode Fuzzy Hash: f2c86ca6600a02df0811a850c1805edc897825816812c7fdfd4d054344c5258b
                                              • Instruction Fuzzy Hash: F0313E74700226CFDF1AEF78E5546ADBBB6AF49240F1005B9D501AB354DB3ADC05CB91
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4a0733b24970f6ed8c763a641d69842acc10bc4d67d0e21ae9be61de3c56592c
                                              • Instruction ID: 878454abb62ed2f5cbb437a5d203693b0cba93ef2382ceb851850f2e58be1a47
                                              • Opcode Fuzzy Hash: 4a0733b24970f6ed8c763a641d69842acc10bc4d67d0e21ae9be61de3c56592c
                                              • Instruction Fuzzy Hash: 2341EEB4D00348AFDB14DFA9D884ADEBBF5EF48314F148429E809AB254DB75A949CB90
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d64fd95fcad86ceecb1d1be6f1ca97d7d86d8e8100b41781d9c91f9cb87efba2
                                              • Instruction ID: 66d2e47a4aaa83ffbec20b80d90e9084520ccc8485de99d2e8a67e27a336ca73
                                              • Opcode Fuzzy Hash: d64fd95fcad86ceecb1d1be6f1ca97d7d86d8e8100b41781d9c91f9cb87efba2
                                              • Instruction Fuzzy Hash: B2314E74700225CFDF19EB78E9546AEB7B6AF88240F5004BDD501AB394DB3ADC45CB91
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 910faa6c15eac3221b3641906f33b679786264599a350a3a9bb3b954c9daa8a9
                                              • Instruction ID: caa07c7a1d10ae2378c2922a7f07001db97f9ed6c0d131c2cecdb2074f33d968
                                              • Opcode Fuzzy Hash: 910faa6c15eac3221b3641906f33b679786264599a350a3a9bb3b954c9daa8a9
                                              • Instruction Fuzzy Hash: 9731A274A0524A9BDF15CF6CD85479EFBB2FF89300F10C629E805AB341EB75A845CB90
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f76c92c4226ec977f2b25d91f6ec6f19b3eb072900d8113803f9358658987fe1
                                              • Instruction ID: 6163639ede563b170edb6a4463bd2278e3d3db9b373e3e9d9ba7585061525974
                                              • Opcode Fuzzy Hash: f76c92c4226ec977f2b25d91f6ec6f19b3eb072900d8113803f9358658987fe1
                                              • Instruction Fuzzy Hash: 97218030A002029BDF21EF6CF884B6D77A9EB85724F504975D406CB656DB3CEC598B92
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ad28419c5054acfe23c21e6618071694548d055792fd3c5ff2731bbc7c7484dc
                                              • Instruction ID: 8fe63f6ce4f00cd2820aec172934aa11edbb3eb602da11f723a728d331782606
                                              • Opcode Fuzzy Hash: ad28419c5054acfe23c21e6618071694548d055792fd3c5ff2731bbc7c7484dc
                                              • Instruction Fuzzy Hash: 20216574E0124A9BDF15CF6CD89069EFBB2FF89300F50862AE805AB341EB759C45CB50
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: baf65f37a984d7467a7b06ab401019db1e16d7ff19df58b0084e0d3d3ebf1a64
                                              • Instruction ID: 2736b0b50c8d604be8bc08ff08de9dcd9be9bc10bbb006c60f39b7c1461ac132
                                              • Opcode Fuzzy Hash: baf65f37a984d7467a7b06ab401019db1e16d7ff19df58b0084e0d3d3ebf1a64
                                              • Instruction Fuzzy Hash: 17218135E102099BDF19CFA8D45069EF7B2EF89310F60861AF916BB341EB70A849CB51
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 06e9ec843c2c9601cd330e069475da7cbc499c4cf8de0e794c82b3305c4250eb
                                              • Instruction ID: fca3bcf26ac15e2ece85b7a9c695795ac10696d985231ff75e083f4412f5129a
                                              • Opcode Fuzzy Hash: 06e9ec843c2c9601cd330e069475da7cbc499c4cf8de0e794c82b3305c4250eb
                                              • Instruction Fuzzy Hash: D8217C30B00246CFEF14DB78D5156AEBBF2AF49220F5005A8D506EB390DB3A9C14DBA1
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 549e34c0b676ca1e1aec0d362ae77e9f13ba3dea6f2e296f5097c4a6ca7319a8
                                              • Instruction ID: 970b539b6460fcfb42ab2f6dca5aac80667f1a66fbe11cb446219aa886778a14
                                              • Opcode Fuzzy Hash: 549e34c0b676ca1e1aec0d362ae77e9f13ba3dea6f2e296f5097c4a6ca7319a8
                                              • Instruction Fuzzy Hash: 0B21C275B402048FEF14DB6DD854BAEBBF6FF88724F118169E505EB3A4DA718D048B90
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1ca939953e45010e74c474428105fabfc35b33d26b5e8793fb08820c61e6a036
                                              • Instruction ID: d41dc98b0e5476b9b9bab9fa28db35e6ff19a5fcf7f33f9641e2999b52652546
                                              • Opcode Fuzzy Hash: 1ca939953e45010e74c474428105fabfc35b33d26b5e8793fb08820c61e6a036
                                              • Instruction Fuzzy Hash: 4E21B075B511048FEF15DB68D958BAEB7F6BF88720F158069E405EB3A4DA718C088B90
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1ccc8b4ae2e55ea8e27f3dcf684188b8e26806386df61cd5e3066b04582ac413
                                              • Instruction ID: 5d52abdf79975651bb804b059fe37b8caad1750b73d4faa45614158aebc553f6
                                              • Opcode Fuzzy Hash: 1ccc8b4ae2e55ea8e27f3dcf684188b8e26806386df61cd5e3066b04582ac413
                                              • Instruction Fuzzy Hash: CF21F374700215CFDB58DF78D558AADB7F6BB89200F1040A9E40AEB364DB36AD05CB91
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2687134865.00000000013BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013BD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_13bd000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 88b3c0af62e9e1cd235d357622d104f99a07dc94e46c49402c9ddedb2e8502fa
                                              • Instruction ID: 5ee6d3cb9c3fe3100648e3af873d03f598926881aff178580200abf4f1e20088
                                              • Opcode Fuzzy Hash: 88b3c0af62e9e1cd235d357622d104f99a07dc94e46c49402c9ddedb2e8502fa
                                              • Instruction Fuzzy Hash: 982100B1504304DFDB15DF94D9C0B66BBA5FB8421CF20C569DA090AA56D33AD446CA62
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 860df76ba53b60c8e72bc66cd3482ae7d157c8587986807bb1995709ba69c30e
                                              • Instruction ID: 24cc5176583effdf26e114930cb713c02982e5bc0ca8e5e2ad4d3e1447c40d6d
                                              • Opcode Fuzzy Hash: 860df76ba53b60c8e72bc66cd3482ae7d157c8587986807bb1995709ba69c30e
                                              • Instruction Fuzzy Hash: BB216030B00246CFDF14EB78D5257AEBBF6AB49260F500478D506EB354DB3A9C14CBA1
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d6e7ab837fe54720559beb1386e3905c9e97959d2639bd28e929092405a04a6c
                                              • Instruction ID: 7f7095f0b451a953299929fac96aa27a25fa69f6d02696e6e412e5fb580c2746
                                              • Opcode Fuzzy Hash: d6e7ab837fe54720559beb1386e3905c9e97959d2639bd28e929092405a04a6c
                                              • Instruction Fuzzy Hash: 3E216230E102099BDF19CFA8D49069EF7B6FF89310F50861AE915FB341EB70A845CB50
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 298ded1779bb66c30eee3f5480f85b0e21633020e07f6f855d70d552f048da05
                                              • Instruction ID: 6c1e188ba5fdf346a9004efa734c1a1a9b6049e35630d872281908e8ab0a0d14
                                              • Opcode Fuzzy Hash: 298ded1779bb66c30eee3f5480f85b0e21633020e07f6f855d70d552f048da05
                                              • Instruction Fuzzy Hash: 5D2166706002029BEF36972CF48872DB6F5F74A335F904839E507DB795DB29D8998782
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1900e65299b92e71a1cb6d5c00a432004829b9b63eb4a712b74299cb2b9b2822
                                              • Instruction ID: 281129f3eab27a16de2f4490f99ba1c6f0a5c12fe890bb744e48b185fd7eeace
                                              • Opcode Fuzzy Hash: 1900e65299b92e71a1cb6d5c00a432004829b9b63eb4a712b74299cb2b9b2822
                                              • Instruction Fuzzy Hash: 1C216F306002028BEF21EF6CF884B1D77A9E7C5B24F504975D406CBA56DB3CEC598B92
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 731893f7e4305164bcdc5f982b2a222552f98177d37855892ca3ea3d1eb00289
                                              • Instruction ID: 40892449c056184415236bef41e4a9ca2035aafba372bb3201bba0e77a0e9591
                                              • Opcode Fuzzy Hash: 731893f7e4305164bcdc5f982b2a222552f98177d37855892ca3ea3d1eb00289
                                              • Instruction Fuzzy Hash: 60211674700215CFDB18DF78D558AADB7F6AB89300F1000A8E506EB3A4DB36AD04CB91
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: eadf73db0db59b2763462ceffa21e336a58b5abff1b65b258331df8b75c8066d
                                              • Instruction ID: 8050f5bcc105a10579e34daa5211aad4763efc5bf5bdaa0b3f51d1cf4edc69e6
                                              • Opcode Fuzzy Hash: eadf73db0db59b2763462ceffa21e336a58b5abff1b65b258331df8b75c8066d
                                              • Instruction Fuzzy Hash: AB11CB307543044FEF66667CA850B2AB76DFB96224F1448BAF402CF243D629CC898BD1
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 775ee544977dd42ecc2ce45bb7e5778dfdea2393303dd0db670c585db825a37f
                                              • Instruction ID: 8dcb918c9333e39e9d45d770e9af6920c2ca6e9a2103babb6ed46f4f4914b822
                                              • Opcode Fuzzy Hash: 775ee544977dd42ecc2ce45bb7e5778dfdea2393303dd0db670c585db825a37f
                                              • Instruction Fuzzy Hash: A0117730B503084BEF65AA7DE844B29B2ADFB85625F104979F006CF352DB79DC898BC1
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cd7bc81bb4d3bdbdf0e0de07a985964964de43a8e6b7d64307ca9eee6d3e6a1e
                                              • Instruction ID: 076c513061087c99ca4797f2c5fdcf88d300708acadffb346da74db4ce42b85e
                                              • Opcode Fuzzy Hash: cd7bc81bb4d3bdbdf0e0de07a985964964de43a8e6b7d64307ca9eee6d3e6a1e
                                              • Instruction Fuzzy Hash: 2C1104306087849FC726AB7C982015EBFF6EF8B310B1545AED045DB692EB399C04C7A2
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9aefbf99949cd8784de95692ded59fee3a67f20b8f8705f69b1ed38a0e3be443
                                              • Instruction ID: 82d0e3e6543b06567f7133bba42f1a23942ee6b111ed9d5c4b141a2fad68974d
                                              • Opcode Fuzzy Hash: 9aefbf99949cd8784de95692ded59fee3a67f20b8f8705f69b1ed38a0e3be443
                                              • Instruction Fuzzy Hash: 6711E3B6B003068FCF20ABB9A84466FBBE5EB49670F504479E506E7344EB35C8158792
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3090d860a13c7fe33f254909679bd5bc03b33e4a06af2154f8d38c1f7023d56a
                                              • Instruction ID: 1471f167011878aa4f796dc477d6cac196424793767df25287d2d1dbb8f99a52
                                              • Opcode Fuzzy Hash: 3090d860a13c7fe33f254909679bd5bc03b33e4a06af2154f8d38c1f7023d56a
                                              • Instruction Fuzzy Hash: 33118231A003179BCF21EFBCA45416DBBB5EB58230B6504B9E80AD7246E735C9558BD1
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 68fb109ad10146b3ba480090e8a6f24deeaf98962d5cd61cd5ee641f776318c8
                                              • Instruction ID: a6c18af2f8bd4779819dc1a3d3efebcb455353446a8328e15579f394bbc7ee30
                                              • Opcode Fuzzy Hash: 68fb109ad10146b3ba480090e8a6f24deeaf98962d5cd61cd5ee641f776318c8
                                              • Instruction Fuzzy Hash: 7B110231A053048FDB05DF68EC44A8ABFB5FF96310F5581AAC8085F296E770DC09CBA2
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2687134865.00000000013BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013BD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_13bd000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dd2c54e641c636489e18f71c5e932094e1140b5f592d34fffac0146327057262
                                              • Instruction ID: 0e0dd8747b40b681931c84f0458ca3a9be76b86106556ad1f2a40d385337353b
                                              • Opcode Fuzzy Hash: dd2c54e641c636489e18f71c5e932094e1140b5f592d34fffac0146327057262
                                              • Instruction Fuzzy Hash: 1B11BB75504284CFCB12CF54D9C4B15BFA2FB84318F28C6AAD9494BA56C33AD44ACB62
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a0d2b96a773b78930d627e95c3800986806fdfda2d609657f7ff6022836f0c49
                                              • Instruction ID: 5c887a93e1b9d1222d3051f4796e167bc4023804e0405adf4fa41251e048b8d7
                                              • Opcode Fuzzy Hash: a0d2b96a773b78930d627e95c3800986806fdfda2d609657f7ff6022836f0c49
                                              • Instruction Fuzzy Hash: A4018031A002169BCF21EFB8A4541AEFBFAEB58220B650479D809E7301E735C945CBD1
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 114b3cd695e076eb3890bfa059683ece28356a132721ad5695fc9a5d50a330c7
                                              • Instruction ID: a8955e4a67a4414377d54621baecbfa07ca6009937a1340a2d2a55dd426c2fd0
                                              • Opcode Fuzzy Hash: 114b3cd695e076eb3890bfa059683ece28356a132721ad5695fc9a5d50a330c7
                                              • Instruction Fuzzy Hash: FC01B535A002048BDF04DF98D985B9ABB75FF84311F54C564C80C6F295EB70DD05CBA1
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6ae23999ec1f818c0e9001badc92de8a21ed1e7c7f8988ab2571758a8a5a0ed5
                                              • Instruction ID: cc301fdedc15bc51cb2b7c156f43606324b1893fbe4f3c1572c2d47858389abf
                                              • Opcode Fuzzy Hash: 6ae23999ec1f818c0e9001badc92de8a21ed1e7c7f8988ab2571758a8a5a0ed5
                                              • Instruction Fuzzy Hash: 69017130900209EFCB45EFA8EC60A9D7BF5FF81700B5045B9C404AB250EB386F45ABA1
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 057b8e862e9cd2ca37c83a89bd0fb880f81715844a48f52ce19d813b463b7bc7
                                              • Instruction ID: a5d6b10517ae272eacb3384015a20ea7331f326c40898fe8e5c908085a23e9f7
                                              • Opcode Fuzzy Hash: 057b8e862e9cd2ca37c83a89bd0fb880f81715844a48f52ce19d813b463b7bc7
                                              • Instruction Fuzzy Hash: E0F02B33A04111CFDF22CBA8A4941ACFFB1FA681317AE40D7D846DB211D325D51ACB51
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e123b120dd211a48b1313eb4c0d421ec0b23bd8fba36fbcfdbe6da910a430b70
                                              • Instruction ID: 3b2a8a5cb6daf0aaf07efdc9ee0f1e487f3c0249b20e211e223dfaa676413999
                                              • Opcode Fuzzy Hash: e123b120dd211a48b1313eb4c0d421ec0b23bd8fba36fbcfdbe6da910a430b70
                                              • Instruction Fuzzy Hash: 44F0C435B40514CFCB14DB68D598B6D77F2EF89721F2084A8E5069B3A4DB35AD02DF50
                                              Memory Dump Source
                                              • Source File: 0000000F.00000002.2689036900.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_15_2_1790000_zBzzGAdzqF.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5b25cf15dfc65e9605a85da444ce4eda4357c68469cc1daa4ec7765b25089634
                                              • Instruction ID: 63cfb441d224df2d31feee5c73a105e4d95aa769c7fe7f3da1dfa6936a9a570a
                                              • Opcode Fuzzy Hash: 5b25cf15dfc65e9605a85da444ce4eda4357c68469cc1daa4ec7765b25089634
                                              • Instruction Fuzzy Hash: 70F0EC30910209EFDB44EFA8ED90A9D7BB5FF80B04F504A79C405AB650EB396F45AB91