Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO P24-1100.exe

Overview

General Information

Sample name:PO P24-1100.exe
Analysis ID:1559494
MD5:d407b5bfa95d6549fceb3acd0a791c2b
SHA1:f368052bae8505671cbdbab47acfe5994dc14417
SHA256:11013cdd71339c3aac7041ef80912c8c03786f5967d58c539af0d560687089e8
Tags:AgentTeslaexeuser-xzx
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • PO P24-1100.exe (PID: 6768 cmdline: "C:\Users\user\Desktop\PO P24-1100.exe" MD5: D407B5BFA95D6549FCEB3ACD0A791C2B)
    • powershell.exe (PID: 4900 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2172 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • PO P24-1100.exe (PID: 2596 cmdline: "C:\Users\user\Desktop\PO P24-1100.exe" MD5: D407B5BFA95D6549FCEB3ACD0A791C2B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": "     *o9H+18Q4%;M     "}
SourceRuleDescriptionAuthorStrings
00000003.00000002.2944805908.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
    00000000.00000002.1732307986.0000000003D19000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000003.00000002.2947100789.0000000002971000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000003.00000002.2947100789.0000000002971000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: PO P24-1100.exe PID: 6768JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            0.2.PO P24-1100.exe.3f0a580.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              3.2.PO P24-1100.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.PO P24-1100.exe.3ee1560.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  0.2.PO P24-1100.exe.3f0a580.1.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.PO P24-1100.exe.3ee1560.3.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO P24-1100.exe", ParentImage: C:\Users\user\Desktop\PO P24-1100.exe, ParentProcessId: 6768, ParentProcessName: PO P24-1100.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe", ProcessId: 4900, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO P24-1100.exe", ParentImage: C:\Users\user\Desktop\PO P24-1100.exe, ParentProcessId: 6768, ParentProcessName: PO P24-1100.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe", ProcessId: 4900, ProcessName: powershell.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO P24-1100.exe", ParentImage: C:\Users\user\Desktop\PO P24-1100.exe, ParentProcessId: 6768, ParentProcessName: PO P24-1100.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe", ProcessId: 4900, ProcessName: powershell.exe
                      No Suricata rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: PO P24-1100.exeAvira: detected
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": " *o9H+18Q4%;M "}
                      Source: PO P24-1100.exeReversingLabs: Detection: 34%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: PO P24-1100.exeJoe Sandbox ML: detected
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: /log.tmp
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <br>[
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ]<br>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <br>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Time:
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <br>User Name:
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <br>Computer Name:
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <br>OSFullName:
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <br>CPU:
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <br>RAM:
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <br>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: IP Address:
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <br>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <hr>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: New
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: IP Address:
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: false
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: false
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: false
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: false
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: false
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: false
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: false
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: false
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: false
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: mail.mbarieservicesltd.com
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: saless@mbarieservicesltd.com
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: *o9H+18Q4%;M
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: iinfo@mbarieservicesltd.com
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: false
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: false
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: appdata
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: KTvkzEc
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: KTvkzEc.exe
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: KTvkzEc
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Type
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <br>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <hr>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <br>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <b>[
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ]</b> (
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: )<br>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {BACK}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {ALT+TAB}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {ALT+F4}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {TAB}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {ESC}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {Win}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {CAPSLOCK}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {KEYUP}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {KEYDOWN}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {KEYLEFT}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {KEYRIGHT}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {DEL}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {END}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {HOME}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {Insert}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {NumLock}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {PageDown}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {PageUp}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {ENTER}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {F1}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {F2}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {F3}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {F4}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {F5}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {F6}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {F7}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {F8}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {F9}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {F10}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {F11}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {F12}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: control
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {CTRL}
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: &amp;
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: &lt;
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: &gt;
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: &quot;
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <br><hr>Copied Text: <br>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <hr>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: logins
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: IE/Edge
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Windows Secure Note
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Windows Web Password Credential
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Windows Credential Picker Protector
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Web Credentials
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Windows Credentials
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Windows Domain Certificate Credential
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Windows Domain Password Credential
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Windows Extended Credential
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SchemaId
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: pResourceElement
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: pIdentityElement
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: pPackageSid
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: pAuthenticatorElement
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: IE/Edge
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: UC Browser
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: UCBrowser\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Login Data
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: journal
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: wow_logins
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Safari for Windows
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <array>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <dict>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <string>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: </string>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <string>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: </string>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <data>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: </data>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: -convert xml1 -s -o "
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \fixed_keychain.xml"
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Microsoft\Protect\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: credential
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: QQ Browser
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Tencent\QQBrowser\User Data
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Default\EncryptedStorage
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Profile
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \EncryptedStorage
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: entries
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: category
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: str3
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: str2
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: blob0
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: password_value
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: IncrediMail
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: PopPassword
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SmtpPassword
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\IncrediMail\Identities\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Accounts_New
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: PopPassword
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SmtpPassword
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SmtpServer
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: EmailAddress
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Eudora
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: current
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Settings
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SavePasswordText
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Settings
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ReturnAddress
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Falkon Browser
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \falkon\profiles\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: profiles.ini
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: profiles.ini
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \browsedata.db
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: autofill
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ClawsMail
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Claws-mail
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \clawsrc
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \clawsrc
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: passkey0
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: master_passphrase_salt=(.+)
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \accountrc
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: smtp_server
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: address
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: account
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \passwordstorerc
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: {(.*),(.*)}(.*)
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Flock Browser
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: APPDATA
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Flock\Browser\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: signons3.txt
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: DynDns
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ALLUSERSPROFILE
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Dyn\Updater\config.dyndns
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: username=
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: password=
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: https://account.dyn.com/
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: t6KzXhCh
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ALLUSERSPROFILE
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Dyn\Updater\daemon.cfg
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: global
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: accounts
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: account.
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: username
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: account.
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Psi/Psi+
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: name
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Psi/Psi+
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: APPDATA
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Psi\profiles
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: APPDATA
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Psi+\profiles
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \accounts.xml
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \accounts.xml
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: OpenVPN
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\OpenVPN-GUI\configs
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\OpenVPN-GUI\configs
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\OpenVPN-GUI\configs\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: username
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: auth-data
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: entropy
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: USERPROFILE
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \OpenVPN\config\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: remote
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: remote
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: NordVPN
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: NordVPN
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: NordVpn.exe*
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: user.config
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: //setting[@name='Username']/value
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: //setting[@name='Password']/value
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: NordVPN
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Private Internet Access
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: %ProgramW6432%
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Private Internet Access\data
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Private Internet Access\data
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \account.json
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: .*"username":"(.*?)"
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: .*"password":"(.*?)"
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Private Internet Access
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: privateinternetaccess.com
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: FileZilla
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: APPDATA
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \FileZilla\recentservers.xml
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: APPDATA
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \FileZilla\recentservers.xml
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <Server>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <Host>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <Host>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: </Host>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <Port>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: </Port>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <User>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <User>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: </User>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <Pass encoding="base64">
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <Pass encoding="base64">
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: </Pass>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <Pass>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <Pass encoding="base64">
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: </Pass>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: CoreFTP
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: User
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Host
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Port
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: hdfzpysvpzimorhk
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: WinSCP
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: HostName
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: UserName
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: PublicKeyFile
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: PortNumber
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: WinSCP
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ABCDEF
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Flash FXP
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: port
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: user
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: pass
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: quick.dat
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Sites.dat
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \FlashFXP\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \FlashFXP\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: FTP Navigator
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SystemDrive
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \FTP Navigator\Ftplist.txt
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Server
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: No Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: User
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SmartFTP
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: APPDATA
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: WS_FTP
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: appdata
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: HOST
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: PWD=
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: PWD=
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: FtpCommander
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SystemDrive
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SystemDrive
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SystemDrive
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \cftp\Ftplist.txt
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ;Password=
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ;User=
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ;Server=
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ;Port=
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ;Port=
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ;Password=
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ;User=
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ;Anonymous=
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: FTPGetter
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \FTPGetter\servers.xml
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <server>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <server_ip>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <server_ip>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: </server_ip>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <server_port>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: </server_port>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <server_user_name>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <server_user_name>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: </server_user_name>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <server_user_password>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: <server_user_password>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: </server_user_password>
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: FTPGetter
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: The Bat!
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: appdata
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \The Bat!
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Account.CFN
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Account.CFN
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Becky!
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: DataDir
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Folder.lst
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Mailbox.ini
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Account
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: PassWd
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Account
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SMTPServer
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Account
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: MailAddress
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Becky!
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Outlook
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Email
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: IMAP Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: POP3 Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: HTTP Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SMTP Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Email
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Email
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Email
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: IMAP Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: POP3 Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: HTTP Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SMTP Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Server
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Windows Mail App
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Email
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Server
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SchemaId
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: pResourceElement
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: pIdentityElement
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: pPackageSid
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: pAuthenticatorElement
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: syncpassword
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: mailoutgoing
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: FoxMail
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Executable
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: FoxmailPath
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Storage\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Storage\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \mail
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \mail
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Accounts\Account.rec0
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Accounts\Account.rec0
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Account.stg
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Account.stg
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: POP3Host
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SMTPHost
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: IncomingServer
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Account
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: MailAddress
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: POP3Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Opera Mail
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: opera:
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: PocoMail
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: appdata
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Pocomail\accounts.ini
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Email
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: POPPass
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SMTPPass
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SMTP
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: eM Client
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: eM Client\accounts.dat
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: eM Client
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Accounts
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: "Username":"
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: "Secret":"
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: "ProviderName":"
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: o6806642kbM7c5
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Mailbird
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SenderIdentities
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Accounts
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \Mailbird\Store\Store.db
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Server_Host
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Accounts
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Email
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Username
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: EncryptedPassword
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Mailbird
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: RealVNC 4.x
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: RealVNC 3.x
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SOFTWARE\RealVNC\vncserver
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: RealVNC 4.x
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: SOFTWARE\RealVNC\WinVNC4
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: RealVNC 3.x
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\ORL\WinVNC3
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: TightVNC
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\TightVNC\Server
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: TightVNC
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\TightVNC\Server
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: PasswordViewOnly
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: TightVNC ControlPassword
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\TightVNC\Server
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ControlPassword
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: TigerVNC
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\TigerVNC\Server
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Password
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: UltraVNC
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: passwd
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: UltraVNC
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: passwd2
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: UltraVNC
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ProgramFiles
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: passwd
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: UltraVNC
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ProgramFiles
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: passwd2
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: UltraVNC
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ProgramFiles
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: passwd
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: UltraVNC
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ProgramFiles
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: passwd2
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: UltraVNC
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: passwd
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: UltraVNC
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: passwd2
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: JDownloader 2.0
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: JDownloader 2.0\cfg
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: org.jdownloader.settings.AccountSettings.accounts.ejs
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: JDownloader 2.0\cfg
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: jd.controlling.authentication.AuthenticationControllerSettings.list.ejs
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Paltalk
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: Software\A.V.M.\Paltalk NG\common_settings\core\users\creds\
                      Source: 0.2.PO P24-1100.exe.3ee1560.3.unpackString decryptor: nickname
                      Source: PO P24-1100.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: PO P24-1100.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: xlCv.pdbSHA256 source: PO P24-1100.exe
                      Source: Binary string: xlCv.pdb source: PO P24-1100.exe
                      Source: unknownDNS traffic detected: query: mail.mbarieservicesltd.com replaycode: Server failure (2)
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: mail.mbarieservicesltd.com
                      Source: PO P24-1100.exe, 00000000.00000002.1731687325.0000000002D85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                      Source: PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 0_2_00E4DF640_2_00E4DF64
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 0_2_02BE7C080_2_02BE7C08
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 0_2_02BEA0B10_2_02BEA0B1
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 0_2_02BE001B0_2_02BE001B
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 0_2_02BE00400_2_02BE0040
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 0_2_051E9DE80_2_051E9DE8
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 0_2_051EACB00_2_051EACB0
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 0_2_051E646C0_2_051E646C
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 0_2_051E8B5A0_2_051E8B5A
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 0_2_0AA604480_2_0AA60448
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 0_2_0AA61AF80_2_0AA61AF8
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_00B141403_2_00B14140
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_00B14D583_2_00B14D58
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_00B144883_2_00B14488
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_062037F83_2_062037F8
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_062019A03_2_062019A0
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_0628C2203_2_0628C220
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_06289C233_2_06289C23
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_062800403_2_06280040
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_062894A03_2_062894A0
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_0628A8F83_2_0628A8F8
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_062871D03_2_062871D0
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_062839E83_2_062839E8
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_062839D83_2_062839D8
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_062800283_2_06280028
                      Source: PO P24-1100.exe, 00000000.00000002.1731687325.0000000002D85000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs PO P24-1100.exe
                      Source: PO P24-1100.exe, 00000000.00000002.1735468081.0000000005410000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs PO P24-1100.exe
                      Source: PO P24-1100.exe, 00000000.00000002.1738194356.00000000078E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs PO P24-1100.exe
                      Source: PO P24-1100.exe, 00000000.00000000.1696283657.000000000088E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamexlCv.exeB vs PO P24-1100.exe
                      Source: PO P24-1100.exe, 00000000.00000002.1732307986.0000000003D19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs PO P24-1100.exe
                      Source: PO P24-1100.exe, 00000000.00000002.1732307986.0000000003D19000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs PO P24-1100.exe
                      Source: PO P24-1100.exe, 00000000.00000002.1731687325.0000000002D11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs PO P24-1100.exe
                      Source: PO P24-1100.exe, 00000000.00000002.1725265698.0000000000E6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO P24-1100.exe
                      Source: PO P24-1100.exe, 00000003.00000002.2945839858.0000000000B28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO P24-1100.exe
                      Source: PO P24-1100.exe, 00000003.00000002.2944805908.000000000042C000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs PO P24-1100.exe
                      Source: PO P24-1100.exe, 00000003.00000002.2944994303.0000000000939000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs PO P24-1100.exe
                      Source: PO P24-1100.exeBinary or memory string: OriginalFilenamexlCv.exeB vs PO P24-1100.exe
                      Source: PO P24-1100.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: PO P24-1100.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.PO P24-1100.exe.3f0a580.1.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO P24-1100.exe.3f0a580.1.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.PO P24-1100.exe.3f0a580.1.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO P24-1100.exe.3f0a580.1.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO P24-1100.exe.3f0a580.1.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO P24-1100.exe.3f0a580.1.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO P24-1100.exe.3f0a580.1.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO P24-1100.exe.3f0a580.1.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, GfgLj0u1p422pIcK9p.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, ddSoI96RcnCUBdaTbJ.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, ddSoI96RcnCUBdaTbJ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, ddSoI96RcnCUBdaTbJ.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, GfgLj0u1p422pIcK9p.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, ddSoI96RcnCUBdaTbJ.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, ddSoI96RcnCUBdaTbJ.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, ddSoI96RcnCUBdaTbJ.csSecurity API names: _0020.AddAccessRule
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/6@4/0
                      Source: C:\Users\user\Desktop\PO P24-1100.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO P24-1100.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2172:120:WilError_03
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b1u0lg1i.cy2.ps1Jump to behavior
                      Source: PO P24-1100.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: PO P24-1100.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\PO P24-1100.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PO P24-1100.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PO P24-1100.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: PO P24-1100.exeReversingLabs: Detection: 34%
                      Source: unknownProcess created: C:\Users\user\Desktop\PO P24-1100.exe "C:\Users\user\Desktop\PO P24-1100.exe"
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe"
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess created: C:\Users\user\Desktop\PO P24-1100.exe "C:\Users\user\Desktop\PO P24-1100.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess created: C:\Users\user\Desktop\PO P24-1100.exe "C:\Users\user\Desktop\PO P24-1100.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\PO P24-1100.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: PO P24-1100.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: PO P24-1100.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: PO P24-1100.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: xlCv.pdbSHA256 source: PO P24-1100.exe
                      Source: Binary string: xlCv.pdb source: PO P24-1100.exe

                      Data Obfuscation

                      barindex
                      Source: PO P24-1100.exe, MainForm.cs.Net Code: InitializeComponent System.AppDomain.Load(byte[])
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, ddSoI96RcnCUBdaTbJ.cs.Net Code: jiECT8e0ky System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, ddSoI96RcnCUBdaTbJ.cs.Net Code: jiECT8e0ky System.Reflection.Assembly.Load(byte[])
                      Source: PO P24-1100.exeStatic PE information: 0x860193C9 [Sat Mar 30 09:58:33 2041 UTC]
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 0_2_051E70D2 push ecx; ret 0_2_051E710C
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_00B113A7 pushfd ; ret 3_2_00B11338
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_06286636 pushfd ; ret 3_2_06286639
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_0628711C pushfd ; ret 3_2_0628713B
                      Source: C:\Users\user\Desktop\PO P24-1100.exeCode function: 3_2_062865D0 pushfd ; ret 3_2_062865D2
                      Source: PO P24-1100.exeStatic PE information: section name: .text entropy: 7.978390411078157
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, rSiaS8zbHOupgjKMqr.csHigh entropy of concatenated method names: 'vWfirehODm', 'jA6iufCxLZ', 'zJki33yTgw', 'wAKidR0oHs', 'keUip2IID6', 'SPKiHhTapv', 'WtWitOJvvG', 'U9XiD6SXV6', 'YO9if7u0l8', 'T8riMNW7XA'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, CwLFuwCRtlry8Ihr9x.csHigh entropy of concatenated method names: 'qHdmKfgLj0', 'Tp4m622pIc', 'SRpmlgEOnf', 'hr7mVhGKTZ', 'r7EmoND5Im', 'KqSmvwIUNV', 'bCaAa0NvQOCbua33a6', 'q7ZvORV0IvkwtHYn0w', 'xD7mm2yeT4', 'IeHmEbYj5L'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, I8k69bBhcJk8XM1Loc.csHigh entropy of concatenated method names: 'ToString', 'vwtvImMaVm', 'E3kvpiNKfZ', 'NEKvxB3CcU', 'rjcvHH88mO', 'yLkvtaHX13', 'j0pvc71MSs', 'QcevWfBnEY', 'SGDvkscNNw', 'nh8vOtYTR9'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, eZQMwHWHjPXCvp9K5E.csHigh entropy of concatenated method names: 'lNYK4irwqR', 'RSUK5ioZ1J', 'bkZKbby2uO', 'DA7bwYGjjP', 'u5ZbzP5VOq', 'Xp8KnZFsVF', 'tKTKmTeINj', 'uZpKapVa5o', 'cCkKELp561', 'zqEKCrcPkf'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, AGRIdmacD34X8JqfqL.csHigh entropy of concatenated method names: 'XSPTt801l', 'cViFLpj7u', 'geerPxDsE', 'ltbPT9du2', 'iyX3397Ha', 'O5ZAuTYoY', 'd1SqBwAZ3Eg3GAVYBM', 'Ych46CBgaTsZOBKXiJ', 'kCf9ZyJOx', 'H0disVCcH'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, bf22oHyxkktqlUGEyJ.csHigh entropy of concatenated method names: 'NnfUoZbLFK', 'aPvULvT26m', 'n9KUUrWEmi', 'rJGUZwZ56h', 'MSLUhlMgN1', 'CgmUD14tyD', 'Dispose', 'UNQ94uZwYB', 'tbW9qT1SRh', 'HaM95u6ftn'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, GfgLj0u1p422pIcK9p.csHigh entropy of concatenated method names: 'S2pqs9Y6rc', 'ysJqYpXFU3', 'n9AqBLPmpN', 'isoq1NWyL6', 'AIJqjUBVUS', 'MhQqG25BBH', 'mWuqyDR912', 'CrdqQaNO6Q', 'OSLqNTcbKu', 'qvLqwi0W32'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, jHGFeomCxQWPJ8T99Yt.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'ser8UXtkPA', 'mAY8ieeN0o', 'Xd38Z3FFOg', 'd3G887OPJe', 'KPP8hKGoQJ', 'c4n80Wu3A2', 'Ol98DfflVN'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, qoISy3O3y1fmTU4uUb.csHigh entropy of concatenated method names: 'd0hKfUWQr3', 'wJ8KM8BZSk', 'eF9KTDIPiD', 'R96KFScDH9', 'l1QKef2qwu', 'qjXKrTJJme', 'JVXKPAYcKv', 'XguKueBCOe', 'EudK33r25X', 'SR3KAmyjq1'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, NC33vps37PRKumb6WG.csHigh entropy of concatenated method names: 'dO5ogxFJbk', 'wCGoSo3ViP', 'YqMos2STp7', 'Q88oYG1rCJ', 'wnYopfSv6c', 'eIwoxmSXlE', 'LkLoHwVUmY', 'bxuotJCvRk', 'Bsgoc8cjge', 'Le3oWse54f'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, giDPdkwbniocP5qfiG.csHigh entropy of concatenated method names: 'v7Vi5g9UQt', 'vfTiXb99OK', 'NZvibBcUf4', 'jBriKexCxl', 'n6kiU6qV9f', 'Wc9i6BkPYD', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, PidoDDqUDqWxXxx5PB.csHigh entropy of concatenated method names: 'Dispose', 'MtqmNlUGEy', 'NphapTLgBW', 'DYm0Tfo9uX', 'Q6emwUCR1k', 'eOemz6j3GH', 'ProcessDialogKey', 'iJLanTT9e5', 'Q1BamdKikT', 'sQYaaqiDPd'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, Lq1kpNmmQkyvFgE8dID.csHigh entropy of concatenated method names: 'g1PiwLUkgU', 'sPoizEdRUa', 'pOKZnYiKEs', 'AGxZm41Ucl', 'JMPZaMoGUD', 'g7nZE0hjOx', 'qcLZCAyfHS', 'i7EZ24cjrQ', 'CqnZ4NNYqd', 'ChsZqtSoFU'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, aOhgWcmndciGiypg5s2.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'qVoiI2ewNQ', 'SOTiSoSMdm', 's5LiJd5yn6', 'mRbisLqsIx', 'Q35iYAkRbq', 'DOjiBVIwVn', 'iERi1ExPeA'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, K93061JJd1VbooLmkd.csHigh entropy of concatenated method names: 'sCuRul3W2D', 'lccR3p91Gk', 'pHFRdvTPOm', 'iCqRpdYvfP', 'CDaRHpmMb8', 'qgwRtMZSvt', 'gRjRWf7JSH', 'xhSRkuGsMx', 'rrgRgSXWqB', 'n8URIcRCFZ'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, EfUtvJ13YEuCM8k0GW.csHigh entropy of concatenated method names: 'RRuLl7b829', 'CWILVrYmO5', 'ToString', 'HFWL477ofY', 'HG3LqhcIjU', 'UlEL5IwjHo', 'QQqLXPnMLd', 'MBQLb8dGhp', 'aAZLKV8kHd', 'cSiL6i9KMk'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, qTT9e5Ns1BdKikTiQY.csHigh entropy of concatenated method names: 'eyQUdVlWEG', 'iDhUpa5KFv', 'hgZUxCeBEg', 'KrlUHfanb2', 'PDsUtAgP0S', 'umgUcLYlgU', 'yjlUWLyZbH', 'QE1UkTu5ZK', 'wFVUOE9Clq', 'hEfUg9yFPU'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, ddSoI96RcnCUBdaTbJ.csHigh entropy of concatenated method names: 'XEcE2QuNpg', 'kIFE4SJ4Bi', 'LNJEqKJnht', 'ukEE5woaGL', 'qdZEX7wiAo', 'OABEb7GMyW', 'yGbEK6mr5B', 'WqFE6Qr3ee', 'RKmE7c2McU', 'LZiEl0OqGj'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, y9BhMB3RpgEOnf5r7h.csHigh entropy of concatenated method names: 'o0Z5FGeXan', 'hOb5rdIYCn', 'V345uHKepg', 'vgJ53nIh9b', 'Aho5o4yBBk', 'PmU5vWFHCw', 'OX75L3WVMM', 'XOy59F17ph', 'VBq5Ugo8rG', 'PgN5i7IPKt'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, hImcqSdwIUNV0IcXpy.csHigh entropy of concatenated method names: 'qM1b2sJC8x', 'GJqbqj0m7D', 'fODbXEKKbZ', 'nSsbKBUYtQ', 'IbAb6Bs7mF', 'z2LXjfppYp', 'DLxXGe3I1O', 'OxUXySQqP7', 'z7HXQOk4Ec', 'o7SXNJvPIs'
                      Source: 0.2.PO P24-1100.exe.78e0000.5.raw.unpack, k4P9W7GiW52QidbN6E.csHigh entropy of concatenated method names: 'IpILQ5NdoK', 'Rl7LwtT7BR', 'O0A9nKJJgb', 'LEJ9mK8eyc', 'RQ1LIygdRl', 'NsjLSmJHB4', 'KecLJP33hW', 'FEfLsa5MNY', 'p7ILYKLEM6', 'N3xLBMn5Vs'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, rSiaS8zbHOupgjKMqr.csHigh entropy of concatenated method names: 'vWfirehODm', 'jA6iufCxLZ', 'zJki33yTgw', 'wAKidR0oHs', 'keUip2IID6', 'SPKiHhTapv', 'WtWitOJvvG', 'U9XiD6SXV6', 'YO9if7u0l8', 'T8riMNW7XA'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, CwLFuwCRtlry8Ihr9x.csHigh entropy of concatenated method names: 'qHdmKfgLj0', 'Tp4m622pIc', 'SRpmlgEOnf', 'hr7mVhGKTZ', 'r7EmoND5Im', 'KqSmvwIUNV', 'bCaAa0NvQOCbua33a6', 'q7ZvORV0IvkwtHYn0w', 'xD7mm2yeT4', 'IeHmEbYj5L'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, I8k69bBhcJk8XM1Loc.csHigh entropy of concatenated method names: 'ToString', 'vwtvImMaVm', 'E3kvpiNKfZ', 'NEKvxB3CcU', 'rjcvHH88mO', 'yLkvtaHX13', 'j0pvc71MSs', 'QcevWfBnEY', 'SGDvkscNNw', 'nh8vOtYTR9'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, eZQMwHWHjPXCvp9K5E.csHigh entropy of concatenated method names: 'lNYK4irwqR', 'RSUK5ioZ1J', 'bkZKbby2uO', 'DA7bwYGjjP', 'u5ZbzP5VOq', 'Xp8KnZFsVF', 'tKTKmTeINj', 'uZpKapVa5o', 'cCkKELp561', 'zqEKCrcPkf'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, AGRIdmacD34X8JqfqL.csHigh entropy of concatenated method names: 'XSPTt801l', 'cViFLpj7u', 'geerPxDsE', 'ltbPT9du2', 'iyX3397Ha', 'O5ZAuTYoY', 'd1SqBwAZ3Eg3GAVYBM', 'Ych46CBgaTsZOBKXiJ', 'kCf9ZyJOx', 'H0disVCcH'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, bf22oHyxkktqlUGEyJ.csHigh entropy of concatenated method names: 'NnfUoZbLFK', 'aPvULvT26m', 'n9KUUrWEmi', 'rJGUZwZ56h', 'MSLUhlMgN1', 'CgmUD14tyD', 'Dispose', 'UNQ94uZwYB', 'tbW9qT1SRh', 'HaM95u6ftn'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, GfgLj0u1p422pIcK9p.csHigh entropy of concatenated method names: 'S2pqs9Y6rc', 'ysJqYpXFU3', 'n9AqBLPmpN', 'isoq1NWyL6', 'AIJqjUBVUS', 'MhQqG25BBH', 'mWuqyDR912', 'CrdqQaNO6Q', 'OSLqNTcbKu', 'qvLqwi0W32'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, jHGFeomCxQWPJ8T99Yt.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'ser8UXtkPA', 'mAY8ieeN0o', 'Xd38Z3FFOg', 'd3G887OPJe', 'KPP8hKGoQJ', 'c4n80Wu3A2', 'Ol98DfflVN'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, qoISy3O3y1fmTU4uUb.csHigh entropy of concatenated method names: 'd0hKfUWQr3', 'wJ8KM8BZSk', 'eF9KTDIPiD', 'R96KFScDH9', 'l1QKef2qwu', 'qjXKrTJJme', 'JVXKPAYcKv', 'XguKueBCOe', 'EudK33r25X', 'SR3KAmyjq1'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, NC33vps37PRKumb6WG.csHigh entropy of concatenated method names: 'dO5ogxFJbk', 'wCGoSo3ViP', 'YqMos2STp7', 'Q88oYG1rCJ', 'wnYopfSv6c', 'eIwoxmSXlE', 'LkLoHwVUmY', 'bxuotJCvRk', 'Bsgoc8cjge', 'Le3oWse54f'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, giDPdkwbniocP5qfiG.csHigh entropy of concatenated method names: 'v7Vi5g9UQt', 'vfTiXb99OK', 'NZvibBcUf4', 'jBriKexCxl', 'n6kiU6qV9f', 'Wc9i6BkPYD', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, PidoDDqUDqWxXxx5PB.csHigh entropy of concatenated method names: 'Dispose', 'MtqmNlUGEy', 'NphapTLgBW', 'DYm0Tfo9uX', 'Q6emwUCR1k', 'eOemz6j3GH', 'ProcessDialogKey', 'iJLanTT9e5', 'Q1BamdKikT', 'sQYaaqiDPd'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, Lq1kpNmmQkyvFgE8dID.csHigh entropy of concatenated method names: 'g1PiwLUkgU', 'sPoizEdRUa', 'pOKZnYiKEs', 'AGxZm41Ucl', 'JMPZaMoGUD', 'g7nZE0hjOx', 'qcLZCAyfHS', 'i7EZ24cjrQ', 'CqnZ4NNYqd', 'ChsZqtSoFU'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, aOhgWcmndciGiypg5s2.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'qVoiI2ewNQ', 'SOTiSoSMdm', 's5LiJd5yn6', 'mRbisLqsIx', 'Q35iYAkRbq', 'DOjiBVIwVn', 'iERi1ExPeA'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, K93061JJd1VbooLmkd.csHigh entropy of concatenated method names: 'sCuRul3W2D', 'lccR3p91Gk', 'pHFRdvTPOm', 'iCqRpdYvfP', 'CDaRHpmMb8', 'qgwRtMZSvt', 'gRjRWf7JSH', 'xhSRkuGsMx', 'rrgRgSXWqB', 'n8URIcRCFZ'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, EfUtvJ13YEuCM8k0GW.csHigh entropy of concatenated method names: 'RRuLl7b829', 'CWILVrYmO5', 'ToString', 'HFWL477ofY', 'HG3LqhcIjU', 'UlEL5IwjHo', 'QQqLXPnMLd', 'MBQLb8dGhp', 'aAZLKV8kHd', 'cSiL6i9KMk'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, qTT9e5Ns1BdKikTiQY.csHigh entropy of concatenated method names: 'eyQUdVlWEG', 'iDhUpa5KFv', 'hgZUxCeBEg', 'KrlUHfanb2', 'PDsUtAgP0S', 'umgUcLYlgU', 'yjlUWLyZbH', 'QE1UkTu5ZK', 'wFVUOE9Clq', 'hEfUg9yFPU'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, ddSoI96RcnCUBdaTbJ.csHigh entropy of concatenated method names: 'XEcE2QuNpg', 'kIFE4SJ4Bi', 'LNJEqKJnht', 'ukEE5woaGL', 'qdZEX7wiAo', 'OABEb7GMyW', 'yGbEK6mr5B', 'WqFE6Qr3ee', 'RKmE7c2McU', 'LZiEl0OqGj'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, y9BhMB3RpgEOnf5r7h.csHigh entropy of concatenated method names: 'o0Z5FGeXan', 'hOb5rdIYCn', 'V345uHKepg', 'vgJ53nIh9b', 'Aho5o4yBBk', 'PmU5vWFHCw', 'OX75L3WVMM', 'XOy59F17ph', 'VBq5Ugo8rG', 'PgN5i7IPKt'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, hImcqSdwIUNV0IcXpy.csHigh entropy of concatenated method names: 'qM1b2sJC8x', 'GJqbqj0m7D', 'fODbXEKKbZ', 'nSsbKBUYtQ', 'IbAb6Bs7mF', 'z2LXjfppYp', 'DLxXGe3I1O', 'OxUXySQqP7', 'z7HXQOk4Ec', 'o7SXNJvPIs'
                      Source: 0.2.PO P24-1100.exe.3f4eb80.2.raw.unpack, k4P9W7GiW52QidbN6E.csHigh entropy of concatenated method names: 'IpILQ5NdoK', 'Rl7LwtT7BR', 'O0A9nKJJgb', 'LEJ9mK8eyc', 'RQ1LIygdRl', 'NsjLSmJHB4', 'KecLJP33hW', 'FEfLsa5MNY', 'p7ILYKLEM6', 'N3xLBMn5Vs'

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: PO P24-1100.exe PID: 6768, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\PO P24-1100.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\PO P24-1100.exeMemory allocated: E40000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeMemory allocated: 2D10000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeMemory allocated: 1030000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeMemory allocated: 7EE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeMemory allocated: 8EE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeMemory allocated: 90A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeMemory allocated: A0A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeMemory allocated: B10000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeMemory allocated: 2970000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeMemory allocated: 26D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6627Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3106Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeWindow / User API: threadDelayed 2644Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeWindow / User API: threadDelayed 7204Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6844Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4960Thread sleep time: -11068046444225724s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 1460Thread sleep count: 2644 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 1460Thread sleep count: 7204 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -24903104499507879s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -99872s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -99763s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -99617s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -99503s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -99248s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -99134s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -99030s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -98922s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -98812s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -98703s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -98594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -98484s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -98375s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -98265s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -98156s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -98047s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -97937s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -97828s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -97719s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -97594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -97484s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -97375s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -97265s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -97156s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -97047s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -96937s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -96828s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -96718s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -96609s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -96500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -96390s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -96281s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -96172s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -96047s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -95937s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -95828s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -95719s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -95594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -95484s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -95375s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -95266s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -95156s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -95047s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -94938s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -94813s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -94688s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -94578s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exe TID: 6532Thread sleep time: -94469s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\PO P24-1100.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PO P24-1100.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 99872Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 99763Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 99617Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 99503Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 99248Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 99134Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 99030Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 98922Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 98812Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 98703Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 98594Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 98484Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 98375Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 98265Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 98156Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 98047Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 97937Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 97828Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 97719Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 97594Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 97484Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 97375Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 97265Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 97156Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 97047Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 96937Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 96828Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 96718Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 96609Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 96500Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 96390Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 96281Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 96172Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 96047Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 95937Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 95828Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 95719Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 95594Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 95484Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 95375Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 95266Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 95156Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 95047Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 94938Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 94813Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 94688Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 94578Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeThread delayed: delay time: 94469Jump to behavior
                      Source: PO P24-1100.exe, 00000000.00000002.1725328271.0000000000EA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                      Source: PO P24-1100.exe, 00000000.00000002.1725328271.0000000000EA9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8G
                      Source: PO P24-1100.exe, 00000003.00000002.2950207081.0000000005D60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe"
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeProcess created: C:\Users\user\Desktop\PO P24-1100.exe "C:\Users\user\Desktop\PO P24-1100.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Users\user\Desktop\PO P24-1100.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Users\user\Desktop\PO P24-1100.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000003.00000002.2947100789.0000000002971000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO P24-1100.exe PID: 2596, type: MEMORYSTR
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.PO P24-1100.exe.3f0a580.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.PO P24-1100.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO P24-1100.exe.3ee1560.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO P24-1100.exe.3f0a580.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO P24-1100.exe.3ee1560.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.2944805908.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1732307986.0000000003D19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Users\user\Desktop\PO P24-1100.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Users\user\Desktop\PO P24-1100.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 00000003.00000002.2947100789.0000000002971000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO P24-1100.exe PID: 2596, type: MEMORYSTR
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 00000003.00000002.2947100789.0000000002971000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO P24-1100.exe PID: 2596, type: MEMORYSTR
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.PO P24-1100.exe.3f0a580.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.PO P24-1100.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO P24-1100.exe.3ee1560.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO P24-1100.exe.3f0a580.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO P24-1100.exe.3ee1560.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.2944805908.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1732307986.0000000003D19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Masquerading
                      2
                      OS Credential Dumping
                      111
                      Security Software Discovery
                      Remote Services1
                      Email Collection
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      1
                      Credentials in Registry
                      1
                      Process Discovery
                      Remote Desktop Protocol11
                      Archive Collected Data
                      1
                      Non-Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)141
                      Virtualization/Sandbox Evasion
                      Security Account Manager141
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin Shares2
                      Data from Local System
                      1
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                      Process Injection
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      File and Directory Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                      Obfuscated Files or Information
                      Cached Domain Credentials24
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                      Software Packing
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      Timestomp
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      PO P24-1100.exe34%ReversingLabs
                      PO P24-1100.exe100%AviraHEUR/AGEN.1305393
                      PO P24-1100.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.mbarieservicesltd.com
                      unknown
                      unknownfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.apache.org/licenses/LICENSE-2.0PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designersGPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designers/?PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/bThePO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers?PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.tiro.comPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fontbureau.com/designersPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.goodfont.co.krPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.carterandcone.comlPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.sajatypeworks.comPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.typography.netDPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.fontbureau.com/designers/cabarga.htmlNPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.founder.com.cn/cn/cThePO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.galapagosdesign.com/staff/dennis.htmPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.founder.com.cn/cnPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.fontbureau.com/designers/frere-user.htmlPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.jiyu-kobo.co.jp/PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.galapagosdesign.com/DPleasePO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.fontbureau.com/designers8PO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.fonts.comPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.sandoll.co.krPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.urwpp.deDPleasePO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.zhongyicts.com.cnPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePO P24-1100.exe, 00000000.00000002.1731687325.0000000002D85000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://www.sakkal.comPO P24-1100.exe, 00000000.00000002.1737153746.00000000071B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            No contacted IP infos
                                                                            Joe Sandbox version:41.0.0 Charoite
                                                                            Analysis ID:1559494
                                                                            Start date and time:2024-11-20 15:55:08 +01:00
                                                                            Joe Sandbox product:CloudBasic
                                                                            Overall analysis duration:0h 5m 44s
                                                                            Hypervisor based Inspection enabled:false
                                                                            Report type:full
                                                                            Cookbook file name:default.jbs
                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                            Number of analysed new started processes analysed:9
                                                                            Number of new started drivers analysed:0
                                                                            Number of existing processes analysed:0
                                                                            Number of existing drivers analysed:0
                                                                            Number of injected processes analysed:0
                                                                            Technologies:
                                                                            • HCA enabled
                                                                            • EGA enabled
                                                                            • AMSI enabled
                                                                            Analysis Mode:default
                                                                            Analysis stop reason:Timeout
                                                                            Sample name:PO P24-1100.exe
                                                                            Detection:MAL
                                                                            Classification:mal100.troj.spyw.evad.winEXE@6/6@4/0
                                                                            EGA Information:
                                                                            • Successful, ratio: 100%
                                                                            HCA Information:
                                                                            • Successful, ratio: 99%
                                                                            • Number of executed functions: 73
                                                                            • Number of non-executed functions: 17
                                                                            Cookbook Comments:
                                                                            • Found application associated with file extension: .exe
                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                            • Report size getting too big, too many NtCreateKey calls found.
                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                            • VT rate limit hit for: PO P24-1100.exe
                                                                            TimeTypeDescription
                                                                            09:56:03API Interceptor58x Sleep call for process: PO P24-1100.exe modified
                                                                            09:56:05API Interceptor20x Sleep call for process: powershell.exe modified
                                                                            No context
                                                                            No context
                                                                            No context
                                                                            No context
                                                                            No context
                                                                            Process:C:\Users\user\Desktop\PO P24-1100.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1216
                                                                            Entropy (8bit):5.34331486778365
                                                                            Encrypted:false
                                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                            Malicious:true
                                                                            Reputation:high, very likely benign file
                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):1172
                                                                            Entropy (8bit):5.357042452875322
                                                                            Encrypted:false
                                                                            SSDEEP:24:3CytZWSKco4KmBs4RPT6BmFoUebIKomjKcmZ9t7J0gt/NKIl9r6dj:yyjWSU4y4RQmFoUeWmfmZ9tK8NDE
                                                                            MD5:475D428E7231D005EEA5DB556DBED03F
                                                                            SHA1:3D603ED4280E0017D1BEB124D68183F8283B5C22
                                                                            SHA-256:1314488A930843A7E1A003F2E7C1D883DB44ADEC26AC1CA096FE8DC1B4B180F5
                                                                            SHA-512:7181BDCE6DA8DA8AFD3A973BB2B0BA470468EFF32FFB338DB2662FEFA1A7848ACD87C319706B95401EA18DC873CA098DC722EA6F8B2FD04F1AABD2AEBEA97CF9
                                                                            Malicious:false
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview:@...e.................................^..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):60
                                                                            Entropy (8bit):4.038920595031593
                                                                            Encrypted:false
                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                            Malicious:false
                                                                            Reputation:high, very likely benign file
                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):60
                                                                            Entropy (8bit):4.038920595031593
                                                                            Encrypted:false
                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                            Malicious:false
                                                                            Reputation:high, very likely benign file
                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):60
                                                                            Entropy (8bit):4.038920595031593
                                                                            Encrypted:false
                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                            Malicious:false
                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):60
                                                                            Entropy (8bit):4.038920595031593
                                                                            Encrypted:false
                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                            Malicious:false
                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                            Entropy (8bit):7.970676437879018
                                                                            TrID:
                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                            • DOS Executable Generic (2002/1) 0.01%
                                                                            File name:PO P24-1100.exe
                                                                            File size:568'832 bytes
                                                                            MD5:d407b5bfa95d6549fceb3acd0a791c2b
                                                                            SHA1:f368052bae8505671cbdbab47acfe5994dc14417
                                                                            SHA256:11013cdd71339c3aac7041ef80912c8c03786f5967d58c539af0d560687089e8
                                                                            SHA512:bbf9d6687514842896fcdf6b29f12500c7b8c323e4f267ff3de3a328df4b4d2211cca320f653c4f01fcf3f766a0d3e9cd831a9de6691601e00a4cbe464a2075e
                                                                            SSDEEP:12288:nZQAgFdWlNesWPjcOfoahUHUMtK/Ib529tteCMXRaSykEHHPxjhWm:CAgyQPjcOfph0SELBaSyXPxUm
                                                                            TLSH:F3C422195A687759D0BE6B3EA5400E5D03F1B1267461E3C6CE88E2ECBF22B405A01FF7
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............r.... ........@.. ....................... ............@................................
                                                                            Icon Hash:90cececece8e8eb0
                                                                            Entrypoint:0x48c172
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:false
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                            Time Stamp:0x860193C9 [Sat Mar 30 09:58:33 2041 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:4
                                                                            OS Version Minor:0
                                                                            File Version Major:4
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:4
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                            Instruction
                                                                            jmp dword ptr [00402000h]
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x8c11f0x4f.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x8e0000x634.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x900000xc.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x8a8e00x70.text
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x20000x8a1780x8a2003a180f23f9f6f087ceedbe08f2140356False0.975751201923077data7.978390411078157IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .rsrc0x8e0000x6340x8003022543506350fa934ef99a8d5457f02False0.34033203125data3.478651345247546IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .reloc0x900000xc0x2005d4fdcc0798861b774b37db12b05ccceFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                            RT_VERSION0x8e0900x3a4data0.4206008583690987
                                                                            RT_MANIFEST0x8e4440x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                            DLLImport
                                                                            mscoree.dll_CorExeMain
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Nov 20, 2024 15:56:07.663705111 CET5364453192.168.2.41.1.1.1
                                                                            Nov 20, 2024 15:56:08.658009052 CET5364453192.168.2.41.1.1.1
                                                                            Nov 20, 2024 15:56:09.657573938 CET5364453192.168.2.41.1.1.1
                                                                            Nov 20, 2024 15:56:11.673161030 CET5364453192.168.2.41.1.1.1
                                                                            Nov 20, 2024 15:56:13.931987047 CET53536441.1.1.1192.168.2.4
                                                                            Nov 20, 2024 15:56:13.932028055 CET53536441.1.1.1192.168.2.4
                                                                            Nov 20, 2024 15:56:13.932060957 CET53536441.1.1.1192.168.2.4
                                                                            Nov 20, 2024 15:56:13.932089090 CET53536441.1.1.1192.168.2.4
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                            Nov 20, 2024 15:56:07.663705111 CET192.168.2.41.1.1.10x8483Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                                                            Nov 20, 2024 15:56:08.658009052 CET192.168.2.41.1.1.10x8483Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                                                            Nov 20, 2024 15:56:09.657573938 CET192.168.2.41.1.1.10x8483Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                                                            Nov 20, 2024 15:56:11.673161030 CET192.168.2.41.1.1.10x8483Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                            Nov 20, 2024 15:56:13.931987047 CET1.1.1.1192.168.2.40x8483Server failure (2)mail.mbarieservicesltd.comnonenoneA (IP address)IN (0x0001)false
                                                                            Nov 20, 2024 15:56:13.932028055 CET1.1.1.1192.168.2.40x8483Server failure (2)mail.mbarieservicesltd.comnonenoneA (IP address)IN (0x0001)false
                                                                            Nov 20, 2024 15:56:13.932060957 CET1.1.1.1192.168.2.40x8483Server failure (2)mail.mbarieservicesltd.comnonenoneA (IP address)IN (0x0001)false
                                                                            Nov 20, 2024 15:56:13.932089090 CET1.1.1.1192.168.2.40x8483Server failure (2)mail.mbarieservicesltd.comnonenoneA (IP address)IN (0x0001)false

                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            Click to dive into process behavior distribution

                                                                            Click to jump to process

                                                                            Target ID:0
                                                                            Start time:09:56:02
                                                                            Start date:20/11/2024
                                                                            Path:C:\Users\user\Desktop\PO P24-1100.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\Desktop\PO P24-1100.exe"
                                                                            Imagebase:0x800000
                                                                            File size:568'832 bytes
                                                                            MD5 hash:D407B5BFA95D6549FCEB3ACD0A791C2B
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.1732307986.0000000003D19000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low
                                                                            Has exited:true

                                                                            Target ID:2
                                                                            Start time:09:56:04
                                                                            Start date:20/11/2024
                                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO P24-1100.exe"
                                                                            Imagebase:0x540000
                                                                            File size:433'152 bytes
                                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:3
                                                                            Start time:09:56:04
                                                                            Start date:20/11/2024
                                                                            Path:C:\Users\user\Desktop\PO P24-1100.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\Desktop\PO P24-1100.exe"
                                                                            Imagebase:0x4f0000
                                                                            File size:568'832 bytes
                                                                            MD5 hash:D407B5BFA95D6549FCEB3ACD0A791C2B
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000002.2944805908.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2947100789.0000000002971000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2947100789.0000000002971000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low
                                                                            Has exited:false

                                                                            Target ID:4
                                                                            Start time:09:56:05
                                                                            Start date:20/11/2024
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff7699e0000
                                                                            File size:862'208 bytes
                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Reset < >

                                                                              Execution Graph

                                                                              Execution Coverage:8.6%
                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                              Signature Coverage:0%
                                                                              Total number of Nodes:94
                                                                              Total number of Limit Nodes:10
                                                                              execution_graph 41390 e4d3c0 41391 e4d406 GetCurrentProcess 41390->41391 41393 e4d451 41391->41393 41394 e4d458 GetCurrentThread 41391->41394 41393->41394 41395 e4d495 GetCurrentProcess 41394->41395 41396 e4d48e 41394->41396 41397 e4d4cb 41395->41397 41396->41395 41398 e4d4f3 GetCurrentThreadId 41397->41398 41399 e4d524 41398->41399 41287 dbd01c 41288 dbd034 41287->41288 41289 dbd08e 41288->41289 41294 2be0abc 41288->41294 41303 2be1e97 41288->41303 41307 2be2c08 41288->41307 41316 2be1ea8 41288->41316 41295 2be0ac7 41294->41295 41296 2be2c79 41295->41296 41298 2be2c69 41295->41298 41336 2be0be4 41296->41336 41320 2be2e6c 41298->41320 41326 2be2d91 41298->41326 41331 2be2da0 41298->41331 41299 2be2c77 41304 2be1ece 41303->41304 41305 2be0abc CallWindowProcW 41304->41305 41306 2be1eef 41305->41306 41306->41289 41310 2be2c45 41307->41310 41308 2be2c79 41309 2be0be4 CallWindowProcW 41308->41309 41312 2be2c77 41309->41312 41310->41308 41311 2be2c69 41310->41311 41313 2be2e6c CallWindowProcW 41311->41313 41314 2be2da0 CallWindowProcW 41311->41314 41315 2be2d91 CallWindowProcW 41311->41315 41312->41312 41313->41312 41314->41312 41315->41312 41317 2be1ece 41316->41317 41318 2be0abc CallWindowProcW 41317->41318 41319 2be1eef 41318->41319 41319->41289 41321 2be2e2a 41320->41321 41322 2be2e7a 41320->41322 41340 2be2e58 41321->41340 41343 2be2e47 41321->41343 41323 2be2e40 41323->41299 41327 2be2da0 41326->41327 41329 2be2e58 CallWindowProcW 41327->41329 41330 2be2e47 CallWindowProcW 41327->41330 41328 2be2e40 41328->41299 41329->41328 41330->41328 41333 2be2db4 41331->41333 41332 2be2e40 41332->41299 41334 2be2e58 CallWindowProcW 41333->41334 41335 2be2e47 CallWindowProcW 41333->41335 41334->41332 41335->41332 41337 2be0bef 41336->41337 41338 2be435a CallWindowProcW 41337->41338 41339 2be4309 41337->41339 41338->41339 41339->41299 41341 2be2e69 41340->41341 41348 2be4291 41340->41348 41341->41323 41344 2be2e52 41343->41344 41345 2be2e43 41343->41345 41346 2be2e69 41344->41346 41347 2be4291 CallWindowProcW 41344->41347 41345->41323 41346->41323 41347->41346 41349 2be0be4 CallWindowProcW 41348->41349 41350 2be42aa 41349->41350 41350->41341 41351 e44668 41352 e4467a 41351->41352 41353 e44686 41352->41353 41355 e44778 41352->41355 41356 e4479d 41355->41356 41360 e44888 41356->41360 41364 e44879 41356->41364 41361 e448af 41360->41361 41363 e4498c 41361->41363 41368 e444c4 41361->41368 41365 e448af 41364->41365 41366 e4498c 41365->41366 41367 e444c4 CreateActCtxA 41365->41367 41367->41366 41369 e45918 CreateActCtxA 41368->41369 41371 e459db 41369->41371 41376 e4b038 41377 e4b047 41376->41377 41380 e4b120 41376->41380 41385 e4b130 41376->41385 41381 e4b164 41380->41381 41382 e4b141 41380->41382 41381->41377 41382->41381 41383 e4b368 GetModuleHandleW 41382->41383 41384 e4b395 41383->41384 41384->41377 41386 e4b164 41385->41386 41387 e4b141 41385->41387 41386->41377 41387->41386 41388 e4b368 GetModuleHandleW 41387->41388 41389 e4b395 41388->41389 41389->41377 41400 e4d608 DuplicateHandle 41401 e4d69e 41400->41401 41372 2be1cf0 41373 2be1d58 CreateWindowExW 41372->41373 41375 2be1e14 41373->41375
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1735051996.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_51e0000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (o^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4|cq$4|cq$$^q
                                                                              • API String ID: 0-2723476363
                                                                              • Opcode ID: b3dd5c4e3b9c66fd82641561e1e3144899ade5b4b28d107990cc5670566daa87
                                                                              • Instruction ID: dbe99e0f0d57aefeec2069deb7c67fbbd1db03bc90a65abfdfe1e20263e62747
                                                                              • Opcode Fuzzy Hash: b3dd5c4e3b9c66fd82641561e1e3144899ade5b4b28d107990cc5670566daa87
                                                                              • Instruction Fuzzy Hash: F243D874A046198FCB24DF68C898A9DBBB2BF49314F1585D9E519AB361CB30EDC1CF90
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1735051996.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_51e0000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (o^q$(o^q$,bq$,bq$Hbq
                                                                              • API String ID: 0-3486158592
                                                                              • Opcode ID: 38ef38ebcbc3e221491d645e233d4fad8bd9e4eb392b388d32777df23b1e2922
                                                                              • Instruction ID: 6e59d931903484b97a249ef54f699fa00062c906cfaf3b650c924a8c5500090d
                                                                              • Opcode Fuzzy Hash: 38ef38ebcbc3e221491d645e233d4fad8bd9e4eb392b388d32777df23b1e2922
                                                                              • Instruction Fuzzy Hash: 53525035B006159FCB18DF69C498A6EBBF2BF89711F158169E806DB3A1DB31EC41CB90
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1739718314.000000000AA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA60000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_aa60000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c4609822df91313c860fb51984d6fc0265e91f954612c010fdbbb847f55f29dd
                                                                              • Instruction ID: 2af043634e387a42a2c6caf4c56f1a77450125a2f7f72bf21ced7766c5786296
                                                                              • Opcode Fuzzy Hash: c4609822df91313c860fb51984d6fc0265e91f954612c010fdbbb847f55f29dd
                                                                              • Instruction Fuzzy Hash: 94329B71B012048FDB28DF69D550BAEBBF6AF89300F1484A9E546AB391CB35ED81CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1731582985.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2be0000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7ac868be219b0d6c16b32c780326cef36dd30f26fdf16906c0c8a5d9bd6298e5
                                                                              • Instruction ID: 79a2067a15172ed16e25c7b63b7e2e71b9527cd9ddf93b9d8119359449f7d6f6
                                                                              • Opcode Fuzzy Hash: 7ac868be219b0d6c16b32c780326cef36dd30f26fdf16906c0c8a5d9bd6298e5
                                                                              • Instruction Fuzzy Hash: 85524930A003558FCB14DF28C844B99B7F2EF89314F2586E9D5596F3A2DB71A986CF80
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1731582985.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2be0000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 59e9114523b995741595b00f3cbf325af866f10d29515b37346704d2aa8553d8
                                                                              • Instruction ID: 874b180bf8713d328af0e799e212fe2d06b3f35fefb0f2997d9365e9d591a06c
                                                                              • Opcode Fuzzy Hash: 59e9114523b995741595b00f3cbf325af866f10d29515b37346704d2aa8553d8
                                                                              • Instruction Fuzzy Hash: 82524930A007558FCB14DF28C844B99B7F2EF85314F2586E9D5596F3A2DB71AA86CF80

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1064 e4d3b0-e4d44f GetCurrentProcess 1069 e4d451-e4d457 1064->1069 1070 e4d458-e4d48c GetCurrentThread 1064->1070 1069->1070 1071 e4d495-e4d4c9 GetCurrentProcess 1070->1071 1072 e4d48e-e4d494 1070->1072 1073 e4d4d2-e4d4ed call e4d590 1071->1073 1074 e4d4cb-e4d4d1 1071->1074 1072->1071 1078 e4d4f3-e4d522 GetCurrentThreadId 1073->1078 1074->1073 1079 e4d524-e4d52a 1078->1079 1080 e4d52b-e4d58d 1078->1080 1079->1080
                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32 ref: 00E4D43E
                                                                              • GetCurrentThread.KERNEL32 ref: 00E4D47B
                                                                              • GetCurrentProcess.KERNEL32 ref: 00E4D4B8
                                                                              • GetCurrentThreadId.KERNEL32 ref: 00E4D511
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1725221236.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e40000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: Current$ProcessThread
                                                                              • String ID: sLMs
                                                                              • API String ID: 2063062207-2912269572
                                                                              • Opcode ID: e23dbb8df445e5fe09e7214c9e429e8b7ad0a46bd2f485789c178abe51de8ef5
                                                                              • Instruction ID: 07555377eb73baec369995d6e523179035bfdcbb17d81c34fdccbb3252ce1826
                                                                              • Opcode Fuzzy Hash: e23dbb8df445e5fe09e7214c9e429e8b7ad0a46bd2f485789c178abe51de8ef5
                                                                              • Instruction Fuzzy Hash: E05167B0D007498FDB14DFAAD988B9EBBF1EF88314F208459E019B7390DB746944CB65

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1087 e4d3c0-e4d44f GetCurrentProcess 1091 e4d451-e4d457 1087->1091 1092 e4d458-e4d48c GetCurrentThread 1087->1092 1091->1092 1093 e4d495-e4d4c9 GetCurrentProcess 1092->1093 1094 e4d48e-e4d494 1092->1094 1095 e4d4d2-e4d4ed call e4d590 1093->1095 1096 e4d4cb-e4d4d1 1093->1096 1094->1093 1100 e4d4f3-e4d522 GetCurrentThreadId 1095->1100 1096->1095 1101 e4d524-e4d52a 1100->1101 1102 e4d52b-e4d58d 1100->1102 1101->1102
                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32 ref: 00E4D43E
                                                                              • GetCurrentThread.KERNEL32 ref: 00E4D47B
                                                                              • GetCurrentProcess.KERNEL32 ref: 00E4D4B8
                                                                              • GetCurrentThreadId.KERNEL32 ref: 00E4D511
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1725221236.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e40000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: Current$ProcessThread
                                                                              • String ID: sLMs
                                                                              • API String ID: 2063062207-2912269572
                                                                              • Opcode ID: 67b85509b161c91ee54ef096ba06bc5d5ec8a34ba76f1046f2b498ad9883dc17
                                                                              • Instruction ID: 89eb86de9d043628a3b30fccb8beddb8c4e73528e82540569bbbdf4f86fdce94
                                                                              • Opcode Fuzzy Hash: 67b85509b161c91ee54ef096ba06bc5d5ec8a34ba76f1046f2b498ad9883dc17
                                                                              • Instruction Fuzzy Hash: 785164B0D007498FDB14DFAAD988B9EBBF1EF88314F208459E019B7390DB746984CB65

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1342 2be1ce4-2be1d56 1344 2be1d58-2be1d5e 1342->1344 1345 2be1d61-2be1d68 1342->1345 1344->1345 1346 2be1d6a-2be1d70 1345->1346 1347 2be1d73-2be1dab 1345->1347 1346->1347 1348 2be1db3-2be1e12 CreateWindowExW 1347->1348 1349 2be1e1b-2be1e53 1348->1349 1350 2be1e14-2be1e1a 1348->1350 1354 2be1e55-2be1e58 1349->1354 1355 2be1e60 1349->1355 1350->1349 1354->1355 1356 2be1e61 1355->1356 1356->1356
                                                                              APIs
                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02BE1E02
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1731582985.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2be0000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: CreateWindow
                                                                              • String ID: sLMs$sLMs
                                                                              • API String ID: 716092398-1106228246
                                                                              • Opcode ID: 61a8c46932ae566b81456015fa4397cf40ed8a6ede462f3e41d8d8b72e9c2684
                                                                              • Instruction ID: 59beaac77744d930e9f315ffa49b844591f716d17e0f51cb452e4e5987b96aab
                                                                              • Opcode Fuzzy Hash: 61a8c46932ae566b81456015fa4397cf40ed8a6ede462f3e41d8d8b72e9c2684
                                                                              • Instruction Fuzzy Hash: F051D1B1D103099FDF14CFA9C984ADEBBB5FF48714F24816AE819AB210D7719845CF90

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1357 2be1cf0-2be1d56 1358 2be1d58-2be1d5e 1357->1358 1359 2be1d61-2be1d68 1357->1359 1358->1359 1360 2be1d6a-2be1d70 1359->1360 1361 2be1d73-2be1e12 CreateWindowExW 1359->1361 1360->1361 1363 2be1e1b-2be1e53 1361->1363 1364 2be1e14-2be1e1a 1361->1364 1368 2be1e55-2be1e58 1363->1368 1369 2be1e60 1363->1369 1364->1363 1368->1369 1370 2be1e61 1369->1370 1370->1370
                                                                              APIs
                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02BE1E02
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1731582985.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2be0000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: CreateWindow
                                                                              • String ID: sLMs$sLMs
                                                                              • API String ID: 716092398-1106228246
                                                                              • Opcode ID: 4c4df94081603a94330b2dc8fd7c43b1fa58b6f70fe7fe48c85d286a1d891f0f
                                                                              • Instruction ID: 773fdd3eca40ce7f0438ac8963b65446171b8f917bf46a581e2aac5901f8b130
                                                                              • Opcode Fuzzy Hash: 4c4df94081603a94330b2dc8fd7c43b1fa58b6f70fe7fe48c85d286a1d891f0f
                                                                              • Instruction Fuzzy Hash: F341C0B1D103099FDF14CF9AC884ADEBBB5FF48310F24816AE819AB210D7B0A845CF90

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1473 e4b130-e4b13f 1474 e4b141-e4b14e call e4aaf4 1473->1474 1475 e4b16b-e4b16f 1473->1475 1482 e4b164 1474->1482 1483 e4b150 1474->1483 1477 e4b171-e4b17b 1475->1477 1478 e4b183-e4b1c4 1475->1478 1477->1478 1484 e4b1c6-e4b1ce 1478->1484 1485 e4b1d1-e4b1df 1478->1485 1482->1475 1529 e4b156 call e4b3c8 1483->1529 1530 e4b156 call e4b3ba 1483->1530 1484->1485 1486 e4b1e1-e4b1e6 1485->1486 1487 e4b203-e4b205 1485->1487 1489 e4b1f1 1486->1489 1490 e4b1e8-e4b1ef call e4ab00 1486->1490 1491 e4b208-e4b20f 1487->1491 1488 e4b15c-e4b15e 1488->1482 1492 e4b2a0-e4b360 1488->1492 1494 e4b1f3-e4b201 1489->1494 1490->1494 1495 e4b211-e4b219 1491->1495 1496 e4b21c-e4b223 1491->1496 1524 e4b362-e4b365 1492->1524 1525 e4b368-e4b393 GetModuleHandleW 1492->1525 1494->1491 1495->1496 1499 e4b225-e4b22d 1496->1499 1500 e4b230-e4b239 call e4ab10 1496->1500 1499->1500 1504 e4b246-e4b24b 1500->1504 1505 e4b23b-e4b243 1500->1505 1506 e4b24d-e4b254 1504->1506 1507 e4b269-e4b276 1504->1507 1505->1504 1506->1507 1509 e4b256-e4b266 call e4ab20 call e4ab30 1506->1509 1514 e4b278-e4b296 1507->1514 1515 e4b299-e4b29f 1507->1515 1509->1507 1514->1515 1524->1525 1526 e4b395-e4b39b 1525->1526 1527 e4b39c-e4b3b0 1525->1527 1526->1527 1529->1488 1530->1488
                                                                              APIs
                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00E4B386
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1725221236.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e40000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: HandleModule
                                                                              • String ID: sLMs
                                                                              • API String ID: 4139908857-2912269572
                                                                              • Opcode ID: 378121c51b8e177bb14d3d9e4092f82e20d5783a1bcdb9c2d71916f67c1b0154
                                                                              • Instruction ID: 3f2863fd7cb3cc01f9f44f8b9f10cee7f027263e3f47f815602438280dc46875
                                                                              • Opcode Fuzzy Hash: 378121c51b8e177bb14d3d9e4092f82e20d5783a1bcdb9c2d71916f67c1b0154
                                                                              • Instruction Fuzzy Hash: E7714170A00B048FD724DF2AE45575ABBF2FF88304F108A2DE48AE7A50DB74E845CB91

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1531 e4590d-e45916 1532 e45918-e459d9 CreateActCtxA 1531->1532 1534 e459e2-e45a3c 1532->1534 1535 e459db-e459e1 1532->1535 1542 e45a3e-e45a41 1534->1542 1543 e45a4b-e45a4f 1534->1543 1535->1534 1542->1543 1544 e45a60 1543->1544 1545 e45a51-e45a5d 1543->1545 1547 e45a61 1544->1547 1545->1544 1547->1547
                                                                              APIs
                                                                              • CreateActCtxA.KERNEL32(?), ref: 00E459C9
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1725221236.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e40000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: Create
                                                                              • String ID: sLMs
                                                                              • API String ID: 2289755597-2912269572
                                                                              • Opcode ID: 76ed401164c6ddd34488afcd360a127b18303589d451e8816fe669d11cf295a4
                                                                              • Instruction ID: c29b5bba00fdf93fab087eb3f395d2cc515b61ad2f64d96941f0664c5e0e05b1
                                                                              • Opcode Fuzzy Hash: 76ed401164c6ddd34488afcd360a127b18303589d451e8816fe669d11cf295a4
                                                                              • Instruction Fuzzy Hash: 8441E2B1C00719CBDB24CFAAC884BDEBBF5BF49304F20816AD509AB251DB756946CF50

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1548 2be0be4-2be42fc 1551 2be43ac-2be43cc call 2be0abc 1548->1551 1552 2be4302-2be4307 1548->1552 1560 2be43cf-2be43dc 1551->1560 1554 2be435a-2be4392 CallWindowProcW 1552->1554 1555 2be4309-2be4340 1552->1555 1557 2be439b-2be43aa 1554->1557 1558 2be4394-2be439a 1554->1558 1561 2be4349-2be4358 1555->1561 1562 2be4342-2be4348 1555->1562 1557->1560 1558->1557 1561->1560 1562->1561
                                                                              APIs
                                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 02BE4381
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1731582985.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2be0000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: CallProcWindow
                                                                              • String ID: sLMs
                                                                              • API String ID: 2714655100-2912269572
                                                                              • Opcode ID: 032be4ce711846939dcbd1fffbe000e5094397f18e299116c0d4101a185ae63d
                                                                              • Instruction ID: 6a41e7b66c02963edf7368282c56efef8aa011c4209d18b343e7ca5fd1259035
                                                                              • Opcode Fuzzy Hash: 032be4ce711846939dcbd1fffbe000e5094397f18e299116c0d4101a185ae63d
                                                                              • Instruction Fuzzy Hash: AC4119B5A007058FCB14DF99C488AABFBF5FB88314F24C499D51AAB361D774A845CFA0

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1565 e444c4-e459d9 CreateActCtxA 1568 e459e2-e45a3c 1565->1568 1569 e459db-e459e1 1565->1569 1576 e45a3e-e45a41 1568->1576 1577 e45a4b-e45a4f 1568->1577 1569->1568 1576->1577 1578 e45a60 1577->1578 1579 e45a51-e45a5d 1577->1579 1581 e45a61 1578->1581 1579->1578 1581->1581
                                                                              APIs
                                                                              • CreateActCtxA.KERNEL32(?), ref: 00E459C9
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1725221236.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e40000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: Create
                                                                              • String ID: sLMs
                                                                              • API String ID: 2289755597-2912269572
                                                                              • Opcode ID: dd26a1bdc148ef07093ba06c4625ba5a14b6bb8dc6dceecbfd66c68ab0d1fe71
                                                                              • Instruction ID: 1ed57962cec1215ee8edbe8c6b6ba003cd5630ef9c78e3beb566a5e0eb008892
                                                                              • Opcode Fuzzy Hash: dd26a1bdc148ef07093ba06c4625ba5a14b6bb8dc6dceecbfd66c68ab0d1fe71
                                                                              • Instruction Fuzzy Hash: 1041D1B1C0071DCBDB24DFAAC884B9EBBB5BF89304F20816AD509AB251DB716945CF90

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1582 e4d600-e4d606 1583 e4d608-e4d69c DuplicateHandle 1582->1583 1584 e4d6a5-e4d6c2 1583->1584 1585 e4d69e-e4d6a4 1583->1585 1585->1584
                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E4D68F
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1725221236.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e40000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID: sLMs
                                                                              • API String ID: 3793708945-2912269572
                                                                              • Opcode ID: ea3e5b1e79d4061e48d6e89050c41bf79f2430002612de8635b3255618909781
                                                                              • Instruction ID: 6ab1f9ce572468545f4b915153afef58f1f04e04ca4f4707c1247d6425980319
                                                                              • Opcode Fuzzy Hash: ea3e5b1e79d4061e48d6e89050c41bf79f2430002612de8635b3255618909781
                                                                              • Instruction Fuzzy Hash: D721E4B5D003089FDB10CFAAD984ADEBBF5EB48320F24845AE958A7350D374A954CFA5

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1588 e4d608-e4d69c DuplicateHandle 1589 e4d6a5-e4d6c2 1588->1589 1590 e4d69e-e4d6a4 1588->1590 1590->1589
                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E4D68F
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1725221236.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e40000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID: sLMs
                                                                              • API String ID: 3793708945-2912269572
                                                                              • Opcode ID: 331676b5758e9961b4017af1a8e8ea121a04fac2b3900df87873ff675fc50e9f
                                                                              • Instruction ID: d6fe3b76e676bf7c11459985a813a277a65d00d6aa792592e64a8db7f6f4e1a1
                                                                              • Opcode Fuzzy Hash: 331676b5758e9961b4017af1a8e8ea121a04fac2b3900df87873ff675fc50e9f
                                                                              • Instruction Fuzzy Hash: 6821C4B59002489FDB10CF9AD984ADEBBF5EB48310F14845AE958A3350D374A954CFA5
                                                                              APIs
                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00E4B386
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1725221236.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e40000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: HandleModule
                                                                              • String ID: sLMs
                                                                              • API String ID: 4139908857-2912269572
                                                                              • Opcode ID: f9566b4e2b410583020cbf5c3c259814e201dffce01062d250e4edc422e0ec6e
                                                                              • Instruction ID: 753933a0fdb57a5b19be1c59c3f1401f0307d7d08e02a6496e38e3cc2737a743
                                                                              • Opcode Fuzzy Hash: f9566b4e2b410583020cbf5c3c259814e201dffce01062d250e4edc422e0ec6e
                                                                              • Instruction Fuzzy Hash: B7110FB5C003498FCB10DF9AD444A9EFBF4AB88324F10841AD419B7210C3B5A545CFA5
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1724285441.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_d9d000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 812bd1bef40f64f5f3c74eba3676941ed70ca8d423089305aca1ffca4596aa38
                                                                              • Instruction ID: b843167c5f5f11f4199dabaafb12d3fe77e27d2d595e8180ef573294e11d0c6b
                                                                              • Opcode Fuzzy Hash: 812bd1bef40f64f5f3c74eba3676941ed70ca8d423089305aca1ffca4596aa38
                                                                              • Instruction Fuzzy Hash: 2F2128B1604204DFDF05DF14D9C4B26BF66FB94324F24C569D90A0B256C336E856C7B2
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1724446229.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_dbd000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f6b81fc254ba3fdb61b1e15c5f56f371f5262ea6d23128eaad51b58d06b2be15
                                                                              • Instruction ID: 9634fcf8cc78a4a23a1b474732f05d8f42eba689f6d3414b584f9797c2c1513e
                                                                              • Opcode Fuzzy Hash: f6b81fc254ba3fdb61b1e15c5f56f371f5262ea6d23128eaad51b58d06b2be15
                                                                              • Instruction Fuzzy Hash: 3421D075604200DFCB14EF14D984B66BBA6EB98324F24C969E84B4B286D33AD807CA71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1724446229.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_dbd000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ea652dce3d0f8d39bad7914e9eb1f84601b92d72c69f4229ecd92149906be56e
                                                                              • Instruction ID: 20f038c68a2f9e837af99ee14dee07af838fe7f837ef092484fe1629bd262700
                                                                              • Opcode Fuzzy Hash: ea652dce3d0f8d39bad7914e9eb1f84601b92d72c69f4229ecd92149906be56e
                                                                              • Instruction Fuzzy Hash: BD21F575604240EFDB05DF14D9C4B65BBA6FB94314F24C66DD84A4B291D336D806CB71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1724446229.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_dbd000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b9b8ddf1950b23968a07ecc9ee09f572311e7a4d4afe5e80d59e7ee057faa346
                                                                              • Instruction ID: ce77b4bfeb08fd071e50fec71c919ddf52053091b15db8417ccec8d8fbcc676d
                                                                              • Opcode Fuzzy Hash: b9b8ddf1950b23968a07ecc9ee09f572311e7a4d4afe5e80d59e7ee057faa346
                                                                              • Instruction Fuzzy Hash: D2218375509380CFCB02DF24D594715BF72EB46314F28C5DAD8498B2A7C33A980ACB62
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1724285441.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_d9d000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                              • Instruction ID: 2a4dde1792de508f33389f6b447823d48e0e4a4f8a6ef4ecd8377cbe72c313da
                                                                              • Opcode Fuzzy Hash: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                              • Instruction Fuzzy Hash: 7E11E676504240DFDF16CF14D5C4B16BF72FB94324F28C6A9D9090B656C33AE85ACBA1
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1724446229.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_dbd000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                                                                              • Instruction ID: 28151a92702f8a2ed37929aad854130ee26e2f787fa1f6e5058b6f16c61c8a02
                                                                              • Opcode Fuzzy Hash: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                                                                              • Instruction Fuzzy Hash: 3811BB75904280DFCB02CF10C5C4B15BBB2FB84324F28C6ADD84A4B296C33AD80ACB61
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1724285441.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_d9d000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 15de185669dc273dabea69592eb2cef7021bfe7638b4340a72e5fc37cbfc57b7
                                                                              • Instruction ID: 2b35d22b84b11628a10f4dc4e1c56b2ba15e8501e2a293b96b6ce0dcbbf28c94
                                                                              • Opcode Fuzzy Hash: 15de185669dc273dabea69592eb2cef7021bfe7638b4340a72e5fc37cbfc57b7
                                                                              • Instruction Fuzzy Hash: 4001F7710043409AEB105AA5CCC4B26BFD9DF51321F2CC81AED4A0A286C7789C40C6B1
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1724285441.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_d9d000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 52eabadc3f10bf947aaa169e7eb5f149004e17d1dcf18aa1d283b7385a071e3d
                                                                              • Instruction ID: 532c6999d42f33d40166febd64d9daa67571650365cdfda3de4b1e0499a4ee5b
                                                                              • Opcode Fuzzy Hash: 52eabadc3f10bf947aaa169e7eb5f149004e17d1dcf18aa1d283b7385a071e3d
                                                                              • Instruction Fuzzy Hash: B3F06271404344AEEB208A56DC84B62FFE8EF51735F18C55AED494A296C379AC44CAB1
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1739718314.000000000AA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA60000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_aa60000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 81a705c668838cc64ef2510d8e18935be797f0de21faf00a11f954809ce477a4
                                                                              • Instruction ID: 89a5558c60436c6a95ee01216e5d294f909c8f2f3b64662548452856a7d86207
                                                                              • Opcode Fuzzy Hash: 81a705c668838cc64ef2510d8e18935be797f0de21faf00a11f954809ce477a4
                                                                              • Instruction Fuzzy Hash: A3F03076A40215DFC750DFADE9066DEBFF0BB48221F11856BD008E7611D7708A458FD1
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1739718314.000000000AA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA60000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_aa60000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 08e3ea1bd305918093441942a0a5805ef30e32ed2beed9dae9ae4108f51ba643
                                                                              • Instruction ID: 9f60be693a189524897488f586ad59e519cecb0b405f5050b72c6616ab69c474
                                                                              • Opcode Fuzzy Hash: 08e3ea1bd305918093441942a0a5805ef30e32ed2beed9dae9ae4108f51ba643
                                                                              • Instruction Fuzzy Hash: 77E092B0D4421AEFD740EFA9C945A9EBFF0BB08600F5185AAD019E7261E7B49A048F91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1739718314.000000000AA60000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AA60000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_aa60000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: PH^q$PH^q
                                                                              • API String ID: 0-1598597984
                                                                              • Opcode ID: d4baeb84b2da289ea75f60b6e6d5256024f092331be0081c0d6b981da6d89d81
                                                                              • Instruction ID: a53b6b65da471db788cda7f631863d020823c857e12140f601be1123577c5ea0
                                                                              • Opcode Fuzzy Hash: d4baeb84b2da289ea75f60b6e6d5256024f092331be0081c0d6b981da6d89d81
                                                                              • Instruction Fuzzy Hash: 70D19374A00605CFDB54DF69C598AE9BBF1AF48701F2681A9E505EB3A1DB31AD40CF60
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1731582985.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2be0000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1b39ec5d5bd8d2a384ef7ce0d99a59d3a674e8a435165e6a6ee9ae27f0b67d41
                                                                              • Instruction ID: ed3b4c9305b76e6772d06924ba8bc7bdb76651bbf5f294affd500b0eef10f467
                                                                              • Opcode Fuzzy Hash: 1b39ec5d5bd8d2a384ef7ce0d99a59d3a674e8a435165e6a6ee9ae27f0b67d41
                                                                              • Instruction Fuzzy Hash: 001273B040274A8EE730EF65EC4C1897AB1BB45319B505309DEE52B2E9D7BE114BCF64
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1725221236.0000000000E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E40000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e40000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d5bc4af423be94f41cae4173c13363653542a1ed838e4707cb28d2a4fe330f2e
                                                                              • Instruction ID: fadb122333e625c8e8ce1723057961271381be2b76837471eed710929fdda627
                                                                              • Opcode Fuzzy Hash: d5bc4af423be94f41cae4173c13363653542a1ed838e4707cb28d2a4fe330f2e
                                                                              • Instruction Fuzzy Hash: B5A17B32E002098FCF15DFB4E84459EBBF2FF84704B15956AE806BB265DB75E915CB80
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1731582985.0000000002BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BE0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2be0000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1ddb7f541721591302ab7b0fda8bb337adbd107a899ee276297d27b973645940
                                                                              • Instruction ID: 9536c942fc5ca23928acf7d1288f73d06b2ba9ac9360807068a97fa1a7914950
                                                                              • Opcode Fuzzy Hash: 1ddb7f541721591302ab7b0fda8bb337adbd107a899ee276297d27b973645940
                                                                              • Instruction Fuzzy Hash: 2DC104B080274A8FD730EF65EC481897BB1BB85324B615309DDA16B2E9DBBE104BCF54
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1735051996.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_51e0000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 228aafff6e541b3e64f4e46d4a755331b26d296f1bee9c6030ee594685878cf3
                                                                              • Instruction ID: ece4737a0aa904fa381713ea9bfb39c94aa00fd0e4edb66f2ce9406632c931d0
                                                                              • Opcode Fuzzy Hash: 228aafff6e541b3e64f4e46d4a755331b26d296f1bee9c6030ee594685878cf3
                                                                              • Instruction Fuzzy Hash: 3851D9B0E01609AFDB04DFADC984AAEBBF2FF88310F14C565E418E7355D734AA818B54
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1735051996.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_51e0000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3929dd2bc6ce3063615290f8d6b367c27ed8ce444c9cae80575312cee2438e27
                                                                              • Instruction ID: 917350372bc1a648aae99eb1a6ad3b60481ccec12ccb7552f4dbb9c7ea0dca32
                                                                              • Opcode Fuzzy Hash: 3929dd2bc6ce3063615290f8d6b367c27ed8ce444c9cae80575312cee2438e27
                                                                              • Instruction Fuzzy Hash: 1F51C8B4E006099FDB04DFA9C984AEEBBF2BF88310F18C565E418E7355D734AA91CB54
                                                                              APIs
                                                                              • GetSystemMetrics.USER32(00000044), ref: 051E19AE
                                                                              • GetSystemMetrics.USER32(00000045), ref: 051E19E8
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1735051996.00000000051E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_51e0000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: MetricsSystem
                                                                              • String ID: sLMs
                                                                              • API String ID: 4116985748-2912269572
                                                                              • Opcode ID: 8adeea377b00cc2ef9c61db42792bb5b73a86d6b709b0951e43ee9cb15507ccd
                                                                              • Instruction ID: 38765cff16bf843759a78d56cc86fadbe258621032c2e27c4c9e875b12a657bd
                                                                              • Opcode Fuzzy Hash: 8adeea377b00cc2ef9c61db42792bb5b73a86d6b709b0951e43ee9cb15507ccd
                                                                              • Instruction Fuzzy Hash: 1C2154B18007498FDB20DF9AC44ABAEBFF4FB08315F248459D55AA7390C778A584CFA5

                                                                              Execution Graph

                                                                              Execution Coverage:7.8%
                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                              Signature Coverage:0%
                                                                              Total number of Nodes:5
                                                                              Total number of Limit Nodes:0
                                                                              execution_graph 28073 6203f78 28074 6203fbe GlobalMemoryStatusEx 28073->28074 28075 6203fee 28074->28075 28076 b1ae98 DuplicateHandle 28077 b1af2e 28076->28077

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1117 62871d0-62871ef 1118 62871f1-62871f4 1117->1118 1119 628721a-628721d 1118->1119 1120 62871f6-6287215 1118->1120 1121 6287abd-6287abf 1119->1121 1122 6287223-628724a 1119->1122 1120->1119 1123 6287ac1 1121->1123 1124 6287ac6-6287ac9 1121->1124 1131 628724c-628724f 1122->1131 1132 6287263-628726d 1122->1132 1123->1124 1124->1118 1126 6287acf-6287adc 1124->1126 1131->1132 1133 6287251-6287261 1131->1133 1136 6287273-6287284 call 62837bc 1132->1136 1133->1136 1138 6287289-628728b 1136->1138 1139 628728d-6287299 1138->1139 1140 628729e-6287634 1138->1140 1139->1126 1178 628763a-62876e9 1140->1178 1179 6287aaf-6287abc 1140->1179 1188 62876eb-6287710 1178->1188 1189 6287712 1178->1189 1191 628771b-628772b call 62837c8 1188->1191 1189->1191 1194 6287a90-6287a9c 1191->1194 1195 6287731-6287750 call 62837d4 1191->1195 1194->1178 1197 6287aa2 1194->1197 1195->1194 1199 6287756-6287760 1195->1199 1197->1179 1199->1194 1200 6287766-6287771 1199->1200 1200->1194 1201 6287777-628785d 1200->1201 1215 628786b-62878a3 1201->1215 1216 628785f-6287861 1201->1216 1221 62878b1-62878bd 1215->1221 1222 62878a5-62878a7 1215->1222 1216->1215 1223 628792b-6287946 call 62837ec 1221->1223 1224 62878bf-62878c3 1221->1224 1222->1221 1228 628794c-6287990 1223->1228 1229 6287a81-6287a8a 1223->1229 1224->1223 1226 62878c5-62878f7 1224->1226 1237 62878f9-62878fb 1226->1237 1238 6287905-6287924 call 62837e0 1226->1238 1244 628799e-62879ac 1228->1244 1245 6287992-6287994 1228->1245 1229->1194 1229->1201 1237->1238 1238->1228 1243 6287926 1238->1243 1243->1229 1247 62879ae-62879b9 1244->1247 1248 62879c3-62879ce 1244->1248 1245->1244 1247->1248 1251 62879bb 1247->1251 1252 62879d0-62879d6 1248->1252 1253 62879e6-62879f7 1248->1253 1251->1248 1254 62879d8 1252->1254 1255 62879da-62879dc 1252->1255 1257 62879f9-62879ff 1253->1257 1258 6287a0f-6287a74 1253->1258 1254->1253 1255->1253 1259 6287a01 1257->1259 1260 6287a03-6287a05 1257->1260 1258->1229 1259->1258 1260->1258
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $^q$$^q$$^q$$^q$$^q
                                                                              • API String ID: 0-358201761
                                                                              • Opcode ID: 296cdb7bcb188571f942e4f68b5f26f6960d1e0a73c03d1af0d8671ff55a1f30
                                                                              • Instruction ID: e47d450c44d8f86949f94d4a5501761759bc82f4e6ba5851c145416bd5a80de2
                                                                              • Opcode Fuzzy Hash: 296cdb7bcb188571f942e4f68b5f26f6960d1e0a73c03d1af0d8671ff55a1f30
                                                                              • Instruction Fuzzy Hash: 72424031E1071A9FCB54EF78C85469DB7F2AFC9300F6086AAD409AB255EF709D85CB81

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1270 628c220-628c23e 1271 628c240-628c243 1270->1271 1272 628c250-628c253 1271->1272 1273 628c245-628c24f 1271->1273 1274 628c282-628c285 1272->1274 1275 628c255-628c27d 1272->1275 1276 628c29c-628c29f 1274->1276 1277 628c287-628c295 1274->1277 1275->1274 1279 628c2a1-628c2bd 1276->1279 1280 628c2c2-628c2c4 1276->1280 1286 628c2d4-628c2ea 1277->1286 1287 628c297 1277->1287 1279->1280 1281 628c2cb-628c2ce 1280->1281 1282 628c2c6 1280->1282 1281->1271 1281->1286 1282->1281 1291 628c51b-628c525 1286->1291 1292 628c2f0-628c2f9 1286->1292 1287->1276 1294 628c2ff-628c324 1292->1294 1295 628c526-628c55f 1292->1295 1308 628c508-628c515 1294->1308 1309 628c32a-628c35a 1294->1309 1298 628c561-628c564 1295->1298 1299 628c56a-628c582 1298->1299 1300 628c62c-628c62f 1298->1300 1322 628c58c-628c58f 1299->1322 1302 628c635-628c644 1300->1302 1303 628c897-628c89a 1300->1303 1314 628c663-628c6a7 1302->1314 1315 628c646-628c661 1302->1315 1305 628c89c-628c8b8 1303->1305 1306 628c8bd-628c8bf 1303->1306 1305->1306 1311 628c8c1 1306->1311 1312 628c8c6-628c8c9 1306->1312 1308->1291 1308->1292 1309->1308 1339 628c360-628c369 1309->1339 1311->1312 1312->1298 1317 628c8cf-628c8d8 1312->1317 1323 628c86b-628c880 1314->1323 1324 628c6ad-628c6be 1314->1324 1315->1314 1326 628c596-628c598 1322->1326 1323->1303 1335 628c6c4-628c6e7 1324->1335 1336 628c856-628c865 1324->1336 1329 628c59a-628c5a0 1326->1329 1330 628c5b0-628c5b4 1326->1330 1333 628c5a2 1329->1333 1334 628c5a4-628c5a6 1329->1334 1337 628c5c2 1330->1337 1338 628c5b6-628c5c0 1330->1338 1333->1330 1334->1330 1335->1336 1354 628c6ed-628c810 1335->1354 1336->1323 1336->1324 1340 628c5c7-628c5c9 1337->1340 1338->1340 1339->1295 1341 628c36f-628c391 1339->1341 1344 628c5cb-628c5ce 1340->1344 1345 628c5e0-628c61f 1340->1345 1352 628c4f6-628c502 1341->1352 1353 628c397-628c3bf 1341->1353 1344->1317 1345->1302 1364 628c621-628c62b 1345->1364 1352->1308 1352->1339 1365 628c4ec-628c4f1 1353->1365 1366 628c3c5-628c3ed 1353->1366 1416 628c81e 1354->1416 1417 628c812-628c81c 1354->1417 1365->1352 1366->1365 1372 628c3f3-628c421 1366->1372 1372->1365 1378 628c427-628c431 1372->1378 1378->1365 1379 628c437-628c471 1378->1379 1389 628c47c-628c498 1379->1389 1390 628c473-628c477 1379->1390 1389->1352 1392 628c49a-628c4ea 1389->1392 1390->1365 1391 628c479 1390->1391 1391->1389 1392->1352 1418 628c823-628c825 1416->1418 1417->1418 1418->1336 1419 628c827-628c82c 1418->1419 1420 628c83a 1419->1420 1421 628c82e-628c838 1419->1421 1422 628c83f-628c841 1420->1422 1421->1422 1422->1336 1423 628c843-628c84f 1422->1423 1423->1336
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Uc<$$^q$$^q$c<$c<
                                                                              • API String ID: 0-1836474973
                                                                              • Opcode ID: 0580b65b3e5d9e217d6490ff8a47fec1c24499d2c88203587cb52735e0e5e1ea
                                                                              • Instruction ID: f8c2a38e6f6098203091fad87a4cbbd579120e6ba78258299ba0ab144fc16d15
                                                                              • Opcode Fuzzy Hash: 0580b65b3e5d9e217d6490ff8a47fec1c24499d2c88203587cb52735e0e5e1ea
                                                                              • Instruction Fuzzy Hash: 4502B230B112169FDB54EB78D8506AEB7E2AF84314F148969E809EB3C5EB34DC82C795
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e1d5d1ca55377edceba69e849222cbaa7ee4ff4755b2cb7ee4deffa708bac8d9
                                                                              • Instruction ID: 2106a22e7244c13dca5612b3bebd1370deb759039ffccba3c3bb4503a84dc275
                                                                              • Opcode Fuzzy Hash: e1d5d1ca55377edceba69e849222cbaa7ee4ff4755b2cb7ee4deffa708bac8d9
                                                                              • Instruction Fuzzy Hash: 54631B31D20B1A8ECB51EF68C880599F7B1FF99300F55C79AE45877221EB70AAD5CB81

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 2188 6289c23-6289c48 2189 6289c4a-6289c4d 2188->2189 2190 6289c5c-6289c5f 2189->2190 2191 6289c4f-6289c55 2189->2191 2194 6289c7d-6289c80 2190->2194 2195 6289c61-6289c66 2190->2195 2192 6289c82-6289ca1 2191->2192 2193 6289c57 2191->2193 2209 6289ca3 2192->2209 2210 6289ca6-6289cac 2192->2210 2193->2190 2194->2192 2196 6289cb7-6289cba 2194->2196 2197 6289c68 2195->2197 2198 6289c6b-6289c78 2195->2198 2196->2191 2200 6289cbc-6289cbf 2196->2200 2197->2198 2198->2194 2202 6289cc8-6289ccb 2200->2202 2203 6289cc1-6289cc3 2200->2203 2205 6289ccd-6289ccf 2202->2205 2206 6289cd2-6289cd4 2202->2206 2203->2202 2205->2206 2207 6289cdb-6289cde 2206->2207 2208 6289cd6 2206->2208 2207->2189 2211 6289ce4-6289cec 2207->2211 2208->2207 2209->2210 2212 6289ced-6289d2a 2210->2212 2213 6289cae-6289cb2 2210->2213 2215 6289d2c-6289d2f 2212->2215 2213->2196 2216 6289d3d-6289d40 2215->2216 2217 6289d31-6289d3a 2215->2217 2218 6289d50-6289d53 2216->2218 2219 6289d42-6289d49 2216->2219 2220 6289d59-6289d60 2218->2220 2222 6289ecd-6289ed0 2218->2222 2219->2220 2221 6289d4b 2219->2221 2225 6289eae-6289ec1 2220->2225 2226 6289d66-6289dad 2220->2226 2221->2218 2223 6289eec-6289eef 2222->2223 2224 6289ed2-6289ee7 2222->2224 2227 6289ef1-6289eff 2223->2227 2228 6289f04-6289f06 2223->2228 2224->2223 2241 6289daf-6289dbe 2226->2241 2227->2228 2230 6289f08 2228->2230 2231 6289f0d-6289f10 2228->2231 2230->2231 2231->2215 2235 6289f16-6289f20 2231->2235 2243 6289f23-6289f62 2241->2243 2244 6289dc4-6289dda 2241->2244 2247 6289f64-6289f67 2243->2247 2244->2243 2248 6289de0-6289de8 2244->2248 2250 6289ff8-6289ffb 2247->2250 2251 6289f6d-6289f74 2247->2251 2248->2241 2249 6289dea-6289df0 2248->2249 2252 6289e50-6289ea0 call 62889e8 2249->2252 2253 6289df2-6289df5 2249->2253 2254 6289ffd-628a004 2250->2254 2255 628a00f-628a012 2250->2255 2256 628a0e9-628a0fc 2251->2256 2257 6289f7a-6289f92 2251->2257 2304 6289eab 2252->2304 2305 6289ea2 2252->2305 2253->2243 2258 6289dfb-6289e06 2253->2258 2254->2251 2259 628a00a 2254->2259 2260 628a02a-628a02d 2255->2260 2261 628a014-628a025 2255->2261 2286 6289f9c-6289ff5 2257->2286 2258->2243 2262 6289e0c-6289e16 2258->2262 2259->2255 2264 628a02f-628a03b 2260->2264 2265 628a040-628a043 2260->2265 2261->2260 2262->2243 2268 6289e1c-6289e26 2262->2268 2264->2265 2270 628a045-628a052 2265->2270 2271 628a057-628a05a 2265->2271 2268->2243 2274 6289e2c-6289e41 2268->2274 2270->2271 2272 628a05c-628a068 2271->2272 2273 628a06d-628a070 2271->2273 2272->2273 2278 628a08a-628a08d 2273->2278 2279 628a072-628a085 2273->2279 2274->2243 2280 6289e47-6289e4e 2274->2280 2283 628a08f-628a09e 2278->2283 2284 628a0a3-628a0a6 2278->2284 2279->2278 2280->2252 2280->2253 2283->2284 2288 628a0a8-628a0c7 2284->2288 2289 628a0e4-628a0e7 2284->2289 2301 628a111-628a11b 2288->2301 2289->2256 2290 628a0ff-628a101 2289->2290 2296 628a108-628a10b 2290->2296 2297 628a103 2290->2297 2296->2247 2296->2301 2297->2296 2304->2225 2305->2304
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: XPcq$\Ocq
                                                                              • API String ID: 0-2802517751
                                                                              • Opcode ID: ec76412550ee18111a29fc69ac4fa120fafcc34ae05459cd5f36ce30f78e23e0
                                                                              • Instruction ID: bfa2a8cadd7ff8fbbbc8ddc5c272e062026c990e6dee877adc04be23f219c7ba
                                                                              • Opcode Fuzzy Hash: ec76412550ee18111a29fc69ac4fa120fafcc34ae05459cd5f36ce30f78e23e0
                                                                              • Instruction Fuzzy Hash: 37E1F631F211158FDB54AB6CD890BAEBBF5EB89310F11846AE846DB3D2CA31DC81C791
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e15f002b15705223d8269213936dbb551a916af9e0d4362a4ea126679109676d
                                                                              • Instruction ID: b827be59201e0a5fbebe73f60e57d4af4fbb07857919a4692bd4277a8d82aeb0
                                                                              • Opcode Fuzzy Hash: e15f002b15705223d8269213936dbb551a916af9e0d4362a4ea126679109676d
                                                                              • Instruction Fuzzy Hash: D113D531C10B1A8ECB51EF68C8805A9F7B1FF99300F55D79AE45877221EB70AAD5CB81
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 44b2d3827af1dd9cbb44ded89faa23b54d62e1675a491dc8bd4f97abaf491d3f
                                                                              • Instruction ID: 9bc9ef49a0ee4029e2e95ad085b85a3fe245d1d9b2057441fafbfb6abba89d4b
                                                                              • Opcode Fuzzy Hash: 44b2d3827af1dd9cbb44ded89faa23b54d62e1675a491dc8bd4f97abaf491d3f
                                                                              • Instruction Fuzzy Hash: 1162C130B212059FDB54EB68D9906ADB7F2EF84311F54856AE80AEB391DF35DC42CB81
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c375b03c94116f365a8868c23156ab383d68a45d1e9f74b77e51138f62008962
                                                                              • Instruction ID: f20fbe8036c0b95dde7f6c62b89c3a9155f5920260be9580bee8e7f91897526f
                                                                              • Opcode Fuzzy Hash: c375b03c94116f365a8868c23156ab383d68a45d1e9f74b77e51138f62008962
                                                                              • Instruction Fuzzy Hash: ED81E471E262168FDF709F6DC88077EFBA1EB46321F148866E969DB2C1C634D881C791

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 816 628d720-628d745 817 628d747-628d74a 816->817 818 628d74c-628d76b 817->818 819 628d770-628d773 817->819 818->819 820 628d779-628d7b9 819->820 821 628e1b5-628e1b7 819->821 830 628d7bb-628d7c7 820->830 831 628d7e3 820->831 823 628e1b9 821->823 824 628e1be-628e1c1 821->824 823->824 824->817 825 628e1c7-628e1d1 824->825 832 628d7c9-628d7cf 830->832 833 628d7d1-628d7d7 830->833 834 628d7e9-628d81f 831->834 835 628d7e1 832->835 833->835 839 628d82a-628d82c 834->839 835->834 840 628d82e-628d834 839->840 841 628d844-628d8cd 839->841 842 628d838-628d83a 840->842 843 628d836 840->843 853 628d8cf-628d90b 841->853 854 628d912-628d948 841->854 842->841 843->841 853->854 861 628d94a-628d986 854->861 862 628d98d-628d9c3 854->862 861->862 869 628da08-628da3e 862->869 870 628d9c5-628da01 862->870 877 628da40-628da7c 869->877 878 628da83-628da91 869->878 870->869 877->878 879 628daa1-628db18 878->879 880 628da93-628da9c 878->880 887 628db1a-628db3e 879->887 888 628db71-628db86 879->888 880->825 893 628db60-628db6f 887->893 894 628db40-628db55 887->894 888->821 893->887 893->888 894->893
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $c<$kc<$uc<$}c<$$^q$$^q$$^q$$^q$c<
                                                                              • API String ID: 0-206387987
                                                                              • Opcode ID: af577994ee685f2b592e5982ebbfdd1e8cd7d1ce550b8d3858f71081ff4e4a6a
                                                                              • Instruction ID: b781d67283ebde115adff647666967aa0b266fc85fd9f104b46f5e342a3053f7
                                                                              • Opcode Fuzzy Hash: af577994ee685f2b592e5982ebbfdd1e8cd7d1ce550b8d3858f71081ff4e4a6a
                                                                              • Instruction Fuzzy Hash: 0EC12C30E112199FDB64DF65D8507DEB7F2AF89300F5085AAD809AB384DA309E81CF95

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 898 628f5a8-628f5c6 899 628f5c8-628f5cb 898->899 900 628f5cd-628f5e0 899->900 901 628f5e5-628f5e8 899->901 900->901 902 628f5f9-628f5fc 901->902 903 628f5ea-628f5ee 901->903 906 628f5fe-628f60b 902->906 907 628f610-628f613 902->907 904 628f7ef-628f7f9 903->904 905 628f5f4 903->905 905->902 906->907 909 628f615-628f622 907->909 910 628f627-628f62a 907->910 909->910 912 628f62c-628f631 910->912 913 628f634-628f637 910->913 912->913 915 628f639-628f655 913->915 916 628f65a-628f65d 913->916 915->916 917 628f65f-628f668 916->917 918 628f677-628f67a 916->918 919 628f7fa-628f82e 917->919 920 628f66e-628f672 917->920 921 628f7e0-628f7e9 918->921 922 628f680-628f682 918->922 929 628f830-628f833 919->929 920->918 921->904 921->917 924 628f689-628f68c 922->924 925 628f684 922->925 924->899 927 628f692-628f6bc 924->927 925->924 951 628f7dd 927->951 952 628f6c2-628f6d7 927->952 931 628f842-628f845 929->931 932 628f835 call 628fdb5 929->932 933 628f84b-628f886 931->933 934 628fadf-628fae2 931->934 938 628f83b-628f83d 932->938 942 628faaa-628fabd 933->942 943 628f88c-628f898 933->943 935 628faef-628faf2 934->935 936 628fae4-628faee 934->936 940 628fb03-628fb06 935->940 941 628faf4-628faf8 935->941 938->931 945 628fb08-628fb24 940->945 946 628fb29-628fb2b 940->946 941->933 944 628fafe 941->944 950 628fabf 942->950 957 628f8b8-628f8fc 943->957 958 628f89a-628f8b3 943->958 944->940 945->946 948 628fb2d 946->948 949 628fb32-628fb35 946->949 948->949 949->929 955 628fb3b-628fb45 949->955 950->934 951->921 962 628f6d9-628f6df 952->962 963 628f6ef-628f729 952->963 974 628f918-628f957 957->974 975 628f8fe-628f910 957->975 958->950 964 628f6e1 962->964 965 628f6e3-628f6e5 962->965 979 628f72b-628f731 963->979 980 628f741-628f75e 963->980 964->963 965->963 981 628f95d-628fa69 974->981 982 628fa6f-628fa84 974->982 975->974 983 628f733 979->983 984 628f735-628f737 979->984 993 628f760-628f766 980->993 994 628f776-628f78d 980->994 981->982 982->942 983->980 984->980 996 628f768 993->996 997 628f76a-628f76c 993->997 1002 628f78f-628f795 994->1002 1003 628f7a5-628f7d6 994->1003 996->994 997->994 1004 628f799-628f79b 1002->1004 1005 628f797 1002->1005 1003->951 1004->1003 1005->1003
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                              • API String ID: 0-3823777903
                                                                              • Opcode ID: e0a2b437bf950e5495bb1045555be1e8b381c86a44d1eab23995c25c64c90cb5
                                                                              • Instruction ID: e4bdf94d2ada60aa364ee6e70be99ef56b2a0dbb9cb3e08e8fd52cebf24b4897
                                                                              • Opcode Fuzzy Hash: e0a2b437bf950e5495bb1045555be1e8b381c86a44d1eab23995c25c64c90cb5
                                                                              • Instruction Fuzzy Hash: A2E17330E2121A8FDB54EF68D9506AEB7F2EF85340F608569E819AB385DF70D841CB81

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1029 628d70f-628d71c 1030 628d78a 1029->1030 1031 628d71e-628d745 1029->1031 1033 628d78c 1030->1033 1034 628d776-628d779 1030->1034 1035 628d747-628d74a 1031->1035 1039 628d78f-628d7a1 1033->1039 1036 628d783-628d789 1034->1036 1037 628d74c-628d76b 1035->1037 1038 628d770-628d773 1035->1038 1043 628d793-628d7a1 1036->1043 1037->1038 1041 628d779 1038->1041 1042 628e1b5-628e1b7 1038->1042 1040 628d7ac-628d7b9 1039->1040 1047 628d7bb-628d7c7 1040->1047 1048 628d7e3 1040->1048 1041->1036 1045 628e1b9 1042->1045 1046 628e1be-628e1c1 1042->1046 1043->1040 1045->1046 1046->1035 1052 628e1c7-628e1d1 1046->1052 1049 628d7c9-628d7cf 1047->1049 1050 628d7d1-628d7d7 1047->1050 1051 628d7e9-628d807 1048->1051 1053 628d7e1 1049->1053 1050->1053 1057 628d811-628d81f 1051->1057 1053->1051 1058 628d82a-628d82c 1057->1058 1059 628d82e-628d834 1058->1059 1060 628d844-628d8cd 1058->1060 1061 628d838-628d83a 1059->1061 1062 628d836 1059->1062 1072 628d8cf-628d90b 1060->1072 1073 628d912-628d948 1060->1073 1061->1060 1062->1060 1072->1073 1080 628d94a-628d986 1073->1080 1081 628d98d-628d9c3 1073->1081 1080->1081 1088 628da08-628da3e 1081->1088 1089 628d9c5-628da01 1081->1089 1096 628da40-628da7c 1088->1096 1097 628da83-628da91 1088->1097 1089->1088 1096->1097 1098 628daa1-628db18 1097->1098 1099 628da93-628da9c 1097->1099 1106 628db1a-628db3e 1098->1106 1107 628db71-628db86 1098->1107 1099->1052 1112 628db60-628db6f 1106->1112 1113 628db40-628db55 1106->1113 1107->1042 1112->1106 1112->1107 1113->1112
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $c<$kc<$uc<$}c<$$^q$$^q$c<
                                                                              • API String ID: 0-2146872185
                                                                              • Opcode ID: 3bae80bebac3589e395681fa438e7770de26843b34d211ef18079d4c6fcc4126
                                                                              • Instruction ID: ec3ce6afe9fe059e2c6f08ca600a2cad92922d7e4e0d16e49b971845579201f6
                                                                              • Opcode Fuzzy Hash: 3bae80bebac3589e395681fa438e7770de26843b34d211ef18079d4c6fcc4126
                                                                              • Instruction Fuzzy Hash: 87A13A30E012199FDB64EF64D8507EDB7F2AF89300F5085EA9809AB394DA309E81CF95

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1536 6288a60-6288a94 1537 6288a96-6288a99 1536->1537 1538 6288aba-6288abd 1537->1538 1539 6288a9b-6288ab5 1537->1539 1540 6288ac3-6288b8e 1538->1540 1541 62891a5-62891a7 1538->1541 1539->1538 1560 6288b94-6288be1 1540->1560 1561 6288c16-6288c1d 1540->1561 1542 62891a9 1541->1542 1543 62891ae-62891b1 1541->1543 1542->1543 1543->1537 1546 62891b7-62891c4 1543->1546 1584 6288be6 call 6289320 1560->1584 1585 6288be6 call 6289330 1560->1585 1562 6288c23-6288c96 1561->1562 1563 6288ca4-6288cad 1561->1563 1582 6288c98 1562->1582 1583 6288ca1 1562->1583 1563->1546 1576 6288bec-6288c08 1579 6288c0a 1576->1579 1580 6288c13 1576->1580 1579->1580 1580->1561 1582->1583 1583->1563 1584->1576 1585->1576
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: fcq$XPcq$\Ocq
                                                                              • API String ID: 0-3575482020
                                                                              • Opcode ID: 68754ba2702048d8ed3a6fc7703242ac473a84c6fd5df33095d34b3d0684a548
                                                                              • Instruction ID: d0d854eae1073d69b1233bb3a763ced31865bc233288677d101529abb76a6b37
                                                                              • Opcode Fuzzy Hash: 68754ba2702048d8ed3a6fc7703242ac473a84c6fd5df33095d34b3d0684a548
                                                                              • Instruction Fuzzy Hash: E5519370F112099FEB55ABB888147AEBAE7EF88300F108429E546EB3D5DF748D41CB95
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $
                                                                              • API String ID: 0-3993045852
                                                                              • Opcode ID: 07be07fb04487c59334c8c0f74e02ed82bc779aafa5e3d964ec86f4e16b6aa34
                                                                              • Instruction ID: a4c80e363c0c6cf76a1c3edd43f3f8f41e00084abec8435ea73329f047698f0b
                                                                              • Opcode Fuzzy Hash: 07be07fb04487c59334c8c0f74e02ed82bc779aafa5e3d964ec86f4e16b6aa34
                                                                              • Instruction Fuzzy Hash: BCF1E231F112159FDF54EFA8C8506EEB7F2AF89310F108469E809AB384DB319C86CB91
                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00B1AF1F
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2945782612.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_b10000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID:
                                                                              • API String ID: 3793708945-0
                                                                              • Opcode ID: 385d5cba8b836216941269a43e57767d970b099c004d9dfa819dde207a014336
                                                                              • Instruction ID: e00bb43bf7d400861281421a3820c142a7b28573b5423de208deac7db0203266
                                                                              • Opcode Fuzzy Hash: 385d5cba8b836216941269a43e57767d970b099c004d9dfa819dde207a014336
                                                                              • Instruction Fuzzy Hash: 6221E4B5D012089FDB10CFA9D984ADEBBF5EB48310F54845AE918A3350D374A954CF65
                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00B1AF1F
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2945782612.0000000000B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_b10000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID:
                                                                              • API String ID: 3793708945-0
                                                                              • Opcode ID: 87c2ce0d6bc2c6b7fa3af380bde4b681cd834e3561f35dca571a50ef05c65a25
                                                                              • Instruction ID: 956dde22f9da38788d0354a60bc5c4bd28f6815113e3efb5f831f2e70d44aa39
                                                                              • Opcode Fuzzy Hash: 87c2ce0d6bc2c6b7fa3af380bde4b681cd834e3561f35dca571a50ef05c65a25
                                                                              • Instruction Fuzzy Hash: 7021E2B59013089FDB10CFAAD984ADEBFF8EB48320F14805AE918A3350D374A944CFA5
                                                                              APIs
                                                                              • GlobalMemoryStatusEx.KERNELBASE ref: 06203FDF
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950649323.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6200000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: GlobalMemoryStatus
                                                                              • String ID:
                                                                              • API String ID: 1890195054-0
                                                                              • Opcode ID: 6b56d152616c4d17d3f64bddfe0b93bbac00536b087436a316a36ffbd4d22655
                                                                              • Instruction ID: a6ea8840e7cc60ffb36905c461ee365d8043f97833ad68fe85fb00ea72a0470f
                                                                              • Opcode Fuzzy Hash: 6b56d152616c4d17d3f64bddfe0b93bbac00536b087436a316a36ffbd4d22655
                                                                              • Instruction Fuzzy Hash: A01129B1C0025A9FCB10DF9AD445BDEFBF4EF48310F15816AD818A7241D778A944CFA1
                                                                              APIs
                                                                              • GlobalMemoryStatusEx.KERNELBASE ref: 06203FDF
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950649323.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6200000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID: GlobalMemoryStatus
                                                                              • String ID:
                                                                              • API String ID: 1890195054-0
                                                                              • Opcode ID: 7e24093454fb55170ea299c1392ae30a6e4b9f42e223c0356101bc45e051f8d1
                                                                              • Instruction ID: 6bba19762e9cdd99a82a5ace7c24ec7fcc1eba8b8dcaf53944cccf4c8b14d296
                                                                              • Opcode Fuzzy Hash: 7e24093454fb55170ea299c1392ae30a6e4b9f42e223c0356101bc45e051f8d1
                                                                              • Instruction Fuzzy Hash: 051126B1C0025A9FCB10DF9AC444BDEFBF4EF48320F15816AD818A7241D778A944CFA1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: PH^q
                                                                              • API String ID: 0-2549759414
                                                                              • Opcode ID: 96ee77c8c97b861462545b94aeb8b9860e85ea244ef56943c2ba09fb9bcb2f28
                                                                              • Instruction ID: 99c4c79a9cec5993360ecbd3dcebcd40898b5a792eb7d39d49f1f2aaf352c954
                                                                              • Opcode Fuzzy Hash: 96ee77c8c97b861462545b94aeb8b9860e85ea244ef56943c2ba09fb9bcb2f28
                                                                              • Instruction Fuzzy Hash: 62412230B112068FDB49AB7488246AF37E3AB89200F2045B9E406DB7D6EF38CC42C795
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: PH^q
                                                                              • API String ID: 0-2549759414
                                                                              • Opcode ID: 86a69ff6eb25ba5573a68a844a823caf791ec7c2c7062d83032b03632ccd9f4a
                                                                              • Instruction ID: ca1d67eabfaf4438f27fe313bc4d50665d15d3b43093ec188253bd101450f2a3
                                                                              • Opcode Fuzzy Hash: 86a69ff6eb25ba5573a68a844a823caf791ec7c2c7062d83032b03632ccd9f4a
                                                                              • Instruction Fuzzy Hash: 2E31D230B112068FDB49AB78882476F76E7AF89200F2045A9E406DB3D5EE35CC42C795
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: \Ocq
                                                                              • API String ID: 0-2995510325
                                                                              • Opcode ID: 85c9689bd86289e32c3f9112c1ff2ead297581e414bd89bd10cc00ba9168d455
                                                                              • Instruction ID: 3151d52b24d34f8d59d675cc8e17e9714375230083b239bfd1c4ffac0e802a52
                                                                              • Opcode Fuzzy Hash: 85c9689bd86289e32c3f9112c1ff2ead297581e414bd89bd10cc00ba9168d455
                                                                              • Instruction Fuzzy Hash: F8F0DA30A21129DFDB14DF94E959BAEBB72FF88700F604119E502A73D4CBB41D41CB81
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 13169bd6aaf317ab9d7ced155bd9fb8bb8764bdb93fe9b6d81e1d6486b2ed75e
                                                                              • Instruction ID: f487958a7ae5b53f6c5a4690d7a71e394a97a483a1c6d8e4ea97d52179a1a6e9
                                                                              • Opcode Fuzzy Hash: 13169bd6aaf317ab9d7ced155bd9fb8bb8764bdb93fe9b6d81e1d6486b2ed75e
                                                                              • Instruction Fuzzy Hash: 39C10471B112129FDB54EBB8C880A6EB7A6FB88710F14856AD859CB385DB34DC42C7D1
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 42478ef0e840cc958399964a4dbcd1af0ba17999191d06368219faba7dd8ecdb
                                                                              • Instruction ID: 2d146879a8da052ea30846180b534c58dae7127ffa16034bbca5dddf7a8a6007
                                                                              • Opcode Fuzzy Hash: 42478ef0e840cc958399964a4dbcd1af0ba17999191d06368219faba7dd8ecdb
                                                                              • Instruction Fuzzy Hash: 35A17270F2110A5FDF64EA6CC9907AEB7E6EB89340F608465E909E73D2DE24DC81C751
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1c332c5bf30e3fa0cceddff3a9803e93f3f20f20647fa9116af46a6e21e804e8
                                                                              • Instruction ID: 6cf9e61f1c24a66755059a2018221b0521f3850f566fd846273ffaf6ddb099bd
                                                                              • Opcode Fuzzy Hash: 1c332c5bf30e3fa0cceddff3a9803e93f3f20f20647fa9116af46a6e21e804e8
                                                                              • Instruction Fuzzy Hash: DF918F31F112065FDB54EBB8C8506AEB7E7AFC9300F508569D80AEB385EE74DC428B95
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8435f459f78368376975f4dc8498d45d29f02c7a30d1808b51a677b99122e2f2
                                                                              • Instruction ID: c581db62fe39cddeda57bc26babc524e01474c067b7c37ea0c1fcec334815f6b
                                                                              • Opcode Fuzzy Hash: 8435f459f78368376975f4dc8498d45d29f02c7a30d1808b51a677b99122e2f2
                                                                              • Instruction Fuzzy Hash: 5A710671F011214FCB51AA7DCC946AFEAD7AFC5210B154436E80EDB361DE65DD0283D2
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 12ac7c4266264745fbdee1e8f00ee6a1f1618980580f985dbbda68ebcd825d21
                                                                              • Instruction ID: dbc3d164f81a2224d8b4e8b04f279afcd4f80e93e41c5dc77772ce8d42c660a1
                                                                              • Opcode Fuzzy Hash: 12ac7c4266264745fbdee1e8f00ee6a1f1618980580f985dbbda68ebcd825d21
                                                                              • Instruction Fuzzy Hash: 6F817F30F112065FDB54EBB8C8507AEB6E7AFC9300F508529D80AEB385EE74DC428B95
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: de50679353e9394efa7a54573036c4e94109965ac77f8d46762b60bb8df75940
                                                                              • Instruction ID: 67f0a2e289d528ea442efa1b402d93e5977e09c89d488696d1d727466a91e99e
                                                                              • Opcode Fuzzy Hash: de50679353e9394efa7a54573036c4e94109965ac77f8d46762b60bb8df75940
                                                                              • Instruction Fuzzy Hash: 28914F34E1021A8FDF60DF68C890B99B7B1FF89300F208995D54DAB295EB74AA85CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2dafec8f7e848acffc05d3f7c21532d4097ddd9a2d26688b5687ab67a30d4a3e
                                                                              • Instruction ID: 3bec665f3664c1da8a7f411177a91507fd4092b0ae922925d46f2ac78a0ce96b
                                                                              • Opcode Fuzzy Hash: 2dafec8f7e848acffc05d3f7c21532d4097ddd9a2d26688b5687ab67a30d4a3e
                                                                              • Instruction Fuzzy Hash: E941D470D1A3999FCB02DFA8CC51ADEBFB4EF06200F14459BE444EB292D6349944CBA5
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a5ea9c3419aac26772afa5a2808a4a9b872fae9130b128febc146902291882a1
                                                                              • Instruction ID: 08d80adc0dc7ce423266e7e8794be25d8c3e45cad4a85d79076c0955d5c7c6a4
                                                                              • Opcode Fuzzy Hash: a5ea9c3419aac26772afa5a2808a4a9b872fae9130b128febc146902291882a1
                                                                              • Instruction Fuzzy Hash: 29414E71E1060A8FDB60DE9DDC80ABEF7B2EB85310F104929E55AD7690D331A985CB90
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b1fbf4f87a719c6e379586337f2f9b6871056abb1ebc8627c120d7d62d502631
                                                                              • Instruction ID: 79ad8b7a1c5a38c0cfc355b6f807b962a1c00c5f42e893aa169e97b896278ce5
                                                                              • Opcode Fuzzy Hash: b1fbf4f87a719c6e379586337f2f9b6871056abb1ebc8627c120d7d62d502631
                                                                              • Instruction Fuzzy Hash: D841C230E1521A9FCB45EF64D85469EB7F2BF89340F148519E806EB395EF71AC82CB90
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 185def5d97d1f8e7e9bed6616b5768d6e8f3c8b04a338c4d688b5993b2c807f1
                                                                              • Instruction ID: 1bf7ca04143495faa22246445d64f16aed2f930b2522fee6f04091c7ab943270
                                                                              • Opcode Fuzzy Hash: 185def5d97d1f8e7e9bed6616b5768d6e8f3c8b04a338c4d688b5993b2c807f1
                                                                              • Instruction Fuzzy Hash: 2A317E30E2021A9FCB55DFA5D85469EB7F2BF89344F108519E816EB385DF71AC42CB90
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6d35d1ab7e58d72c7a1dbabb3c34fc630c02f20bd30cdb5f4057db64604664a2
                                                                              • Instruction ID: 096da7cb0fede932f2736570dd56cf872ef2b598cfe430214bb36920845d6ea1
                                                                              • Opcode Fuzzy Hash: 6d35d1ab7e58d72c7a1dbabb3c34fc630c02f20bd30cdb5f4057db64604664a2
                                                                              • Instruction Fuzzy Hash: D6318171F012159FDB50EFBC88406FDB6E29B48710F5485AAE919F7385EA20CD4187A9
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b49d9eec405cd1a0d6899d1c69f80a9f51021ccd4dbf3cbf979815ca2cf6c58e
                                                                              • Instruction ID: 46f2293e38e70a9d9cf6eebc5a1b3d485a589b765ac62f013955def3e29b58dd
                                                                              • Opcode Fuzzy Hash: b49d9eec405cd1a0d6899d1c69f80a9f51021ccd4dbf3cbf979815ca2cf6c58e
                                                                              • Instruction Fuzzy Hash: E631E371F112115FCB50EFB888113FDB7F29F48210F5485AAE949F7381EA20CD418799
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9bf2b3df55e8f557e2f9dd3a3db3796190a120eb7ace31fea204ef9f6aa0e451
                                                                              • Instruction ID: 7a62cd6013703a1c9518730f6205f35339528f251c266b50e6e26d915e70e1c9
                                                                              • Opcode Fuzzy Hash: 9bf2b3df55e8f557e2f9dd3a3db3796190a120eb7ace31fea204ef9f6aa0e451
                                                                              • Instruction Fuzzy Hash: 7F21E130E112199FCF54EF64DC805DEBBF5EF89300F2048A9E84AE7246DA319945CF91
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 656397ebbd1a5ea2fef809a490303751d2f1a20c8ec33e7ba30f00e31c1fe0f2
                                                                              • Instruction ID: 640e33addf0d04d3e54447f8a336d49b083fa5f072b857e925133359974d5dfe
                                                                              • Opcode Fuzzy Hash: 656397ebbd1a5ea2fef809a490303751d2f1a20c8ec33e7ba30f00e31c1fe0f2
                                                                              • Instruction Fuzzy Hash: 2B218E35B100149FCB44DF68C4889AEBBF6FF8D710B1180A9E946DB7A1CA72EC058B90
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2945483903.0000000000ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ABD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_abd000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: fc891c5bcb535586bc50319bc839523fdb04b6c47d9eccef3faafd41beea4efc
                                                                              • Instruction ID: 4e9d845e790a1028d206ecf684c8c522ecec3caa60924bbe1a677eed9fd5abc7
                                                                              • Opcode Fuzzy Hash: fc891c5bcb535586bc50319bc839523fdb04b6c47d9eccef3faafd41beea4efc
                                                                              • Instruction Fuzzy Hash: 9121D075604240EFCB14EF14D984B66BBA9FB98324F24C969D80B4B286D33AD807CA61
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ca9d05888fe0d51695ec0e75020cc6e42f50bed3687fe27f08bf905f8d389ddd
                                                                              • Instruction ID: 306c21fcd5d26c5d4895e7e9c14c8fc37f25a5862d350328be975ed668f07dbd
                                                                              • Opcode Fuzzy Hash: ca9d05888fe0d51695ec0e75020cc6e42f50bed3687fe27f08bf905f8d389ddd
                                                                              • Instruction Fuzzy Hash: B4110836F210152FDB55A5B85C102FF77DBCBC8251F644576E64AE3285ED218D0283E1
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7b5d26e5988cf6b18913af347c8c3afd0d9ed5c05d22d4d73e9507db1587715d
                                                                              • Instruction ID: db3257ee79c53b3b9fc65b4171e9ef10fdda1b507e19aabbc533071b4b0f4f6e
                                                                              • Opcode Fuzzy Hash: 7b5d26e5988cf6b18913af347c8c3afd0d9ed5c05d22d4d73e9507db1587715d
                                                                              • Instruction Fuzzy Hash: 2A110631F210156FDB54EA7888106BF72EBCBC8254B60457AE90AE7380EE31DC0287A1
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: adb5698362ab0ffeed015d34ee4ebfd1b5d62fd05217a2f3b69b643bcf43ec13
                                                                              • Instruction ID: a6f3e51e7572af841ca6b6634a188e480735b241419e802762266e50081c2bd1
                                                                              • Opcode Fuzzy Hash: adb5698362ab0ffeed015d34ee4ebfd1b5d62fd05217a2f3b69b643bcf43ec13
                                                                              • Instruction Fuzzy Hash: 7411EE31A0074A9FCB20DFA9DCC18AFFFF6FF85200B104929E59993281C330A885CB90
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8c72541ca8fe2f4badc1c93e561645eb8ab6010b48c4966e117bce6d36c4fc2d
                                                                              • Instruction ID: 8592bb18eda72b3c78b14c3971a2d0f550990cac3e6ec03becc8f40c8aad7063
                                                                              • Opcode Fuzzy Hash: 8c72541ca8fe2f4badc1c93e561645eb8ab6010b48c4966e117bce6d36c4fc2d
                                                                              • Instruction Fuzzy Hash: AB11F5307211521FDB91A67E9C5076BBBDACBCA650F14887AF44DCB382DE15CC428391
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 11fb52d05c569b7bf1b1cb2ad20d43bb36dfd5fd4051942dae9bbc39a063ebc3
                                                                              • Instruction ID: 1e901640887205a9e60623ea84498adddf3232f13b87ced1e51819be844a663e
                                                                              • Opcode Fuzzy Hash: 11fb52d05c569b7bf1b1cb2ad20d43bb36dfd5fd4051942dae9bbc39a063ebc3
                                                                              • Instruction Fuzzy Hash: 0B11D231B222110FDF91A67898A576F2BD6EB8A314F414869F48BCB3C6ED15DC028395
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8a8b6da4563a41f22447035fa7a6d541d9051f722bf57e6d7023031aa4628969
                                                                              • Instruction ID: cddc1b7345ac8fbbf673cc13d27b973af8827050f4c79cc15de03f0facbcfe5e
                                                                              • Opcode Fuzzy Hash: 8a8b6da4563a41f22447035fa7a6d541d9051f722bf57e6d7023031aa4628969
                                                                              • Instruction Fuzzy Hash: 8721C2B5D11259AFCB00DF9AD885ACEFFB8FB48310F10812AE918A7341C374A954CBA5
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a4f2b7dc4152bbec4232ae62c7abd223582934fc3dd4a00036873451cb43cb98
                                                                              • Instruction ID: 7399047daa0b5536ed6d3f90c4e250c9aa6d186d3e9600659e3fbaaaaf917fe7
                                                                              • Opcode Fuzzy Hash: a4f2b7dc4152bbec4232ae62c7abd223582934fc3dd4a00036873451cb43cb98
                                                                              • Instruction Fuzzy Hash: FF21C2B5D11219AFCB00DF9AD884ADEFBB4FB48310F10812AE918B7341D374A954CBA5
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2945483903.0000000000ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ABD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_abd000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                                                                              • Instruction ID: ef3bef8e2f3936d7a216663552acb5c14453bc11ea58b9775fe97e6041f74fe0
                                                                              • Opcode Fuzzy Hash: 5bc96cb8dbab4a459d35c79ebbe5ba2a9dff6c5f08df11ade35b896c854f64ae
                                                                              • Instruction Fuzzy Hash: 2E11BB75504280CFCB11DF14D5C4B15BBA2FB84324F28C6AAD80A4B696C33AD80ACBA2
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4d4fcc51c1423bd9f2d04938f203cfe10bd639f479f4c57ea75a9b62e5318466
                                                                              • Instruction ID: bea88155404b8d42e1bab6af918cdbc991a7e5e34cb77ec6d4cf20300d9d2641
                                                                              • Opcode Fuzzy Hash: 4d4fcc51c1423bd9f2d04938f203cfe10bd639f479f4c57ea75a9b62e5318466
                                                                              • Instruction Fuzzy Hash: FD01D631B210121FDB64A66EAC5071BA7DADBC9760F548839F40EC7385DE65DC028385
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3439dcfb327f6dd9bb0c637d0d23eb535723a01ae5ab7a0b4bc316bcef5d04c3
                                                                              • Instruction ID: ca86fa4e17a48863e4fde1d3371cfa791c989139f1cdbf3eef2fcb18bb6860aa
                                                                              • Opcode Fuzzy Hash: 3439dcfb327f6dd9bb0c637d0d23eb535723a01ae5ab7a0b4bc316bcef5d04c3
                                                                              • Instruction Fuzzy Hash: 2A01A230B212111FDB60A67D98A572E66D6EB8A754F508C29F54FC7385ED21DC028385
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2945418187.0000000000AAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_aad000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 086a7087d76b7f6f84ee1d673e87259b8b8355264a7025646e28c2ca0df3851b
                                                                              • Instruction ID: d33678b5a44d8ef3816b85cc7f8b0efb30864e1bfe705bd9765bed8fc8e789d7
                                                                              • Opcode Fuzzy Hash: 086a7087d76b7f6f84ee1d673e87259b8b8355264a7025646e28c2ca0df3851b
                                                                              • Instruction Fuzzy Hash: 59F0C2710043409AEB208B06DC88B66FFA8EB51334F18C45AED4D1B6C6C379A844CAB1
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 99eaf142ca84b44b7758b2b24655deb4517eb82ac2963be868c188314192dacd
                                                                              • Instruction ID: 3d067cabe5f452e13a373bebf372b6a39bccf880cb3ff6395ffb08953b09e73b
                                                                              • Opcode Fuzzy Hash: 99eaf142ca84b44b7758b2b24655deb4517eb82ac2963be868c188314192dacd
                                                                              • Instruction Fuzzy Hash: 4EE0C270E22149AFDF50EAB4CD0575E73BCD701208F2088A6DC08CF281E976CE41D380
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3536368fe46417f556c424d150c4c0772af8913a7b4ffcf963b19080fed9bba2
                                                                              • Instruction ID: 25c729b6d705871322c783ba1d36d30f9ca2f56c8ff56e8ac37574be8b830c62
                                                                              • Opcode Fuzzy Hash: 3536368fe46417f556c424d150c4c0772af8913a7b4ffcf963b19080fed9bba2
                                                                              • Instruction Fuzzy Hash: B4B0928E40A3E21FD243A2B48D262961AA00D5782038B02D38571C56E2DA4D448A8A26
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: c<$$c<$(c<$.5vq$6c<$Hc<$Vc<$Zc<$kc<$uc<$xc<$$^q$$^q$$^q$$^q$$^q$$^q
                                                                              • API String ID: 0-1940057540
                                                                              • Opcode ID: 6e9d61812a2d218a175037ed273de2da343ec08de6ba23bb3f00c5636095c0ef
                                                                              • Instruction ID: 1f2e65a66fc28ea641c79f870b8cd5dd7d45aa8edcd80355aaaeace3a1a3e57a
                                                                              • Opcode Fuzzy Hash: 6e9d61812a2d218a175037ed273de2da343ec08de6ba23bb3f00c5636095c0ef
                                                                              • Instruction Fuzzy Hash: 67F16E30B113099FDB58EFB9C4546AEB7E2AF84301F60856DE41AAB395DF709C81CB91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                              • API String ID: 0-3823777903
                                                                              • Opcode ID: b65285b3f0530bdc2152f95f66efcc8fadbe32258cb84c9b9f4adf4acbc7c957
                                                                              • Instruction ID: 335afd78e4f6be63aca0426e03619ae9b15beb356a460d6d03211831ddfc02b6
                                                                              • Opcode Fuzzy Hash: b65285b3f0530bdc2152f95f66efcc8fadbe32258cb84c9b9f4adf4acbc7c957
                                                                              • Instruction Fuzzy Hash: A991A130E212099FDB64FF68DA557AE77F2AF84340F508429E815AB2D5DF748C81CB91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (c<$.5vq$6c<$Hc<$Vc<$Zc<
                                                                              • API String ID: 0-737864906
                                                                              • Opcode ID: 5cac1e45a2531cd5741181d19014c130eea5db600f9318af78c2c5ecd16bd34a
                                                                              • Instruction ID: 677d547b6a8392325286963a046a7990b7d0806a0abba8793ae05b605ea71b89
                                                                              • Opcode Fuzzy Hash: 5cac1e45a2531cd5741181d19014c130eea5db600f9318af78c2c5ecd16bd34a
                                                                              • Instruction Fuzzy Hash: D3718C30A113198FDB54EFA8C8557AEB7F2AF88301F60856DE409AB395DB709C81CB95
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Cc<$Jc<$Sc<$fc<$lc<
                                                                              • API String ID: 0-1955103774
                                                                              • Opcode ID: ee8e171c61d41db8d0fcaffeb37d1596a45be9e4c5259f9dcdd19082bcf87b3e
                                                                              • Instruction ID: 7707616347db0d7db90bacc083218793824b4184ead8f0d90bb197ca8999df7d
                                                                              • Opcode Fuzzy Hash: ee8e171c61d41db8d0fcaffeb37d1596a45be9e4c5259f9dcdd19082bcf87b3e
                                                                              • Instruction Fuzzy Hash: E551D431B111055FCB44EBB8D8506AEB2F7EBC9610F50856AE91AE7384EE70DC428B96
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: c<$Ec<$Uc<$`c<
                                                                              • API String ID: 0-665649908
                                                                              • Opcode ID: c6625474b666b1e0e4b34634b87bf104022cf440256a02863c6332542bb5a277
                                                                              • Instruction ID: d3dccaba8f2f0bf08f2fec7469bb2bdc7b38e5eb02c1e5f814622995037e2d69
                                                                              • Opcode Fuzzy Hash: c6625474b666b1e0e4b34634b87bf104022cf440256a02863c6332542bb5a277
                                                                              • Instruction Fuzzy Hash: 51D1A030E202198FCBA4EF64CC846ADB7F2AF85304F518499D849AF394DB709D86CB81
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $^q$$^q$$^q$$^q
                                                                              • API String ID: 0-2125118731
                                                                              • Opcode ID: af9c54b9eb35bb4414a64a33ba85b1da8e02c4c2051ea21c4913b7ab0482a722
                                                                              • Instruction ID: 1f2a331fcf3d2ddc4af79f5045c96d7a6f56e92a546847f1e28f3a7072af922f
                                                                              • Opcode Fuzzy Hash: af9c54b9eb35bb4414a64a33ba85b1da8e02c4c2051ea21c4913b7ab0482a722
                                                                              • Instruction Fuzzy Hash: 19B15030B112199FDB54EF78C8546AEB7E2AF84301F548969E406DB395DF70DC82CB90
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: ;c<$Dc<$ac<$qc<
                                                                              • API String ID: 0-323276557
                                                                              • Opcode ID: f4083bf011e5eb57fd9edd11307bec6fec3e81e2d823cd3a25f6b5a64094325c
                                                                              • Instruction ID: 75b0a0e07d251fe216ab1a34558184300f75a41133a6f91be0e1133e094330d6
                                                                              • Opcode Fuzzy Hash: f4083bf011e5eb57fd9edd11307bec6fec3e81e2d823cd3a25f6b5a64094325c
                                                                              • Instruction Fuzzy Hash: 6A71AF31F112059FCB54EBA8D8805ADB7F6EF88310F508969E94AE7391EB319C45CB91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: LR^q$LR^q$$^q$$^q
                                                                              • API String ID: 0-2454687669
                                                                              • Opcode ID: d9f8d4991801af7f6d283fe04d5a866028f685ecee351c0ef3928d3a20a76dd1
                                                                              • Instruction ID: 49235c2290afa7ff6b177743fa0bac6e745cddb051bdeff9a343b60a85b0702f
                                                                              • Opcode Fuzzy Hash: d9f8d4991801af7f6d283fe04d5a866028f685ecee351c0ef3928d3a20a76dd1
                                                                              • Instruction Fuzzy Hash: 6F61D330B212059FDB58FB78C851A6EB6E2EF85700F5089A9F816AB395DF30DC41C7A5
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $^q$$^q$$^q$$^q
                                                                              • API String ID: 0-2125118731
                                                                              • Opcode ID: 81c255c9de4ebcb67e42735f957b62f4255be658663cbb07a1215cee834f6af2
                                                                              • Instruction ID: e00e9ff07b7f4b6dcb0e3b178e1f339c01843525880a3dbba316e85aef62921a
                                                                              • Opcode Fuzzy Hash: 81c255c9de4ebcb67e42735f957b62f4255be658663cbb07a1215cee834f6af2
                                                                              • Instruction Fuzzy Hash: 4E519330F212069FDF55BB68D9506AD73F2EF84341F548969E815DB295EA30DC41CB41
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.2950775817.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_6280000_PO P24-1100.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: ;c<$Dc<$ac<$qc<
                                                                              • API String ID: 0-323276557
                                                                              • Opcode ID: 2238ab83c4f0223ee74104ce27fb12d8f0cd6da878bc95bed0e05483d4bfcea9
                                                                              • Instruction ID: f0103e8d3f725c154b4844fc450b24d70ca43cde13960f95a1418f71834e2f01
                                                                              • Opcode Fuzzy Hash: 2238ab83c4f0223ee74104ce27fb12d8f0cd6da878bc95bed0e05483d4bfcea9
                                                                              • Instruction Fuzzy Hash: 8A41BF70B102059FCB54EFB8D8955AEBBF2EF88300B5049A9E44AE7395DE319C42CB91