Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SoA_14000048_002.exe

Overview

General Information

Sample name:SoA_14000048_002.exe
Analysis ID:1567250
MD5:a7d9ada23f25dbed8ea51f58cde3eac7
SHA1:b35520786874c9b7e7d20ef27cb41a53a182a159
SHA256:8d8331f4dc08f7610760e59020a52423569dbbc5e7b03efe8026917f4905d19b
Tags:AgentTeslaexeuser-threatcat_ch
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • SoA_14000048_002.exe (PID: 7740 cmdline: "C:\Users\user\Desktop\SoA_14000048_002.exe" MD5: A7D9ADA23F25DBED8EA51F58CDE3EAC7)
    • powershell.exe (PID: 8060 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 8076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 3232 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • SoA_14000048_002.exe (PID: 8068 cmdline: "C:\Users\user\Desktop\SoA_14000048_002.exe" MD5: A7D9ADA23F25DBED8EA51F58CDE3EAC7)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": "     *o9H+18Q4%;M     "}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2564300475.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
    00000005.00000002.2566159079.0000000002A6A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000005.00000002.2566159079.0000000002A11000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000005.00000002.2566159079.0000000002A11000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.1373185724.00000000038F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            0.2.SoA_14000048_002.exe.3968520.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              5.2.SoA_14000048_002.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.SoA_14000048_002.exe.3991540.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  0.2.SoA_14000048_002.exe.3991540.3.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.SoA_14000048_002.exe.3968520.1.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SoA_14000048_002.exe", ParentImage: C:\Users\user\Desktop\SoA_14000048_002.exe, ParentProcessId: 7740, ParentProcessName: SoA_14000048_002.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe", ProcessId: 8060, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SoA_14000048_002.exe", ParentImage: C:\Users\user\Desktop\SoA_14000048_002.exe, ParentProcessId: 7740, ParentProcessName: SoA_14000048_002.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe", ProcessId: 8060, ProcessName: powershell.exe
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 199.79.62.115, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\SoA_14000048_002.exe, Initiated: true, ProcessId: 8068, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49714
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SoA_14000048_002.exe", ParentImage: C:\Users\user\Desktop\SoA_14000048_002.exe, ParentProcessId: 7740, ParentProcessName: SoA_14000048_002.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe", ProcessId: 8060, ProcessName: powershell.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-03T10:37:07.562970+010020301711A Network Trojan was detected192.168.2.749714199.79.62.115587TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-03T10:37:07.562970+010028397231Malware Command and Control Activity Detected192.168.2.749714199.79.62.115587TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": " *o9H+18Q4%;M "}
                      Source: SoA_14000048_002.exeReversingLabs: Detection: 60%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: SoA_14000048_002.exeJoe Sandbox ML: detected
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: /log.tmp
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <br>[
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ]<br>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <br>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Time:
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <br>User Name:
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <br>Computer Name:
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <br>OSFullName:
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <br>CPU:
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <br>RAM:
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <br>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: IP Address:
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <br>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <hr>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: New
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: IP Address:
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: false
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: false
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: false
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: false
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: false
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: false
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: false
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: false
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: false
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: mail.mbarieservicesltd.com
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: saless@mbarieservicesltd.com
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: *o9H+18Q4%;M
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: iinfo@mbarieservicesltd.com
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: false
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: false
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: appdata
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: KTvkzEc
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: KTvkzEc.exe
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: KTvkzEc
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Type
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <br>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <hr>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <br>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <b>[
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ]</b> (
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: )<br>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {BACK}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {ALT+TAB}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {ALT+F4}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {TAB}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {ESC}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {Win}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {CAPSLOCK}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {KEYUP}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {KEYDOWN}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {KEYLEFT}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {KEYRIGHT}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {DEL}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {END}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {HOME}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {Insert}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {NumLock}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {PageDown}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {PageUp}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {ENTER}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {F1}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {F2}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {F3}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {F4}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {F5}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {F6}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {F7}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {F8}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {F9}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {F10}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {F11}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {F12}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: control
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {CTRL}
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: &amp;
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: &lt;
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: &gt;
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: &quot;
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <br><hr>Copied Text: <br>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <hr>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: logins
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: IE/Edge
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Windows Secure Note
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Windows Web Password Credential
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Windows Credential Picker Protector
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Web Credentials
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Windows Credentials
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Windows Domain Certificate Credential
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Windows Domain Password Credential
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Windows Extended Credential
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SchemaId
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: pResourceElement
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: pIdentityElement
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: pPackageSid
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: pAuthenticatorElement
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: IE/Edge
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: UC Browser
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: UCBrowser\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Login Data
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: journal
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: wow_logins
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Safari for Windows
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <array>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <dict>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <string>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: </string>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <string>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: </string>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <data>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: </data>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: -convert xml1 -s -o "
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \fixed_keychain.xml"
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Microsoft\Protect\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: credential
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: QQ Browser
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Tencent\QQBrowser\User Data
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Default\EncryptedStorage
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Profile
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \EncryptedStorage
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: entries
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: category
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: str3
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: str2
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: blob0
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: password_value
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: IncrediMail
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: PopPassword
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SmtpPassword
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\IncrediMail\Identities\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Accounts_New
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: PopPassword
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SmtpPassword
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SmtpServer
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: EmailAddress
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Eudora
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: current
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Settings
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SavePasswordText
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Settings
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ReturnAddress
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Falkon Browser
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \falkon\profiles\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: profiles.ini
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: profiles.ini
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \browsedata.db
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: autofill
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ClawsMail
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Claws-mail
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \clawsrc
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \clawsrc
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: passkey0
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: master_passphrase_salt=(.+)
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \accountrc
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: smtp_server
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: address
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: account
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \passwordstorerc
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: {(.*),(.*)}(.*)
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Flock Browser
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: APPDATA
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Flock\Browser\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: signons3.txt
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: DynDns
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ALLUSERSPROFILE
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Dyn\Updater\config.dyndns
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: username=
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: password=
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: https://account.dyn.com/
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: t6KzXhCh
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ALLUSERSPROFILE
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Dyn\Updater\daemon.cfg
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: global
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: accounts
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: account.
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: username
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: account.
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Psi/Psi+
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: name
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Psi/Psi+
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: APPDATA
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Psi\profiles
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: APPDATA
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Psi+\profiles
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \accounts.xml
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \accounts.xml
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: OpenVPN
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\OpenVPN-GUI\configs\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: username
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: auth-data
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: entropy
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: USERPROFILE
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \OpenVPN\config\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: remote
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: remote
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: NordVPN
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: NordVPN
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: NordVpn.exe*
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: user.config
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: //setting[@name='Username']/value
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: //setting[@name='Password']/value
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: NordVPN
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Private Internet Access
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: %ProgramW6432%
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Private Internet Access\data
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Private Internet Access\data
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \account.json
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: .*"username":"(.*?)"
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: .*"password":"(.*?)"
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Private Internet Access
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: privateinternetaccess.com
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: FileZilla
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: APPDATA
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \FileZilla\recentservers.xml
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: APPDATA
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \FileZilla\recentservers.xml
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <Server>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <Host>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <Host>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: </Host>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <Port>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: </Port>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <User>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <User>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: </User>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <Pass encoding="base64">
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <Pass encoding="base64">
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: </Pass>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <Pass>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <Pass encoding="base64">
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: </Pass>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: CoreFTP
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: User
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Host
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Port
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: hdfzpysvpzimorhk
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: WinSCP
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: HostName
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: UserName
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: PublicKeyFile
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: PortNumber
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: WinSCP
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ABCDEF
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Flash FXP
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: port
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: user
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: pass
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: quick.dat
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Sites.dat
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \FlashFXP\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \FlashFXP\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: FTP Navigator
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SystemDrive
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \FTP Navigator\Ftplist.txt
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Server
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: No Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: User
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SmartFTP
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: APPDATA
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: WS_FTP
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: appdata
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: HOST
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: PWD=
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: PWD=
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: FtpCommander
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SystemDrive
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SystemDrive
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SystemDrive
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \cftp\Ftplist.txt
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ;Password=
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ;User=
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ;Server=
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ;Port=
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ;Port=
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ;Password=
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ;User=
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ;Anonymous=
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: FTPGetter
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \FTPGetter\servers.xml
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <server>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <server_ip>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <server_ip>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: </server_ip>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <server_port>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: </server_port>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <server_user_name>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <server_user_name>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: </server_user_name>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <server_user_password>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: <server_user_password>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: </server_user_password>
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: FTPGetter
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: The Bat!
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: appdata
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \The Bat!
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Account.CFN
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Account.CFN
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Becky!
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: DataDir
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Folder.lst
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Mailbox.ini
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Account
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: PassWd
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Account
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SMTPServer
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Account
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: MailAddress
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Becky!
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Outlook
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Email
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: IMAP Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: POP3 Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: HTTP Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SMTP Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Email
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Email
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Email
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: IMAP Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: POP3 Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: HTTP Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SMTP Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Server
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Windows Mail App
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Email
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Server
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SchemaId
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: pResourceElement
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: pIdentityElement
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: pPackageSid
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: pAuthenticatorElement
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: syncpassword
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: mailoutgoing
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: FoxMail
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Executable
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: FoxmailPath
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Storage\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Storage\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \mail
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \mail
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Accounts\Account.rec0
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Accounts\Account.rec0
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Account.stg
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Account.stg
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: POP3Host
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SMTPHost
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: IncomingServer
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Account
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: MailAddress
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: POP3Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Opera Mail
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: opera:
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: PocoMail
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: appdata
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Pocomail\accounts.ini
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Email
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: POPPass
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SMTPPass
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SMTP
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: eM Client
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: eM Client\accounts.dat
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: eM Client
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Accounts
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: "Username":"
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: "Secret":"
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: "ProviderName":"
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: o6806642kbM7c5
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Mailbird
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SenderIdentities
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Accounts
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \Mailbird\Store\Store.db
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Server_Host
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Accounts
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Email
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Username
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: EncryptedPassword
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Mailbird
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: RealVNC 4.x
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: RealVNC 3.x
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SOFTWARE\RealVNC\vncserver
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: RealVNC 4.x
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: SOFTWARE\RealVNC\WinVNC4
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: RealVNC 3.x
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\ORL\WinVNC3
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: TightVNC
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\TightVNC\Server
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: TightVNC
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\TightVNC\Server
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: PasswordViewOnly
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: TightVNC ControlPassword
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\TightVNC\Server
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ControlPassword
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: TigerVNC
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\TigerVNC\Server
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Password
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: passwd
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: passwd2
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ProgramFiles
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: passwd
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ProgramFiles
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: passwd2
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ProgramFiles
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: passwd
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ProgramFiles
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: passwd2
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: passwd
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: passwd2
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: JDownloader 2.0
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: JDownloader 2.0\cfg
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: org.jdownloader.settings.AccountSettings.accounts.ejs
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: JDownloader 2.0\cfg
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: jd.controlling.authentication.AuthenticationControllerSettings.list.ejs
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Paltalk
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: Software\A.V.M.\Paltalk NG\common_settings\core\users\creds\
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpackString decryptor: nickname
                      Source: SoA_14000048_002.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: SoA_14000048_002.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.7:49714 -> 199.79.62.115:587
                      Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.7:49714 -> 199.79.62.115:587
                      Source: global trafficTCP traffic: 192.168.2.7:49714 -> 199.79.62.115:587
                      Source: Joe Sandbox ViewIP Address: 199.79.62.115 199.79.62.115
                      Source: global trafficTCP traffic: 192.168.2.7:49714 -> 199.79.62.115:587
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: mail.mbarieservicesltd.com
                      Source: SoA_14000048_002.exe, 00000005.00000002.2566159079.0000000002A6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.mbarieservicesltd.com
                      Source: SoA_14000048_002.exe, 00000000.00000002.1370186143.00000000028B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: SoA_14000048_002.exeString found in binary or memory: http://tempuri.org/kviskotekaDbDataSet.xsdcIgra
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 0_2_00FEDE840_2_00FEDE84
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 0_2_06F503000_2_06F50300
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 0_2_06F518100_2_06F51810
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_00FA41405_2_00FA4140
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_00FA4D585_2_00FA4D58
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_00FA44885_2_00FA4488
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_063996505_2_06399650
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_0639AF785_2_0639AF78
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_063957685_2_06395768
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_0639E89F5_2_0639E89F
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_063970F85_2_063970F8
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_063981405_2_06398140
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_06398D985_2_06398D98
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_063900075_2_06390007
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_063900405_2_06390040
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_063E3B045_2_063E3B04
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_063E19A05_2_063E19A0
                      Source: SoA_14000048_002.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                      Source: SoA_14000048_002.exe, 00000000.00000002.1383984238.00000000071B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs SoA_14000048_002.exe
                      Source: SoA_14000048_002.exe, 00000000.00000002.1381849179.0000000005390000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs SoA_14000048_002.exe
                      Source: SoA_14000048_002.exe, 00000000.00000002.1370186143.00000000028BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs SoA_14000048_002.exe
                      Source: SoA_14000048_002.exe, 00000000.00000002.1373185724.00000000038B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs SoA_14000048_002.exe
                      Source: SoA_14000048_002.exe, 00000000.00000002.1373185724.00000000038F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs SoA_14000048_002.exe
                      Source: SoA_14000048_002.exe, 00000000.00000002.1373185724.00000000038F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs SoA_14000048_002.exe
                      Source: SoA_14000048_002.exe, 00000000.00000002.1370186143.00000000028B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs SoA_14000048_002.exe
                      Source: SoA_14000048_002.exe, 00000000.00000000.1305966772.00000000005B2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameJPjX.exe4 vs SoA_14000048_002.exe
                      Source: SoA_14000048_002.exe, 00000000.00000002.1369082696.0000000000A5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SoA_14000048_002.exe
                      Source: SoA_14000048_002.exe, 00000005.00000002.2564300475.000000000042C000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs SoA_14000048_002.exe
                      Source: SoA_14000048_002.exe, 00000005.00000002.2564524467.0000000000B39000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SoA_14000048_002.exe
                      Source: SoA_14000048_002.exeBinary or memory string: OriginalFilenameJPjX.exe4 vs SoA_14000048_002.exe
                      Source: SoA_14000048_002.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: SoA_14000048_002.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, qF5PIxdw1343LrEOSg.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, qF5PIxdw1343LrEOSg.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, kNhCWKSMRfQye72ekn.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, kNhCWKSMRfQye72ekn.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, kNhCWKSMRfQye72ekn.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, kNhCWKSMRfQye72ekn.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, kNhCWKSMRfQye72ekn.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, kNhCWKSMRfQye72ekn.csSecurity API names: _0020.AddAccessRule
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/6@1/1
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SoA_14000048_002.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8076:120:WilError_03
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zsuplvqc.eaa.ps1Jump to behavior
                      Source: SoA_14000048_002.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: SoA_14000048_002.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: SoA_14000048_002.exeReversingLabs: Detection: 60%
                      Source: unknownProcess created: C:\Users\user\Desktop\SoA_14000048_002.exe "C:\Users\user\Desktop\SoA_14000048_002.exe"
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe"
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess created: C:\Users\user\Desktop\SoA_14000048_002.exe "C:\Users\user\Desktop\SoA_14000048_002.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess created: C:\Users\user\Desktop\SoA_14000048_002.exe "C:\Users\user\Desktop\SoA_14000048_002.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: iconcodecservice.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: SoA_14000048_002.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: SoA_14000048_002.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Data Obfuscation

                      barindex
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, kNhCWKSMRfQye72ekn.cs.Net Code: LdoQZC2KCg System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.SoA_14000048_002.exe.38d1d60.0.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.SoA_14000048_002.exe.5390000.4.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, kNhCWKSMRfQye72ekn.cs.Net Code: LdoQZC2KCg System.Reflection.Assembly.Load(byte[])
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_06392690 push eax; retf 5_2_06392691
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_06391CCE push cs; retf 5_2_06391CCF
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_06391810 push esp; ret 5_2_06391811
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeCode function: 5_2_06391893 pushfd ; ret 5_2_06391899
                      Source: SoA_14000048_002.exeStatic PE information: section name: .text entropy: 7.65389784425923
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, k4MMdasC3XGu2tawcn.csHigh entropy of concatenated method names: 'CWfpnfvJOm', 'G7SpeeGmfL', 'n0Rpq797j8', 'E7ZqNWMlU3', 'yXAqzcIgQ3', 'EBOpIEZmjv', 'xLPpPdw673', 'k07p1hcmiG', 'SYIptRymtf', 'C9rpQY2qlg'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, uAyEWNJBAU7tj5E8O2.csHigh entropy of concatenated method names: 'Dispose', 's5mPEQmp7q', 'n5u1keYtSH', 'KqGq1UwG3v', 'VEfPN9uD9b', 'wyGPzJj0tA', 'ProcessDialogKey', 'CyC1IN7p98', 'e511PTjHhd', 'Cr311os8dc'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, nwmwl2zUCn90GjaNae.csHigh entropy of concatenated method names: 'mOCoyjP1fn', 'Q6XodNa4b0', 'OpnorN7Lm1', 'qr1ogvmDXw', 'Na1okhdrfI', 'Te7ovHEsY9', 'aRHo2WVHgu', 'ovAoUAVTqw', 'TKQoCrUoDu', 'XlcouuHVNB'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, qF5PIxdw1343LrEOSg.csHigh entropy of concatenated method names: 'xZgJFD15Dv', 'b2WJOwRQX4', 'dTFJDtllbb', 'gH7JRVSqjm', 'nbNJj5UsQx', 'pvZJMTwsQa', 'u8tJ3vsHvx', 'TsNJKDt3xQ', 'DZNJEhksFH', 'qJKJNYdhQS'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, FTWgCk1OQAyqsGSvd0.csHigh entropy of concatenated method names: 'MfcZfBfto', 'FDra7u8am', 'CELypiAIm', 'BlELTLhRN', 'EPGrShRPT', 'MpKTSwePY', 'o3KLv8s1f4wZlA5LyS', 'caTJB8mqKvPDLZHXoW', 'qH46yxVKs', 'H3Jo4XjPL'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, ts8dcdNgp7LJCxwOJR.csHigh entropy of concatenated method names: 'aOZoeQSjHn', 'GF4o0qHuPK', 'SVloqmNI75', 'byjop0C4Y4', 'f7ooGWAKmN', 'dxSoSMLIi2', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, AWZBxtQHeiUoOR7bIs.csHigh entropy of concatenated method names: 'LB6PpF5PIx', 't13PS43LrE', 'FLxPbTCfEk', 'vyUP4vyiBX', 'IidPVTiI5p', 'Fm2PfijFvS', 'a5Deu8wJqcurhTcgJS', 'C5voQlVYenUpY982wN', 'coLPPZM3xn', 'quAPtVnd3i'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, lcK4ta3FpG5mQmp7qM.csHigh entropy of concatenated method names: 'qBfGVFyLwh', 'BEJGcF67UX', 'HskGGKMlae', 'jgxGwvseiH', 'MRiGBgVTbj', 'RZpGUlGkn6', 'Dispose', 'GOP6n07oUU', 'm786JX3h01', 'SFr6epkxUB'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, CiBXojTU7f3ymmidTi.csHigh entropy of concatenated method names: 't8M0HegLhT', 'k7H0L5heik', 'c30emPpDkj', 'gFievIUqi8', 'toye2gtkUb', 'wqpeA6b2m2', 'H09esklPFT', 'QEPeX74Lps', 'A5hexuZZ8W', 'uHve5tGIeY'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, bfrhjwPQZyqfnVRxm8m.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'DvSlGpkQAZ', 'kRIlonULtk', 'KeAlw6xbqI', 'hqxll5PgyG', 'ckklB6HqJj', 'GoFlWw940Y', 'aAqlUGyTHG'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, j6BwDBxLyTb0urbYXI.csHigh entropy of concatenated method names: 'Xi1pC2ZU7P', 'WR2pu7wimJ', 'dgbpZDqdo5', 'Yl7padn8NN', 'kh6pH3Trkk', 'sEapy4G5vW', 'J7ApLppltO', 'GaPpdBSR0T', 'kNfpr09CKL', 'xmTpTLXy5y'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, Te88W8hRdyk5SlwA7E.csHigh entropy of concatenated method names: 'Rk5YdxTRFD', 'OKDYrYCVED', 'KnYYgvh0j9', 'sUuYkMbCxF', 'gsCYvNHVZ5', 'pqSY2h5bN9', 'VTnYskbRjJ', 'yYbYXyiXqK', 'vN5Y5NMg6y', 'yWlY8LhLWX'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, UHOgeiMGVfbw6SXv7Y.csHigh entropy of concatenated method names: 'fDlcKvuOdi', 'EWQcNHfL3Z', 'MCn6Ik25WW', 'rhR6PqTTXm', 'B8Qc8WcB47', 'WudciUaDor', 'KI9chZQ24l', 'tIDcF5IPno', 'ff7cOsLmDC', 'BUPcDYD6ex'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, ncGbGGex99qBuAjgo4.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'QXC1E4Ae74', 'k6f1Nt8Jg2', 'vdk1zHDgha', 'UJntINA8Df', 'Ou3tPXKIQE', 'rpEt10FQ6V', 'ei9ttlJjOV', 'sPYohtJ4qrpxwLJ2toe'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, VFmwKTPPO8FR9akdoPA.csHigh entropy of concatenated method names: 'nf9oNIUsVA', 'DeoozBq7yH', 'LjVwIrxGTy', 'gcfwPOem3I', 'Lamw1htMhu', 'Uf8wtOlnZq', 's5SwQxCxVJ', 'G7gw7kn8HH', 'LJ4wnLAZ6D', 'oMHwJY1e9u'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, w8RvCgrLxTCfEkByUv.csHigh entropy of concatenated method names: 'hUqeayHSnE', 'DMZeyRkIX0', 'Dwmedkk2C1', 'Bdperbconj', 'JfGeVYWBMv', 'RC3ef5ELDU', 'VbTecW5e8T', 'xdme6Tndug', 'jBQeGWvIcc', 'ln8eobjqeC'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, kNhCWKSMRfQye72ekn.csHigh entropy of concatenated method names: 'fFgt7eSIBs', 'D7XtnJxpq8', 'AYdtJwNYd5', 'qASteChRoJ', 'ssZt0gs3gC', 'vZ6tqtLdxA', 'jK2tpd6rGX', 'vIAtSBQjp0', 'LKYt9VUX7d', 'a5stbFRoqq'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, a5pgm2gijFvSckIcuI.csHigh entropy of concatenated method names: 'uHWq7dCvt3', 'z0BqJ6SWlx', 'GeDq0nXIuS', 'WWEqprmOnl', 'mfyqSo8Stn', 'PkK0j4SFO9', 'Jiy0MkQjbh', 'Wa703bXwHN', 'cOD0KrGmfP', 'We30E0UNTc'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, KxpVQxFesHIPDHjr0M.csHigh entropy of concatenated method names: 'QGQV59vtEn', 'OYAVid0Hm3', 'iKlVFtntsx', 'qa4VOOwP4q', 'LskVkZMfO6', 'H0nVmBnKuG', 'hOPVvvXU8F', 'pTxV2KP04O', 'doOVA8NIRS', 'ucCVse4XHv'
                      Source: 0.2.SoA_14000048_002.exe.3ab9880.2.raw.unpack, xN7p98E751TjHhdLr3.csHigh entropy of concatenated method names: 'XerGglx72o', 'rB6GkS7IRX', 'X86Gml3Q0Q', 'hKEGvGHqaa', 'cV2G2ZrCyS', 'RaZGAfu5pv', 'kjHGslKerT', 's3bGXCOGgq', 'DVHGxm3upn', 'TL8G5Vr9MV'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, k4MMdasC3XGu2tawcn.csHigh entropy of concatenated method names: 'CWfpnfvJOm', 'G7SpeeGmfL', 'n0Rpq797j8', 'E7ZqNWMlU3', 'yXAqzcIgQ3', 'EBOpIEZmjv', 'xLPpPdw673', 'k07p1hcmiG', 'SYIptRymtf', 'C9rpQY2qlg'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, uAyEWNJBAU7tj5E8O2.csHigh entropy of concatenated method names: 'Dispose', 's5mPEQmp7q', 'n5u1keYtSH', 'KqGq1UwG3v', 'VEfPN9uD9b', 'wyGPzJj0tA', 'ProcessDialogKey', 'CyC1IN7p98', 'e511PTjHhd', 'Cr311os8dc'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, nwmwl2zUCn90GjaNae.csHigh entropy of concatenated method names: 'mOCoyjP1fn', 'Q6XodNa4b0', 'OpnorN7Lm1', 'qr1ogvmDXw', 'Na1okhdrfI', 'Te7ovHEsY9', 'aRHo2WVHgu', 'ovAoUAVTqw', 'TKQoCrUoDu', 'XlcouuHVNB'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, qF5PIxdw1343LrEOSg.csHigh entropy of concatenated method names: 'xZgJFD15Dv', 'b2WJOwRQX4', 'dTFJDtllbb', 'gH7JRVSqjm', 'nbNJj5UsQx', 'pvZJMTwsQa', 'u8tJ3vsHvx', 'TsNJKDt3xQ', 'DZNJEhksFH', 'qJKJNYdhQS'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, FTWgCk1OQAyqsGSvd0.csHigh entropy of concatenated method names: 'MfcZfBfto', 'FDra7u8am', 'CELypiAIm', 'BlELTLhRN', 'EPGrShRPT', 'MpKTSwePY', 'o3KLv8s1f4wZlA5LyS', 'caTJB8mqKvPDLZHXoW', 'qH46yxVKs', 'H3Jo4XjPL'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, ts8dcdNgp7LJCxwOJR.csHigh entropy of concatenated method names: 'aOZoeQSjHn', 'GF4o0qHuPK', 'SVloqmNI75', 'byjop0C4Y4', 'f7ooGWAKmN', 'dxSoSMLIi2', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, AWZBxtQHeiUoOR7bIs.csHigh entropy of concatenated method names: 'LB6PpF5PIx', 't13PS43LrE', 'FLxPbTCfEk', 'vyUP4vyiBX', 'IidPVTiI5p', 'Fm2PfijFvS', 'a5Deu8wJqcurhTcgJS', 'C5voQlVYenUpY982wN', 'coLPPZM3xn', 'quAPtVnd3i'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, lcK4ta3FpG5mQmp7qM.csHigh entropy of concatenated method names: 'qBfGVFyLwh', 'BEJGcF67UX', 'HskGGKMlae', 'jgxGwvseiH', 'MRiGBgVTbj', 'RZpGUlGkn6', 'Dispose', 'GOP6n07oUU', 'm786JX3h01', 'SFr6epkxUB'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, CiBXojTU7f3ymmidTi.csHigh entropy of concatenated method names: 't8M0HegLhT', 'k7H0L5heik', 'c30emPpDkj', 'gFievIUqi8', 'toye2gtkUb', 'wqpeA6b2m2', 'H09esklPFT', 'QEPeX74Lps', 'A5hexuZZ8W', 'uHve5tGIeY'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, bfrhjwPQZyqfnVRxm8m.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'DvSlGpkQAZ', 'kRIlonULtk', 'KeAlw6xbqI', 'hqxll5PgyG', 'ckklB6HqJj', 'GoFlWw940Y', 'aAqlUGyTHG'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, j6BwDBxLyTb0urbYXI.csHigh entropy of concatenated method names: 'Xi1pC2ZU7P', 'WR2pu7wimJ', 'dgbpZDqdo5', 'Yl7padn8NN', 'kh6pH3Trkk', 'sEapy4G5vW', 'J7ApLppltO', 'GaPpdBSR0T', 'kNfpr09CKL', 'xmTpTLXy5y'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, Te88W8hRdyk5SlwA7E.csHigh entropy of concatenated method names: 'Rk5YdxTRFD', 'OKDYrYCVED', 'KnYYgvh0j9', 'sUuYkMbCxF', 'gsCYvNHVZ5', 'pqSY2h5bN9', 'VTnYskbRjJ', 'yYbYXyiXqK', 'vN5Y5NMg6y', 'yWlY8LhLWX'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, UHOgeiMGVfbw6SXv7Y.csHigh entropy of concatenated method names: 'fDlcKvuOdi', 'EWQcNHfL3Z', 'MCn6Ik25WW', 'rhR6PqTTXm', 'B8Qc8WcB47', 'WudciUaDor', 'KI9chZQ24l', 'tIDcF5IPno', 'ff7cOsLmDC', 'BUPcDYD6ex'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, ncGbGGex99qBuAjgo4.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'QXC1E4Ae74', 'k6f1Nt8Jg2', 'vdk1zHDgha', 'UJntINA8Df', 'Ou3tPXKIQE', 'rpEt10FQ6V', 'ei9ttlJjOV', 'sPYohtJ4qrpxwLJ2toe'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, VFmwKTPPO8FR9akdoPA.csHigh entropy of concatenated method names: 'nf9oNIUsVA', 'DeoozBq7yH', 'LjVwIrxGTy', 'gcfwPOem3I', 'Lamw1htMhu', 'Uf8wtOlnZq', 's5SwQxCxVJ', 'G7gw7kn8HH', 'LJ4wnLAZ6D', 'oMHwJY1e9u'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, w8RvCgrLxTCfEkByUv.csHigh entropy of concatenated method names: 'hUqeayHSnE', 'DMZeyRkIX0', 'Dwmedkk2C1', 'Bdperbconj', 'JfGeVYWBMv', 'RC3ef5ELDU', 'VbTecW5e8T', 'xdme6Tndug', 'jBQeGWvIcc', 'ln8eobjqeC'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, kNhCWKSMRfQye72ekn.csHigh entropy of concatenated method names: 'fFgt7eSIBs', 'D7XtnJxpq8', 'AYdtJwNYd5', 'qASteChRoJ', 'ssZt0gs3gC', 'vZ6tqtLdxA', 'jK2tpd6rGX', 'vIAtSBQjp0', 'LKYt9VUX7d', 'a5stbFRoqq'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, a5pgm2gijFvSckIcuI.csHigh entropy of concatenated method names: 'uHWq7dCvt3', 'z0BqJ6SWlx', 'GeDq0nXIuS', 'WWEqprmOnl', 'mfyqSo8Stn', 'PkK0j4SFO9', 'Jiy0MkQjbh', 'Wa703bXwHN', 'cOD0KrGmfP', 'We30E0UNTc'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, KxpVQxFesHIPDHjr0M.csHigh entropy of concatenated method names: 'QGQV59vtEn', 'OYAVid0Hm3', 'iKlVFtntsx', 'qa4VOOwP4q', 'LskVkZMfO6', 'H0nVmBnKuG', 'hOPVvvXU8F', 'pTxV2KP04O', 'doOVA8NIRS', 'ucCVse4XHv'
                      Source: 0.2.SoA_14000048_002.exe.71b0000.5.raw.unpack, xN7p98E751TjHhdLr3.csHigh entropy of concatenated method names: 'XerGglx72o', 'rB6GkS7IRX', 'X86Gml3Q0Q', 'hKEGvGHqaa', 'cV2G2ZrCyS', 'RaZGAfu5pv', 'kjHGslKerT', 's3bGXCOGgq', 'DVHGxm3upn', 'TL8G5Vr9MV'

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: SoA_14000048_002.exe PID: 7740, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeMemory allocated: FE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeMemory allocated: 28B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeMemory allocated: 48B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeMemory allocated: 86B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeMemory allocated: 96B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeMemory allocated: 98A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeMemory allocated: A8A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeMemory allocated: FA0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeMemory allocated: 2A10000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeMemory allocated: 4A10000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7295Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2360Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeWindow / User API: threadDelayed 2382Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeWindow / User API: threadDelayed 7442Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 7760Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2064Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 7300Thread sleep count: 2382 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep count: 33 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -30437127721620741s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -99872s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 7300Thread sleep count: 7442 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -99764s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -99654s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -99535s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -99422s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -99281s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -99172s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -99062s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -98942s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -98813s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -98703s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -98594s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -98453s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -98343s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -98234s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -98125s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -98015s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -97906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -97797s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -97688s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -97563s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -97438s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -97313s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -97203s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -97094s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -96969s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -96859s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -96750s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -96641s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -96531s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -96422s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -96313s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -96188s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -96078s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -95969s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -95844s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -95734s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -95625s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -95516s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -95406s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -95297s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -95187s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -95078s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -94969s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -94844s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exe TID: 2020Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 99872Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 99764Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 99654Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 99535Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 99422Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 99281Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 99172Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 99062Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 98942Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 98813Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 98703Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 98594Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 98453Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 98343Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 98234Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 98125Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 98015Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 97906Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 97797Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 97688Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 97563Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 97438Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 97313Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 97203Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 97094Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 96969Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 96859Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 96750Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 96641Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 96531Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 96422Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 96313Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 96188Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 96078Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 95969Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 95844Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 95734Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 95625Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 95516Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 95406Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 95297Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 95187Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 95078Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 94969Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 94844Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: SoA_14000048_002.exe, 00000005.00000002.2565133002.0000000000C7B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe"
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeProcess created: C:\Users\user\Desktop\SoA_14000048_002.exe "C:\Users\user\Desktop\SoA_14000048_002.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeQueries volume information: C:\Users\user\Desktop\SoA_14000048_002.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeQueries volume information: C:\Users\user\Desktop\SoA_14000048_002.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000005.00000002.2566159079.0000000002A6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2566159079.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SoA_14000048_002.exe PID: 8068, type: MEMORYSTR
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.SoA_14000048_002.exe.3968520.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.SoA_14000048_002.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SoA_14000048_002.exe.3991540.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SoA_14000048_002.exe.3968520.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.2564300475.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1373185724.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Users\user\Desktop\SoA_14000048_002.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 00000005.00000002.2566159079.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SoA_14000048_002.exe PID: 8068, type: MEMORYSTR
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 00000005.00000002.2566159079.0000000002A6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2566159079.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SoA_14000048_002.exe PID: 8068, type: MEMORYSTR
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.SoA_14000048_002.exe.3968520.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.SoA_14000048_002.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SoA_14000048_002.exe.3991540.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SoA_14000048_002.exe.3991540.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SoA_14000048_002.exe.3968520.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.2564300475.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1373185724.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Masquerading
                      2
                      OS Credential Dumping
                      111
                      Security Software Discovery
                      Remote Services1
                      Email Collection
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      1
                      Credentials in Registry
                      1
                      Process Discovery
                      Remote Desktop Protocol11
                      Archive Collected Data
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)141
                      Virtualization/Sandbox Evasion
                      Security Account Manager141
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin Shares2
                      Data from Local System
                      1
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                      Process Injection
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput Capture11
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      File and Directory Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                      Obfuscated Files or Information
                      Cached Domain Credentials24
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                      Software Packing
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      SoA_14000048_002.exe61%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                      SoA_14000048_002.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.mbarieservicesltd.com
                      199.79.62.115
                      truefalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSoA_14000048_002.exe, 00000000.00000002.1370186143.00000000028B1000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://tempuri.org/kviskotekaDbDataSet.xsdcIgraSoA_14000048_002.exefalse
                            high
                            http://mail.mbarieservicesltd.comSoA_14000048_002.exe, 00000005.00000002.2566159079.0000000002A6A000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              199.79.62.115
                              mail.mbarieservicesltd.comUnited States
                              394695PUBLIC-DOMAIN-REGISTRYUSfalse
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1567250
                              Start date and time:2024-12-03 10:36:09 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 6m 7s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:12
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:SoA_14000048_002.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@7/6@1/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 35
                              • Number of non-executed functions: 1
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtCreateKey calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • VT rate limit hit for: SoA_14000048_002.exe
                              TimeTypeDescription
                              04:37:16API Interceptor47x Sleep call for process: SoA_14000048_002.exe modified
                              04:37:17API Interceptor13x Sleep call for process: powershell.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              199.79.62.115Quote 000002320.exeGet hashmaliciousAgentTeslaBrowse
                                LPO-2024-357.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  Quote5000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                    Quote1000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                      Quote 40240333-REV2.exeGet hashmaliciousAgentTeslaBrowse
                                        PO ALJAT-5804-2024.exeGet hashmaliciousAgentTeslaBrowse
                                          INQ#84790.exeGet hashmaliciousAgentTeslaBrowse
                                            LPO24.0524.exeGet hashmaliciousAgentTeslaBrowse
                                              1364. 2024.exeGet hashmaliciousAgentTeslaBrowse
                                                Quote_220072.exeGet hashmaliciousAgentTeslaBrowse
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  mail.mbarieservicesltd.comQuote 000002320.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  LPO-2024-357.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 199.79.62.115
                                                  Quote5000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 199.79.62.115
                                                  Quote1000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 199.79.62.115
                                                  Quote 40240333-REV2.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  PO ALJAT-5804-2024.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  INQ#84790.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  LPO24.0524.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  PUBLIC-DOMAIN-REGISTRYUSQuote 000002320.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 199.79.62.115
                                                  new booking 9086432659087.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 162.251.80.30
                                                  rAttached_updat.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                  • 103.76.231.42
                                                  LPO-2024-357.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 199.79.62.115
                                                  RFQ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 162.251.80.30
                                                  Quote5000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 199.79.62.115
                                                  Quote1000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                  • 199.79.62.115
                                                  shipping doc -GY298035826.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  • 162.251.80.30
                                                  New Purchase Order Document for PO1136908 000 SE.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 208.91.199.225
                                                  Pigroots.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                  • 199.79.63.24
                                                  No context
                                                  No context
                                                  Process:C:\Users\user\Desktop\SoA_14000048_002.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1216
                                                  Entropy (8bit):5.34331486778365
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                  Malicious:true
                                                  Reputation:high, very likely benign file
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):2232
                                                  Entropy (8bit):5.380503343696294
                                                  Encrypted:false
                                                  SSDEEP:48:+WSU4xympg4REoUP7gZ9tK8NPZHUx7u1iMuge//ZmUyus:+LHxveIjLZ2KRH6Ouggs
                                                  MD5:7FDEB30590D690798CB4FF648D3F4C45
                                                  SHA1:08A95A045358E16F0490196C26195F36D9159DF5
                                                  SHA-256:1AEB222D7804C65F3017C2CFB715654EB5EBFEEE52218231C3DA3E1EC89E662C
                                                  SHA-512:829634679AD5D3D14F5168CE88EAAB770DEC610400747649ADE6F3829879081DF1DC9A7BF0CCEDA3AD28D3A4FD35F2B17632B0451D44D6E452859FC25F91A691
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Reputation:high, very likely benign file
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):60
                                                  Entropy (8bit):4.038920595031593
                                                  Encrypted:false
                                                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                  Malicious:false
                                                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.645223696581445
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Windows Screen Saver (13104/52) 0.07%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  File name:SoA_14000048_002.exe
                                                  File size:712'704 bytes
                                                  MD5:a7d9ada23f25dbed8ea51f58cde3eac7
                                                  SHA1:b35520786874c9b7e7d20ef27cb41a53a182a159
                                                  SHA256:8d8331f4dc08f7610760e59020a52423569dbbc5e7b03efe8026917f4905d19b
                                                  SHA512:0bf234f64cd70b7d82b568bdbf0a1d0e648ff791d2c8b3cea83690b3e3b0d478e4ed6cd41efa0ede2f277f3db7260e32272ff3bfb6cd9a78e86c03173191d741
                                                  SSDEEP:12288:5SC25usx+XtTDnP7ec9O8r9tFQqoZM/dtzWaI/JxIQSbW/JMlZ4sIih:5+xyPGA9EM/nzWB/vAW/Jc4sP
                                                  TLSH:6AE4F01532698807D6B657F40E71F2B907F82EEEA911E2CB4EC96DCBB8E5F005980753
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P5Mg..............0...... ......*.... ........@.. ....................... ............@................................
                                                  Icon Hash:5ba4a66a2a263095
                                                  Entrypoint:0x4adc2a
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x674D3550 [Mon Dec 2 04:19:28 2024 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xadbd80x4f.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xae0000x1c3c.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xb00000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000xabc300xabe00cf1396249bdb50eb1f8b2140b61cd4f1False0.865934659090909data7.65389784425923IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rsrc0xae0000x1c3c0x1e0065433b97376e6ca545574d0e59331265False0.80546875data7.066390661150315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xb00000xc0x2001391980773ff0148b66cb23cb5db6182False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0xae1000x164fPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.951672211521625
                                                  RT_GROUP_ICON0xaf7600x14data1.05
                                                  RT_VERSION0xaf7840x2b8COM executable for DOS0.4511494252873563
                                                  RT_MANIFEST0xafa4c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                  DLLImport
                                                  mscoree.dll_CorExeMain
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2024-12-03T10:37:07.562970+01002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.749714199.79.62.115587TCP
                                                  2024-12-03T10:37:07.562970+01002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.749714199.79.62.115587TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 3, 2024 10:37:20.414868116 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:37:20.534827948 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:20.538489103 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:37:21.819242001 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:21.820209980 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:37:21.940355062 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:22.215207100 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:22.216284037 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:37:22.336477995 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:22.611562014 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:22.612596989 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:37:22.733129978 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:23.025090933 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:23.025353909 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:37:23.145364046 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:23.419893980 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:23.420392036 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:37:23.540313005 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:23.823035955 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:23.823199034 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:37:23.943171024 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:24.217859030 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:24.218487978 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:37:24.218561888 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:37:24.218590975 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:37:24.218615055 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:37:24.339967966 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:24.339996099 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:24.340007067 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:24.340015888 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:24.721024036 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:37:24.766143084 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:38:59.594856024 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:38:59.714873075 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:39:00.190756083 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:39:00.190840960 CET58749714199.79.62.115192.168.2.7
                                                  Dec 3, 2024 10:39:00.190898895 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:39:00.191000938 CET49714587192.168.2.7199.79.62.115
                                                  Dec 3, 2024 10:39:00.311212063 CET58749714199.79.62.115192.168.2.7
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 3, 2024 10:37:19.582891941 CET6476553192.168.2.71.1.1.1
                                                  Dec 3, 2024 10:37:20.406383991 CET53647651.1.1.1192.168.2.7
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Dec 3, 2024 10:37:19.582891941 CET192.168.2.71.1.1.10x7706Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Dec 3, 2024 10:37:20.406383991 CET1.1.1.1192.168.2.70x7706No error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                  Dec 3, 2024 10:37:21.819242001 CET58749714199.79.62.115192.168.2.7220-md-54.webhostbox.net ESMTP Exim 4.96.2 #2 Tue, 03 Dec 2024 15:07:21 +0530
                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                  220 and/or bulk e-mail.
                                                  Dec 3, 2024 10:37:21.820209980 CET49714587192.168.2.7199.79.62.115EHLO 841675
                                                  Dec 3, 2024 10:37:22.215207100 CET58749714199.79.62.115192.168.2.7250-md-54.webhostbox.net Hello 841675 [8.46.123.228]
                                                  250-SIZE 52428800
                                                  250-8BITMIME
                                                  250-PIPELINING
                                                  250-PIPECONNECT
                                                  250-AUTH PLAIN LOGIN
                                                  250-STARTTLS
                                                  250 HELP
                                                  Dec 3, 2024 10:37:22.216284037 CET49714587192.168.2.7199.79.62.115AUTH login c2FsZXNzQG1iYXJpZXNlcnZpY2VzbHRkLmNvbQ==
                                                  Dec 3, 2024 10:37:22.611562014 CET58749714199.79.62.115192.168.2.7334 UGFzc3dvcmQ6
                                                  Dec 3, 2024 10:37:23.025090933 CET58749714199.79.62.115192.168.2.7235 Authentication succeeded
                                                  Dec 3, 2024 10:37:23.025353909 CET49714587192.168.2.7199.79.62.115MAIL FROM:<saless@mbarieservicesltd.com>
                                                  Dec 3, 2024 10:37:23.419893980 CET58749714199.79.62.115192.168.2.7250 OK
                                                  Dec 3, 2024 10:37:23.420392036 CET49714587192.168.2.7199.79.62.115RCPT TO:<iinfo@mbarieservicesltd.com>
                                                  Dec 3, 2024 10:37:23.823035955 CET58749714199.79.62.115192.168.2.7250 Accepted
                                                  Dec 3, 2024 10:37:23.823199034 CET49714587192.168.2.7199.79.62.115DATA
                                                  Dec 3, 2024 10:37:24.217859030 CET58749714199.79.62.115192.168.2.7354 Enter message, ending with "." on a line by itself
                                                  Dec 3, 2024 10:37:24.218615055 CET49714587192.168.2.7199.79.62.115.
                                                  Dec 3, 2024 10:37:24.721024036 CET58749714199.79.62.115192.168.2.7250 OK id=1tIPLQ-000tBt-03
                                                  Dec 3, 2024 10:38:59.594856024 CET49714587192.168.2.7199.79.62.115QUIT
                                                  Dec 3, 2024 10:39:00.190756083 CET58749714199.79.62.115192.168.2.7221 md-54.webhostbox.net closing connection

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:04:37:10
                                                  Start date:03/12/2024
                                                  Path:C:\Users\user\Desktop\SoA_14000048_002.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\SoA_14000048_002.exe"
                                                  Imagebase:0x5b0000
                                                  File size:712'704 bytes
                                                  MD5 hash:A7D9ADA23F25DBED8EA51F58CDE3EAC7
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.1373185724.00000000038F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:04:37:16
                                                  Start date:03/12/2024
                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SoA_14000048_002.exe"
                                                  Imagebase:0xeb0000
                                                  File size:433'152 bytes
                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:04:37:16
                                                  Start date:03/12/2024
                                                  Path:C:\Users\user\Desktop\SoA_14000048_002.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\SoA_14000048_002.exe"
                                                  Imagebase:0x6c0000
                                                  File size:712'704 bytes
                                                  MD5 hash:A7D9ADA23F25DBED8EA51F58CDE3EAC7
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000005.00000002.2564300475.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2566159079.0000000002A6A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2566159079.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2566159079.0000000002A11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low
                                                  Has exited:false

                                                  Target ID:6
                                                  Start time:04:37:17
                                                  Start date:03/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:04:37:19
                                                  Start date:03/12/2024
                                                  Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                  Imagebase:0x7ff7fb730000
                                                  File size:496'640 bytes
                                                  MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                  Has elevated privileges:true
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:8.4%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:46
                                                    Total number of Limit Nodes:5
                                                    execution_graph 17293 fe4668 17294 fe4672 17293->17294 17296 fe4758 17293->17296 17297 fe477d 17296->17297 17301 fe4868 17297->17301 17305 fe4859 17297->17305 17303 fe488f 17301->17303 17302 fe496c 17302->17302 17303->17302 17309 fe4514 17303->17309 17306 fe4868 17305->17306 17307 fe496c 17306->17307 17308 fe4514 CreateActCtxA 17306->17308 17308->17307 17310 fe58f8 CreateActCtxA 17309->17310 17312 fe59bb 17310->17312 17313 6f51148 17314 6f512d3 17313->17314 17315 6f5116e 17313->17315 17315->17314 17318 6f513c1 17315->17318 17321 6f513c8 PostMessageW 17315->17321 17319 6f513c8 PostMessageW 17318->17319 17320 6f51434 17319->17320 17320->17315 17322 6f51434 17321->17322 17322->17315 17278 feafb0 17279 feafb4 17278->17279 17283 feb0a8 17279->17283 17288 feb098 17279->17288 17280 feafbf 17285 feb0ac 17283->17285 17284 feb0dc 17284->17280 17285->17284 17286 feb2e0 GetModuleHandleW 17285->17286 17287 feb30d 17286->17287 17287->17280 17290 feb0a8 17288->17290 17289 feb0dc 17289->17280 17290->17289 17291 feb2e0 GetModuleHandleW 17290->17291 17292 feb30d 17291->17292 17292->17280 17323 fed340 17324 fed386 17323->17324 17328 fed50f 17324->17328 17331 fed520 17324->17331 17325 fed473 17329 fed54e 17328->17329 17334 fed0f8 17328->17334 17329->17325 17332 fed0f8 DuplicateHandle 17331->17332 17333 fed54e 17332->17333 17333->17325 17335 fed588 DuplicateHandle 17334->17335 17336 fed61e 17335->17336 17336->17329

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 492 6f51810-6f51832 493 6f51be2-6f51be7 492->493 494 6f51838-6f51873 492->494 495 6f51bf1-6f51bf6 call 6f52030 493->495 496 6f51be9-6f51beb 493->496 503 6f51875-6f5187f 494->503 504 6f51886-6f518a6 494->504 498 6f51bfc-6f51c04 495->498 496->495 500 6f51c0a-6f51c11 498->500 503->504 506 6f518b9-6f518d9 504->506 507 6f518a8-6f518b2 504->507 509 6f518ec-6f5190c 506->509 510 6f518db-6f518e5 506->510 507->506 512 6f5191f-6f51928 509->512 513 6f5190e-6f51918 509->513 510->509 515 6f5194c-6f51955 512->515 516 6f5192a-6f51945 512->516 513->512 519 6f51957-6f51972 515->519 520 6f51979-6f51982 515->520 516->515 519->520 524 6f51984-6f51986 520->524 525 6f5198d-6f519a9 520->525 524->525 528 6f519c1-6f519c5 525->528 529 6f519ab-6f519b1 525->529 532 6f519c7-6f519d8 528->532 533 6f519df-6f51a27 528->533 530 6f519b5-6f519b7 529->530 531 6f519b3 529->531 530->528 531->528 532->533 538 6f51a29 533->538 539 6f51a4b-6f51a52 533->539 540 6f51a2c-6f51a32 538->540 541 6f51a54-6f51a63 539->541 542 6f51a69-6f51a77 539->542 543 6f51c12-6f51c70 540->543 544 6f51a38-6f51a3e 540->544 541->542 549 6f51a81-6f51aab 542->549 550 6f51a79-6f51a7b 542->550 546 6f51a40-6f51a42 544->546 547 6f51a48-6f51a49 544->547 546->547 547->539 547->540 555 6f51aad-6f51abb 549->555 556 6f51ad8-6f51af4 549->556 550->549 555->556 561 6f51abd-6f51ad1 555->561 559 6f51b07-6f51b2e 556->559 560 6f51af6-6f51b00 556->560 565 6f51b46-6f51b4a 559->565 566 6f51b30-6f51b36 559->566 560->559 561->556 569 6f51b65-6f51b81 565->569 570 6f51b4c-6f51b5e 565->570 567 6f51b38 566->567 568 6f51b3a-6f51b3c 566->568 567->565 568->565 573 6f51b83-6f51b89 569->573 574 6f51b99-6f51b9d 569->574 570->569 575 6f51b8d-6f51b8f 573->575 576 6f51b8b 573->576 574->500 577 6f51b9f-6f51bad 574->577 575->574 576->574 579 6f51bbf-6f51bc3 577->579 580 6f51baf-6f51bbd 577->580 581 6f51bc9-6f51be1 579->581 580->579 580->581
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1383725038.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6f50000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 757ebbbb04e90c0a2bd006545bb42ce548c7305c625013c7746790de09d90050
                                                    • Instruction ID: ff954327de1d467eb3ed14ea0c0709e77e02a3b79c0399f03b103485826a611b
                                                    • Opcode Fuzzy Hash: 757ebbbb04e90c0a2bd006545bb42ce548c7305c625013c7746790de09d90050
                                                    • Instruction Fuzzy Hash: EBC1BC31B007048FDB29EB76C85076EB7F6AF89300F15446DE64A8B295DB39ED02C761
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1383725038.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6f50000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4f87f9a2075c0ded7f51960e7526c9d17cf1f9424915d9e80f274ed2bea3c097
                                                    • Instruction ID: dad998bf8c2f1ab2adc9c4949d378a7874c36b5cae09ca53ca773751f3df6d63
                                                    • Opcode Fuzzy Hash: 4f87f9a2075c0ded7f51960e7526c9d17cf1f9424915d9e80f274ed2bea3c097
                                                    • Instruction Fuzzy Hash: 4151D671D056298BEB64CF66C8547D9BBF6BF89300F11C1EAD50DA6250EB704A85CF80

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 317 feb0a8-feb0b7 319 feb0b9-feb0c6 call fead38 317->319 320 feb0e3-feb0e7 317->320 327 feb0dc 319->327 328 feb0c8 319->328 321 feb0fb-feb13c 320->321 322 feb0e9-feb0f3 320->322 329 feb13e-feb146 321->329 330 feb149-feb157 321->330 322->321 327->320 374 feb0ce call feb340 328->374 375 feb0ce call feb330 328->375 329->330 331 feb17b-feb17d 330->331 332 feb159-feb15e 330->332 334 feb180-feb187 331->334 335 feb169 332->335 336 feb160-feb167 call fead44 332->336 333 feb0d4-feb0d6 333->327 337 feb218-feb2d8 333->337 338 feb189-feb191 334->338 339 feb194-feb19b 334->339 341 feb16b-feb179 335->341 336->341 369 feb2da-feb2dd 337->369 370 feb2e0-feb30b GetModuleHandleW 337->370 338->339 342 feb19d-feb1a5 339->342 343 feb1a8-feb1b1 call fead54 339->343 341->334 342->343 349 feb1be-feb1c3 343->349 350 feb1b3-feb1bb 343->350 351 feb1c5-feb1cc 349->351 352 feb1e1-feb1ee 349->352 350->349 351->352 354 feb1ce-feb1de call fead64 call fead74 351->354 358 feb1f0-feb20e 352->358 359 feb211-feb217 352->359 354->352 358->359 369->370 371 feb30d-feb313 370->371 372 feb314-feb328 370->372 371->372 374->333 375->333
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00FEB2FE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1370023249.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_fe0000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: f87ed5a91ded05eb8d252a4501b03dad58e9a378f6c879e19a217ed7554aa809
                                                    • Instruction ID: c69c4a435a7c4521f8beff35d79beb046e0b8190bf330eb6f2f3f2c919a3380a
                                                    • Opcode Fuzzy Hash: f87ed5a91ded05eb8d252a4501b03dad58e9a378f6c879e19a217ed7554aa809
                                                    • Instruction Fuzzy Hash: 78712170A00B458FD724DF2AD85175BBBF1BF88320F008A2DD45A9BA50DB39E945DB91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 376 fe58ed-fe58f6 377 fe58f8-fe59b9 CreateActCtxA 376->377 379 fe59bb-fe59c1 377->379 380 fe59c2-fe5a1c 377->380 379->380 387 fe5a1e-fe5a21 380->387 388 fe5a2b-fe5a2f 380->388 387->388 389 fe5a40 388->389 390 fe5a31-fe5a3d 388->390 392 fe5a41 389->392 390->389 392->392
                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 00FE59A9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1370023249.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_fe0000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 0c419ed358759a76f1d0d5bb82c95fbb6b5745946b1d5ceb84e4b49c04b02e49
                                                    • Instruction ID: 8630b146adf8eaf14d5c788349ed5eee79b0872f8854aef78ecd8fb067a45a9e
                                                    • Opcode Fuzzy Hash: 0c419ed358759a76f1d0d5bb82c95fbb6b5745946b1d5ceb84e4b49c04b02e49
                                                    • Instruction Fuzzy Hash: 234104B0C10719CFEB24DFAAC88479DBBB6BF48714F20816AD408AB251DB756946CF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 393 fe4514-fe59b9 CreateActCtxA 396 fe59bb-fe59c1 393->396 397 fe59c2-fe5a1c 393->397 396->397 404 fe5a1e-fe5a21 397->404 405 fe5a2b-fe5a2f 397->405 404->405 406 fe5a40 405->406 407 fe5a31-fe5a3d 405->407 409 fe5a41 406->409 407->406 409->409
                                                    APIs
                                                    • CreateActCtxA.KERNEL32(?), ref: 00FE59A9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1370023249.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_fe0000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: cf7fb0ec88059405c5145c175d11f353c40466dffa7fb5311b69d84371c4433e
                                                    • Instruction ID: a486669d24922977bbe612650966575194bf28c6202fe940980229718bb8339f
                                                    • Opcode Fuzzy Hash: cf7fb0ec88059405c5145c175d11f353c40466dffa7fb5311b69d84371c4433e
                                                    • Instruction Fuzzy Hash: F6410471C1071DCBEB24DFAAC84478DBBF5BF48714F20816AD409AB251DB756946CF90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 410 fed0f8-fed61c DuplicateHandle 412 fed61e-fed624 410->412 413 fed625-fed642 410->413 412->413
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00FED54E,?,?,?,?,?), ref: 00FED60F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1370023249.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_fe0000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 7fa89e946ff90eeacc476eb3970d8d9205f6df2cdc7f09dab14d67f96883abbf
                                                    • Instruction ID: 56081fecfd8b0ce132384df7e0d2a0850718bef2d0a72214a6664a600a3f423a
                                                    • Opcode Fuzzy Hash: 7fa89e946ff90eeacc476eb3970d8d9205f6df2cdc7f09dab14d67f96883abbf
                                                    • Instruction Fuzzy Hash: BF21E4B5D003489FDB10CF9AD884ADEFBF9EB48324F14841AE918A7350D378A954DFA4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 416 fed581 417 fed58b-fed61c DuplicateHandle 416->417 418 fed61e-fed624 417->418 419 fed625-fed642 417->419 418->419
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00FED54E,?,?,?,?,?), ref: 00FED60F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1370023249.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_fe0000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 224df48dc58659076d4be7377e9bf22d8518f43af67fa7b4cb54b01f07add761
                                                    • Instruction ID: 029d51ceb08510ffe0bd14118b2c80ba55a8d4ee6d0e084c7c91f27b6189a07d
                                                    • Opcode Fuzzy Hash: 224df48dc58659076d4be7377e9bf22d8518f43af67fa7b4cb54b01f07add761
                                                    • Instruction Fuzzy Hash: A321E4B5D002499FDB10CFAAD984ADEBBF4EB48324F14851AE928A3350D378A944CF64

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 422 feb298-feb2d8 423 feb2da-feb2dd 422->423 424 feb2e0-feb30b GetModuleHandleW 422->424 423->424 425 feb30d-feb313 424->425 426 feb314-feb328 424->426 425->426
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00FEB2FE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1370023249.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_fe0000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID:
                                                    • API String ID: 4139908857-0
                                                    • Opcode ID: 25caa897e629ff3e39fead68571da152189badfd8cc5f01c41068c9252c98319
                                                    • Instruction ID: 4749907019702793ee27af358e86266ee6845bafb094f53d83a52a390db679e0
                                                    • Opcode Fuzzy Hash: 25caa897e629ff3e39fead68571da152189badfd8cc5f01c41068c9252c98319
                                                    • Instruction Fuzzy Hash: 9E11DFB5C002498FDB20DF9AC845A9FFBF5EF88324F10842AD829A7210C379A545CFA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 428 6f513c1-6f51432 PostMessageW 430 6f51434-6f5143a 428->430 431 6f5143b-6f5144f 428->431 430->431
                                                    APIs
                                                    • PostMessageW.USER32(?,?,?,?), ref: 06F51425
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1383725038.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6f50000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: MessagePost
                                                    • String ID:
                                                    • API String ID: 410705778-0
                                                    • Opcode ID: acbdf27fcb4f8af460e8fddbad71dc990f24f906d39f1873d20d1d21f63970a5
                                                    • Instruction ID: 76feb15646e41a3682816dc350d6e0c9454728ec28310511af6ce2e78c47d476
                                                    • Opcode Fuzzy Hash: acbdf27fcb4f8af460e8fddbad71dc990f24f906d39f1873d20d1d21f63970a5
                                                    • Instruction Fuzzy Hash: 6711C2B58003499FDB10DF9AD885BDEBBF8FB49324F118419E918A7240C375A984CFA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 433 6f513c8-6f51432 PostMessageW 434 6f51434-6f5143a 433->434 435 6f5143b-6f5144f 433->435 434->435
                                                    APIs
                                                    • PostMessageW.USER32(?,?,?,?), ref: 06F51425
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1383725038.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_6f50000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: MessagePost
                                                    • String ID:
                                                    • API String ID: 410705778-0
                                                    • Opcode ID: 9ad09b45ca825eb5d508722ea1f080425b67e805eb2d82d5949e2118aed96ff1
                                                    • Instruction ID: 00eb2e0deab1ed37ba94346bcf2c9c18e36bfce4cd250a22779b5ab4dad2c0f6
                                                    • Opcode Fuzzy Hash: 9ad09b45ca825eb5d508722ea1f080425b67e805eb2d82d5949e2118aed96ff1
                                                    • Instruction Fuzzy Hash: 9811D3B58003499FDB10DF9AD885BDEBBF8FB49324F108419D918A7240C375A944CFA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1369674836.0000000000F3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F3D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_f3d000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f081f0d6455f72d09c176ba34708bc2a1f1c1fcb89d959d188b499ed42c069e7
                                                    • Instruction ID: aa8bd4941760f228e3d7b04d22b5b569e25b8161126f4f5ab3662c3ce803bd3e
                                                    • Opcode Fuzzy Hash: f081f0d6455f72d09c176ba34708bc2a1f1c1fcb89d959d188b499ed42c069e7
                                                    • Instruction Fuzzy Hash: 74212572A04204DFDB15DF10E9C0B16BB65FB98334F20C169E8090F256C336E856EBA2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1369674836.0000000000F3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F3D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_f3d000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1ad0181b8306e9fd5b8bd916ad1582b42150bc2d2b2a1d545d319d1732462369
                                                    • Instruction ID: 3efc03ec73ba936b6e2b9dfa5f78128714f4ff6e581c313d74388a26ac05bd32
                                                    • Opcode Fuzzy Hash: 1ad0181b8306e9fd5b8bd916ad1582b42150bc2d2b2a1d545d319d1732462369
                                                    • Instruction Fuzzy Hash: F9212872A04240DFDB15DF14E9C0B26BF65FB94338F24C569E8050B256C336D856EBA2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1369724050.0000000000F4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F4D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_f4d000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 60e497fbcac17a4092ee4c765dd061129e4448b89af814f8ed9004263bc2a1d7
                                                    • Instruction ID: 86ca0b678544d6044b8cdc4db81f899dd7235c4829f8f79aed476587b7d41d41
                                                    • Opcode Fuzzy Hash: 60e497fbcac17a4092ee4c765dd061129e4448b89af814f8ed9004263bc2a1d7
                                                    • Instruction Fuzzy Hash: 9221F271A04204EFDB15DF10D9C4B26BFA5FB84324F20C6ADEC494B392C3B6D946DA62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1369724050.0000000000F4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F4D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_f4d000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 47101234f9f8aad809987a902b7bc90dce7629cca9c90a37624ac38fee77e7f9
                                                    • Instruction ID: 56fa40df071a9024ab9f0e2eec0042324783ef278c414b4e697b2bf5e95df3ca
                                                    • Opcode Fuzzy Hash: 47101234f9f8aad809987a902b7bc90dce7629cca9c90a37624ac38fee77e7f9
                                                    • Instruction Fuzzy Hash: BB21D076A04200DFDB14DF18D984B16BF65EB84324F20C5ADDC4A4B38AC33AD847DA62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1369724050.0000000000F4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F4D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_f4d000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 291466ca5619def30281183108f498a9f70061ba8ca47aeb6dbf053500774654
                                                    • Instruction ID: 809aa74155bada1188bb4ffa0d952f458fbd170e5277fecf75c1cdf35611bdce
                                                    • Opcode Fuzzy Hash: 291466ca5619def30281183108f498a9f70061ba8ca47aeb6dbf053500774654
                                                    • Instruction Fuzzy Hash: 842162755093C08FCB16CF24D994715BF71EB46324F28C5EAD8498F6A7C33A980ACB62
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1369674836.0000000000F3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F3D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_f3d000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                    • Instruction ID: e54eaff62eb5cb8d39976eae2a25967299c6f34d4aabc6eb89ce79faff738ecd
                                                    • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                    • Instruction Fuzzy Hash: 6211E676904280CFCB16CF14D5C4B16BF72FB94338F28C6A9D8490B656C336D856DBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1369674836.0000000000F3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F3D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_f3d000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                    • Instruction ID: 9eca4cb969396bc260abd336693e5b59f5736bbe99550ae729c3eb05ba299492
                                                    • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                    • Instruction Fuzzy Hash: 0411D376904240DFCB16CF14E5C4B16BF72FB94334F24C6A9D8490B656C33AE856DBA1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1369724050.0000000000F4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F4D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_f4d000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                    • Instruction ID: 5625bb482192e9be66816d3d14386b02567f40fdca9747836f85e650663707b0
                                                    • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                    • Instruction Fuzzy Hash: 2611BB75904280DFCB05CF10C9C4B15BFA2FB84324F24C6ADDC494B296C37AD80ACB61
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1369674836.0000000000F3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F3D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_f3d000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d6139e057240e89af31a7d64f69a41a0077edaa0ad9ce1af113debd452395954
                                                    • Instruction ID: 1f046a5cf2758b8b45628597a8aced899a4fcb93c694e52f04197b5361e373fd
                                                    • Opcode Fuzzy Hash: d6139e057240e89af31a7d64f69a41a0077edaa0ad9ce1af113debd452395954
                                                    • Instruction Fuzzy Hash: 1701F2328083409EE7205A21EC84B66BF98DF41375F18C52AED180B282C6399845DAB6
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1369674836.0000000000F3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F3D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_f3d000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7f1b6a4ac5f244129d0947a8c449d611e3b5d05f4c41af1ba62f3e9d11eb6220
                                                    • Instruction ID: c95cee529499b3c5b502d625ae6db86321744ce1f14de24ca6088ce1120ec825
                                                    • Opcode Fuzzy Hash: 7f1b6a4ac5f244129d0947a8c449d611e3b5d05f4c41af1ba62f3e9d11eb6220
                                                    • Instruction Fuzzy Hash: 60F0CD31805340AEE7248E16D888B62FF98EB81334F18C45AED080B286C279AC44CBB1
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.1370023249.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_fe0000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fb5e73db03e04c546adca3328f256b9d266a8afe5ef14ca625fb90fb98078d62
                                                    • Instruction ID: 7d768a95482a5ab1f03bce82047d5fc1bb19b6931373a318149a33ee774c79f1
                                                    • Opcode Fuzzy Hash: fb5e73db03e04c546adca3328f256b9d266a8afe5ef14ca625fb90fb98078d62
                                                    • Instruction Fuzzy Hash: 34A17E32E002458FCF15DFB6C9845AEB7B2FF84310B25457AE806AB265EB35ED05DB80

                                                    Execution Graph

                                                    Execution Coverage:6.7%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:64
                                                    Total number of Limit Nodes:11
                                                    execution_graph 32775 63963f8 32776 6396700 32775->32776 32777 6396420 32775->32777 32778 6396429 32777->32778 32781 639566c 32777->32781 32780 639644c 32782 6395677 32781->32782 32784 6396743 32782->32784 32785 6395688 32782->32785 32784->32780 32786 6396778 OleInitialize 32785->32786 32787 63967dc 32786->32787 32787->32784 32809 fabe68 32810 fabe6d 32809->32810 32811 fabe8b 32810->32811 32813 fac378 32810->32813 32814 fac382 32813->32814 32815 fac3a2 32814->32815 32818 63e3038 32814->32818 32822 63e3028 32814->32822 32815->32810 32820 63e304d 32818->32820 32819 63e3298 32819->32815 32820->32819 32821 63e32b8 GlobalMemoryStatusEx 32820->32821 32821->32820 32824 63e304d 32822->32824 32823 63e3298 32823->32815 32824->32823 32825 63e32b8 GlobalMemoryStatusEx 32824->32825 32825->32824 32826 faae98 DuplicateHandle 32827 faaf2e 32826->32827 32788 6393eb0 32789 6393ef2 32788->32789 32791 6393ef9 32788->32791 32790 6393f4a CallWindowProcW 32789->32790 32789->32791 32790->32791 32838 63909c0 32839 63909eb 32838->32839 32840 6390a9a 32839->32840 32842 639189b 32839->32842 32846 63918f0 32842->32846 32850 63918e4 32842->32850 32847 6391958 CreateWindowExW 32846->32847 32849 6391a14 32847->32849 32851 63918f0 CreateWindowExW 32850->32851 32853 6391a14 32851->32853 32792 fab4b0 32793 fab4de 32792->32793 32796 faa9ec 32793->32796 32795 fab4fe 32797 faa9f7 32796->32797 32798 fabc7f 32797->32798 32801 63970e8 32797->32801 32805 63970f8 32797->32805 32798->32795 32803 63970f8 32801->32803 32802 63971b1 32802->32798 32803->32802 32804 63976a0 WaitMessage 32803->32804 32804->32803 32807 6397111 32805->32807 32806 63976a0 WaitMessage 32806->32807 32807->32806 32808 63971b1 32807->32808 32808->32798 32828 faac50 32829 faac96 GetCurrentProcess 32828->32829 32831 faace8 GetCurrentThread 32829->32831 32832 faace1 32829->32832 32833 faad1e 32831->32833 32834 faad25 GetCurrentProcess 32831->32834 32832->32831 32833->32834 32835 faad5b 32834->32835 32836 faad83 GetCurrentThreadId 32835->32836 32837 faadb4 32836->32837

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1856 63970f8-639710f 1857 6397111-6397114 1856->1857 1858 6397129-639712c 1857->1858 1859 6397116-6397124 1857->1859 1860 639712e-6397141 1858->1860 1861 6397162-6397165 1858->1861 1859->1858 1863 6397149-639714c 1860->1863 1864 6397143-6397145 1860->1864 1865 6397185-6397188 1861->1865 1866 6397167-6397180 1861->1866 1869 63971bc-639723b 1863->1869 1871 639714e-639715d 1863->1871 1864->1869 1870 6397147 1864->1870 1867 639718a-639718d 1865->1867 1868 6397192-6397195 1865->1868 1866->1865 1867->1868 1872 639719f-63971a1 1868->1872 1873 6397197-639719c 1868->1873 1880 639726a-6397288 1869->1880 1881 639723d-6397267 1869->1881 1870->1871 1871->1861 1875 63971a8-63971ab 1872->1875 1876 63971a3 1872->1876 1873->1872 1875->1857 1879 63971b1-63971bb 1875->1879 1876->1875 1886 639728a-639728c 1880->1886 1887 6397291-63972c8 1880->1887 1881->1880 1889 639774a-639775f 1886->1889 1891 63976f9 1887->1891 1892 63972ce-63972e2 1887->1892 1895 63976fe-6397714 1891->1895 1893 6397311-6397330 1892->1893 1894 63972e4-639730e 1892->1894 1901 6397348-639734a 1893->1901 1902 6397332-6397338 1893->1902 1894->1893 1895->1889 1906 6397369-6397372 1901->1906 1907 639734c-6397364 1901->1907 1904 639733a 1902->1904 1905 639733c-639733e 1902->1905 1904->1901 1905->1901 1908 639737a-6397381 1906->1908 1907->1895 1909 639738b-6397392 1908->1909 1910 6397383-6397389 1908->1910 1912 639739c 1909->1912 1913 6397394-639739a 1909->1913 1911 639739f-63973bc call 63956e8 1910->1911 1916 6397511-6397515 1911->1916 1917 63973c2-63973c9 1911->1917 1912->1911 1913->1911 1919 639751b-639751f 1916->1919 1920 63976e4-63976f7 1916->1920 1917->1891 1918 63973cf-639740c 1917->1918 1928 63976da-63976de 1918->1928 1929 6397412-6397417 1918->1929 1921 6397539-6397542 1919->1921 1922 6397521-6397534 1919->1922 1920->1895 1923 6397571-6397578 1921->1923 1924 6397544-639756e 1921->1924 1922->1895 1926 639757e-6397585 1923->1926 1927 6397617-639762c 1923->1927 1924->1923 1931 63975b4-63975d6 1926->1931 1932 6397587-63975b1 1926->1932 1927->1928 1941 6397632-6397634 1927->1941 1928->1908 1928->1920 1933 6397449-639745e call 639570c 1929->1933 1934 6397419-6397420 call 63956f4 1929->1934 1931->1927 1969 63975d8-63975e2 1931->1969 1932->1931 1939 6397463-6397467 1933->1939 1943 6397425-6397427 1934->1943 1945 6397469-639747b call 6395718 1939->1945 1946 63974d8-63974e5 1939->1946 1947 6397681-639769e call 63956e8 1941->1947 1948 6397636-639766f 1941->1948 1943->1933 1944 6397429-6397447 call 6395700 1943->1944 1944->1939 1972 63974bb-63974d3 1945->1972 1973 639747d-63974ad 1945->1973 1946->1928 1961 63974eb-63974f5 call 6395728 1946->1961 1947->1928 1960 63976a0-63976cc WaitMessage 1947->1960 1964 6397678-639767f 1948->1964 1965 6397671-6397677 1948->1965 1966 63976ce 1960->1966 1967 63976d3 1960->1967 1975 6397504-639750c call 6395740 1961->1975 1976 63974f7-63974ff call 6395734 1961->1976 1964->1928 1965->1964 1966->1967 1967->1928 1980 63975fa-6397615 1969->1980 1981 63975e4-63975ea 1969->1981 1972->1895 1987 63974af 1973->1987 1988 63974b4 1973->1988 1975->1928 1976->1928 1980->1927 1980->1969 1985 63975ec 1981->1985 1986 63975ee-63975f0 1981->1986 1985->1980 1986->1980 1987->1988 1988->1972
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2569920507.0000000006390000.00000040.00000800.00020000.00000000.sdmp, Offset: 06390000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_6390000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 57904f796bf86c285ed967861c68afcd00ba5e98c0d80cb126dc41c15b1b3600
                                                    • Instruction ID: 8f7ffe0e4f10451af1d75e08f61007e62824b8262636f668866c9d900426433b
                                                    • Opcode Fuzzy Hash: 57904f796bf86c285ed967861c68afcd00ba5e98c0d80cb126dc41c15b1b3600
                                                    • Instruction Fuzzy Hash: 4C126C31E102098FEF54DFA9C844BADBBF1BF44314F158169E815AB2A1DB70A949CFA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 913 faac4a-faacdf GetCurrentProcess 918 faace8-faad1c GetCurrentThread 913->918 919 faace1-faace7 913->919 920 faad1e-faad24 918->920 921 faad25-faad59 GetCurrentProcess 918->921 919->918 920->921 923 faad5b-faad61 921->923 924 faad62-faad7d call faae20 921->924 923->924 927 faad83-faadb2 GetCurrentThreadId 924->927 928 faadbb-faae1d 927->928 929 faadb4-faadba 927->929 929->928
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 00FAACCE
                                                    • GetCurrentThread.KERNEL32 ref: 00FAAD0B
                                                    • GetCurrentProcess.KERNEL32 ref: 00FAAD48
                                                    • GetCurrentThreadId.KERNEL32 ref: 00FAADA1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2565789972.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_fa0000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID:
                                                    • API String ID: 2063062207-0
                                                    • Opcode ID: 1f3164914630caf5d49486ca7b8b953adb85db79afeb50443a65db41abdd2185
                                                    • Instruction ID: 1d07b0648f9c79c49d96a5880113b6f8da0b20173609d82bfed02ec7959c50e1
                                                    • Opcode Fuzzy Hash: 1f3164914630caf5d49486ca7b8b953adb85db79afeb50443a65db41abdd2185
                                                    • Instruction Fuzzy Hash: EA5176B0D003498FDB14DFAAD548B9EBBF1EF88314F20801DE409A7260DB789945CF66

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 936 faac50-faacdf GetCurrentProcess 940 faace8-faad1c GetCurrentThread 936->940 941 faace1-faace7 936->941 942 faad1e-faad24 940->942 943 faad25-faad59 GetCurrentProcess 940->943 941->940 942->943 945 faad5b-faad61 943->945 946 faad62-faad7d call faae20 943->946 945->946 949 faad83-faadb2 GetCurrentThreadId 946->949 950 faadbb-faae1d 949->950 951 faadb4-faadba 949->951 951->950
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 00FAACCE
                                                    • GetCurrentThread.KERNEL32 ref: 00FAAD0B
                                                    • GetCurrentProcess.KERNEL32 ref: 00FAAD48
                                                    • GetCurrentThreadId.KERNEL32 ref: 00FAADA1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2565789972.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_fa0000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID:
                                                    • API String ID: 2063062207-0
                                                    • Opcode ID: 9905a261a4856f0b78bde327089d543739b9b5c84c04cf842def835dba7561d8
                                                    • Instruction ID: b44406f769b39ee8bad35e25b8839aa33891c44e1cef2262f1ee594709a1c646
                                                    • Opcode Fuzzy Hash: 9905a261a4856f0b78bde327089d543739b9b5c84c04cf842def835dba7561d8
                                                    • Instruction Fuzzy Hash: AF5156B0D003498FDB14DFAAD548B9EBBF1EF88315F20841DE419A7260DB789949CF66
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2570143553.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_63e0000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: eb7d972890b3defb643608c83de757841d9ea62119df591e1e210c475322df22
                                                    • Instruction ID: 23a639f1fd7559912741353189a3e6e75a4279a994223c8c926fce6ba467f9a7
                                                    • Opcode Fuzzy Hash: eb7d972890b3defb643608c83de757841d9ea62119df591e1e210c475322df22
                                                    • Instruction Fuzzy Hash: 70412531E143559FDB24DFA9E80079EBBF5AF89210F14856AE504E7281DB349845CBE1
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06391A02
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2569920507.0000000006390000.00000040.00000800.00020000.00000000.sdmp, Offset: 06390000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_6390000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 4266bed23f0713cb886422c6e6e0440f9fd4ff4cbd985d8418fccd9b34bfb13c
                                                    • Instruction ID: 9c7d7d3f36218e36aead15529c7fbb9253820ca359291208a0bf7832a809a10d
                                                    • Opcode Fuzzy Hash: 4266bed23f0713cb886422c6e6e0440f9fd4ff4cbd985d8418fccd9b34bfb13c
                                                    • Instruction Fuzzy Hash: ED51C0B1D103499FDB14CFA9C880ADEBBB5FF48310F24812AE819AB250D7719985CF90
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06391A02
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2569920507.0000000006390000.00000040.00000800.00020000.00000000.sdmp, Offset: 06390000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_6390000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 17125c2fa5a1eda574e2a9d7cc1db52573ca01b0f4ed04cec3eef2749cf00f15
                                                    • Instruction ID: 2ea58bbcfa73b88501d0d7fff69336c474f4f753e01772ee368f6d19ba82e1ae
                                                    • Opcode Fuzzy Hash: 17125c2fa5a1eda574e2a9d7cc1db52573ca01b0f4ed04cec3eef2749cf00f15
                                                    • Instruction Fuzzy Hash: DE41ADB1D103499FDF14CF9AC884ADEBBB6BF48310F24812AE819BB250D7759945CF90
                                                    APIs
                                                    • CallWindowProcW.USER32(?,?,?,?,?), ref: 06393F71
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2569920507.0000000006390000.00000040.00000800.00020000.00000000.sdmp, Offset: 06390000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_6390000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: CallProcWindow
                                                    • String ID:
                                                    • API String ID: 2714655100-0
                                                    • Opcode ID: 546f4c4797e9055d5c93868aa48cd1b89fa2f107552006cbe59a6aeb90b095a5
                                                    • Instruction ID: 04ae315097e690b8157e9d70dc22904d0b77e414e4cc4dee6e44b288b335a6d9
                                                    • Opcode Fuzzy Hash: 546f4c4797e9055d5c93868aa48cd1b89fa2f107552006cbe59a6aeb90b095a5
                                                    • Instruction Fuzzy Hash: 3A414BB4900309CFDB54CF49C848AAAFBF5FB88314F248459E419AB321C374A845CFA0
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00FAAF1F
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2565789972.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_fa0000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: f17fb8a0564a910de392f3b552bd38ddd6f7db75699c5107003e0a966bdbd700
                                                    • Instruction ID: 763ca410d5d134fc9e17b158664d53a234b4e7b0c3f2ab9d12e9dccc34090467
                                                    • Opcode Fuzzy Hash: f17fb8a0564a910de392f3b552bd38ddd6f7db75699c5107003e0a966bdbd700
                                                    • Instruction Fuzzy Hash: DB21E4B5D002099FDB10CF9AD884ADEBBF5EB48320F14801AE914A3350D374A944CFA5
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00FAAF1F
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2565789972.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_fa0000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 45c5005e5b1121a24f0298a475cc95d374606f2079c0b8b79a1dd7a21d206d65
                                                    • Instruction ID: 3e321cb888d18a5ef33798254ae24727325573a1fb8f23bdda74301d2f87f230
                                                    • Opcode Fuzzy Hash: 45c5005e5b1121a24f0298a475cc95d374606f2079c0b8b79a1dd7a21d206d65
                                                    • Instruction Fuzzy Hash: E921E2B5D002099FDB10CFAAD985ADEBBF5EB48320F14841AE918B7350D378A954CFA5
                                                    APIs
                                                    • GlobalMemoryStatusEx.KERNELBASE ref: 063E4147
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2570143553.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_63e0000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: GlobalMemoryStatus
                                                    • String ID:
                                                    • API String ID: 1890195054-0
                                                    • Opcode ID: ebdd27ad904e52aedfdad82d994c6021609c6a523ee7d9f90e2a63b56549a7f0
                                                    • Instruction ID: 20306ccaeeacf7b7ace16de56cb228420d5ab57b555018ecc0abf8c7cadeee5f
                                                    • Opcode Fuzzy Hash: ebdd27ad904e52aedfdad82d994c6021609c6a523ee7d9f90e2a63b56549a7f0
                                                    • Instruction Fuzzy Hash: A31114B1C002699BCB10DF9AC444BDEFBF4AB48220F14812AD818A7240D778A955CFA1
                                                    APIs
                                                    • OleInitialize.OLE32(00000000), ref: 063967CD
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2569920507.0000000006390000.00000040.00000800.00020000.00000000.sdmp, Offset: 06390000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_6390000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: Initialize
                                                    • String ID:
                                                    • API String ID: 2538663250-0
                                                    • Opcode ID: c41d8d3b3be35b25b3869e11908afdc1d9f19e8e88f1800cf9747c771006b2c3
                                                    • Instruction ID: 6a96cf11825a9ba8bd6a1e3eeb3935712ef3814cbec87763714de4299ec6feb3
                                                    • Opcode Fuzzy Hash: c41d8d3b3be35b25b3869e11908afdc1d9f19e8e88f1800cf9747c771006b2c3
                                                    • Instruction Fuzzy Hash: 071112B5D003488FDB20DF9AD485B9EBBF8EB49320F248429D518A7350C779A944CFA5
                                                    APIs
                                                    • OleInitialize.OLE32(00000000), ref: 063967CD
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2569920507.0000000006390000.00000040.00000800.00020000.00000000.sdmp, Offset: 06390000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_6390000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID: Initialize
                                                    • String ID:
                                                    • API String ID: 2538663250-0
                                                    • Opcode ID: 873014d2f564bb3ad65ed891728fb6318008da62e72bb3892cf81f5102678d5d
                                                    • Instruction ID: 1361821b7d5ee4a528059563e8f6e3b1573a618014c16bf17721cf47f33fdd94
                                                    • Opcode Fuzzy Hash: 873014d2f564bb3ad65ed891728fb6318008da62e72bb3892cf81f5102678d5d
                                                    • Instruction Fuzzy Hash: FF1112B5C003499FDB20DF9AD845BCEBBF8EB48320F248819E518A3250C779A944CFA5
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2565562295.0000000000F5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F5D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_f5d000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1d1df7ef3ebb9712b5b6a6cbc8ed91cee665eb5cc73903bb682fc9af7a15ae53
                                                    • Instruction ID: 124fe7e3e9e70828a8273a342b698bb4e84d1a9396528faeff47008f423fbcad
                                                    • Opcode Fuzzy Hash: 1d1df7ef3ebb9712b5b6a6cbc8ed91cee665eb5cc73903bb682fc9af7a15ae53
                                                    • Instruction Fuzzy Hash: 65212272A05300DFDB24DF10D9C4B16BB61EB84325F20C56DDE0A4B38AC33AD80BDA62
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2565562295.0000000000F5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F5D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_f5d000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 422f9fd533e5189e6c94f3ac1c42e0fd67a920b95648257c9cc58bb8a47359ed
                                                    • Instruction ID: 266bf9a1fc84f8e25d4484338437bcd7c9947db15ed48a2f9de164ba3737d91e
                                                    • Opcode Fuzzy Hash: 422f9fd533e5189e6c94f3ac1c42e0fd67a920b95648257c9cc58bb8a47359ed
                                                    • Instruction Fuzzy Hash: 9C219F755093C08FCB12CF24D990715BF71EB46324F28C5EAD9498F2A7C33A980ACB62
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2565503599.0000000000F4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F4D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_f4d000_SoA_14000048_002.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 56c98a88017c886514d9fba646e22245d575d7705135a76465feafc77476c9de
                                                    • Instruction ID: c689ad6de7a722aeab638814b85737edb2963f9f5ae081b0cea7a3172c4c44af
                                                    • Opcode Fuzzy Hash: 56c98a88017c886514d9fba646e22245d575d7705135a76465feafc77476c9de
                                                    • Instruction Fuzzy Hash: C4F062714053449EE7208A16D884B66FFA8EB51735F18C55AED0C5A296C2799C44CAB1