Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO.exe

Overview

General Information

Sample Name:PO.exe
Analysis ID:830558
MD5:03d90e26c8a6fbbeb284359b0f90ee91
SHA1:68b83832a4423003564a8df9af2cda29622190a0
SHA256:eb2ad014aa499fd10c8ec16353295ace996e28a7d822097caf7bd11929c0b558
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • PO.exe (PID: 5176 cmdline: C:\Users\user\Desktop\PO.exe MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
    • PO.exe (PID: 1116 cmdline: C:\Users\user\Desktop\PO.exe MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
  • keWKhH.exe (PID: 5144 cmdline: "C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe" MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
    • keWKhH.exe (PID: 2888 cmdline: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
    • keWKhH.exe (PID: 4980 cmdline: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
  • keWKhH.exe (PID: 6084 cmdline: "C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe" MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
    • keWKhH.exe (PID: 3932 cmdline: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
    • keWKhH.exe (PID: 3180 cmdline: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe MD5: 03D90E26C8A6FBBEB284359B0F90EE91)
  • cleanup
{"Exfil Mode": "SMTP", "Host": "us2.smtp.mailhostbox.com", "Username": "sudeni@dalwabo-jp.com", "Password": "     dLm)Xyz9     "}
SourceRuleDescriptionAuthorStrings
00000006.00000002.536082591.0000000002E81000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000006.00000002.536082591.0000000002E81000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000010.00000002.536562013.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000010.00000002.536562013.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0000000D.00000002.536833086.000000000311C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: PO.exeReversingLabs: Detection: 38%
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeReversingLabs: Detection: 38%
            Source: PO.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeJoe Sandbox ML: detected
            Source: 0.2.PO.exe.3f2eeb0.8.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "us2.smtp.mailhostbox.com", "Username": "sudeni@dalwabo-jp.com", "Password": " dLm)Xyz9 "}
            Source: PO.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: wAGa.pdb source: PO.exe, keWKhH.exe.6.dr
            Source: Binary string: wAGa.pdbSHA256 source: PO.exe, keWKhH.exe.6.dr
            Source: Joe Sandbox ViewIP Address: 208.91.198.143 208.91.198.143
            Source: global trafficTCP traffic: 192.168.2.3:49700 -> 208.91.198.143:587
            Source: global trafficTCP traffic: 192.168.2.3:49703 -> 208.91.199.223:587
            Source: global trafficTCP traffic: 192.168.2.3:49700 -> 208.91.198.143:587
            Source: global trafficTCP traffic: 192.168.2.3:49703 -> 208.91.199.223:587
            Source: PO.exe, 00000006.00000002.533158671.00000000012C0000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
            Source: PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.553635276.00000000068B4000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.533734950.0000000000E48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
            Source: PO.exe, 00000006.00000002.533158671.00000000012C0000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0A
            Source: PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
            Source: unknownDNS traffic detected: queries for: us2.smtp.mailhostbox.com
            Source: keWKhH.exe, 0000000B.00000002.330356628.00000000007B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: PO.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_00FDC8440_2_00FDC844
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_00FDF1F80_2_00FDF1F8
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_00FDF1E80_2_00FDF1E8
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_054A00400_2_054A0040
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_054A00060_2_054A0006
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_054A02D10_2_054A02D1
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_054A02E00_2_054A02E0
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_054A9D400_2_054A9D40
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_05B302E00_2_05B302E0
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_05B348C00_2_05B348C0
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_02D6A9B86_2_02D6A9B8
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_02D6C9786_2_02D6C978
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_02D69DA06_2_02D69DA0
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_02D6A0E86_2_02D6A0E8
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_063256686_2_06325668
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_063204006_2_06320400
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_063223E86_2_063223E8
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_063273C86_2_063273C8
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_063290086_2_06329008
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06321D286_2_06321D28
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06326A386_2_06326A38
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AACEC06_2_06AACEC0
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AA3E516_2_06AA3E51
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AA00406_2_06AA0040
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AAF1886_2_06AAF188
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AABFC86_2_06AABFC8
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AAAD486_2_06AAAD48
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AA3A486_2_06AA3A48
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AAF3906_2_06AAF390
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AAF8FF6_2_06AAF8FF
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AA81A06_2_06AA81A0
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_022CC84411_2_022CC844
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_022CF1E811_2_022CF1E8
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_022CF1F811_2_022CF1F8
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_04A8024011_2_04A80240
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_04A8427811_2_04A84278
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_04A8088211_2_04A80882
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E02D111_2_065E02D1
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E02E011_2_065E02E0
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E004011_2_065E0040
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E000611_2_065E0006
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065F02E011_2_065F02E0
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065F494011_2_065F4940
            Source: PO.exe, 00000000.00000000.264075707.0000000000748000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewAGa.exe> vs PO.exe
            Source: PO.exe, 00000000.00000002.312416410.0000000007340000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameOutimurs.dll2 vs PO.exe
            Source: PO.exe, 00000000.00000002.302999935.0000000003B79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOutimurs.dll2 vs PO.exe
            Source: PO.exe, 00000000.00000002.289521683.0000000002C47000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCruiser.dll, vs PO.exe
            Source: PO.exe, 00000000.00000002.302999935.0000000003ED8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename48fb3650-a520-48b4-9e2f-1fc3b6395358.exe4 vs PO.exe
            Source: PO.exe, 00000000.00000002.289521683.0000000002BB7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCruiser.dll, vs PO.exe
            Source: PO.exe, 00000000.00000002.289521683.0000000002BB7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename48fb3650-a520-48b4-9e2f-1fc3b6395358.exe4 vs PO.exe
            Source: PO.exe, 00000006.00000002.532341288.0000000000F88000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs PO.exe
            Source: PO.exe, 00000006.00000002.531388720.000000000042C000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename48fb3650-a520-48b4-9e2f-1fc3b6395358.exe4 vs PO.exe
            Source: PO.exeBinary or memory string: OriginalFilenamewAGa.exe> vs PO.exe
            Source: PO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: keWKhH.exe.6.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: PO.exeReversingLabs: Detection: 38%
            Source: C:\Users\user\Desktop\PO.exeFile read: C:\Users\user\Desktop\PO.exeJump to behavior
            Source: PO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\PO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\PO.exe C:\Users\user\Desktop\PO.exe
            Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Users\user\Desktop\PO.exe C:\Users\user\Desktop\PO.exe
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe "C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe"
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe "C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe"
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
            Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Users\user\Desktop\PO.exe C:\Users\user\Desktop\PO.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeJump to behavior
            Source: C:\Users\user\Desktop\PO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO.exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@13/4@4/2
            Source: PO.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\PO.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\PO.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\PO.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\PO.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\PO.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\PO.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: PO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: PO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: wAGa.pdb source: PO.exe, keWKhH.exe.6.dr
            Source: Binary string: wAGa.pdbSHA256 source: PO.exe, keWKhH.exe.6.dr
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_00FDCB38 pushfd ; ret 0_2_00FDCB39
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_054A4106 push es; ret 0_2_054A4107
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_054A40BD push ebx; ret 0_2_054A40C3
            Source: C:\Users\user\Desktop\PO.exeCode function: 0_2_05B30924 push es; retf 0_2_05B30935
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AA6660 push es; ret 6_2_06AA6670
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_06AA5FB5 push es; ret 6_2_06AA5FBC
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E6371 push es; ret 11_2_065E6380
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E633D push es; ret 11_2_065E6370
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E6021 push es; ret 11_2_065E6048
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E40BD push ebx; ret 11_2_065E40C3
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065E4106 push es; ret 11_2_065E4107
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeCode function: 11_2_065F0924 push es; retf 11_2_065F0935
            Source: initial sampleStatic PE information: section name: .text entropy: 7.870304849303137
            Source: initial sampleStatic PE information: section name: .text entropy: 7.870304849303137
            Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeJump to dropped file
            Source: C:\Users\user\Desktop\PO.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run keWKhHJump to behavior
            Source: C:\Users\user\Desktop\PO.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run keWKhHJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Users\user\Desktop\PO.exeFile opened: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe:Zone.Identifier read attributes | deleteJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\PO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\PO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\PO.exe TID: 5224Thread sleep time: -40023s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 5192Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 5916Thread sleep count: 6216 > 30Jump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -13835058055282155s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -100000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99841s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99732s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99623s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99509s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99391s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99250s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99141s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -99016s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98766s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98641s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98529s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98419s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98288s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98159s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -98000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97872s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97753s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97622s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97516s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97394s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97242s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97121s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -97000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -96889s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -96749s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PO.exe TID: 1568Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 1244Thread sleep time: -40023s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2108Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 5352Thread sleep count: 5784 > 30Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -12912720851596678s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -100000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99842s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99730s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99621s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99512s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99378s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99250s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99140s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -99030s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98921s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98812s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98703s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98576s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98467s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98358s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98249s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98140s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -98029s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -97919s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -97811s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -97702s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -97592s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -97482s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -97176s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -97054s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -96929s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 3796Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 6068Thread sleep time: -40023s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2228Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 5560Thread sleep count: 7608 > 30
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -14757395258967632s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -100000s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99843s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99734s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99609s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99500s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99390s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99281s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99147s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -99031s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98922s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98797s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98687s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98578s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98469s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98297s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98187s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -98078s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97961s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97843s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97719s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97609s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97500s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97391s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97281s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97172s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -97063s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96907s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96796s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96687s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96578s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96469s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96359s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96249s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96138s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -96030s >= -30000s
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe TID: 2096Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\PO.exeWindow / User API: threadDelayed 6216Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWindow / User API: threadDelayed 5784Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWindow / User API: threadDelayed 7608
            Source: C:\Users\user\Desktop\PO.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 40023Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 100000Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99841Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99732Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99623Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99509Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99391Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99250Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99141Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 99016Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98875Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98766Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98641Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98529Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98419Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98288Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98159Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 98000Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97872Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97753Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97622Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97516Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97394Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97242Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97121Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 97000Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 96889Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 96749Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 40023Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 100000Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99842Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99730Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99621Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99512Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99378Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99250Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99140Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99030Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98921Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98812Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98703Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98576Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98467Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98358Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98249Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98140Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98029Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97919Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97811Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97702Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97592Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97482Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97176Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97054Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96929Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 40023Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 100000
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99843
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99734
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99609
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99500
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99390
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99281
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99147
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 99031
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98922
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98797
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98687
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98578
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98469
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98297
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98187
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 98078
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97961
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97843
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97719
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97609
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97500
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97391
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97281
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97172
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 97063
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96907
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96796
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96687
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96578
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96469
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96359
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96249
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96138
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 96030
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeThread delayed: delay time: 922337203685477
            Source: PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\PO.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\PO.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeMemory written: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeMemory written: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Users\user\Desktop\PO.exe C:\Users\user\Desktop\PO.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeProcess created: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Users\user\Desktop\PO.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Users\user\Desktop\PO.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Users\user\Desktop\PO.exeCode function: 6_2_02D6F6D8 GetUserNameW,6_2_02D6F6D8

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000006.00000002.536082591.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.536562013.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.536833086.000000000311C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PO.exe PID: 1116, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: keWKhH.exe PID: 4980, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: keWKhH.exe PID: 3180, type: MEMORYSTR
            Source: C:\Users\user\Desktop\PO.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\PO.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\PO.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Users\user\Desktop\PO.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\Desktop\PO.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: Yara matchFile source: 00000006.00000002.536082591.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.536562013.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.536833086.000000000311C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PO.exe PID: 1116, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: keWKhH.exe PID: 4980, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: keWKhH.exe PID: 3180, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000006.00000002.536082591.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000010.00000002.536562013.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.536833086.000000000311C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: PO.exe PID: 1116, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: keWKhH.exe PID: 4980, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: keWKhH.exe PID: 3180, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            1
            Registry Run Keys / Startup Folder
            111
            Process Injection
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            1
            Account Discovery
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            Registry Run Keys / Startup Folder
            2
            Obfuscated Files or Information
            1
            Input Capture
            114
            System Information Discovery
            Remote Desktop Protocol1
            Data from Local System
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
            Software Packing
            1
            Credentials in Registry
            211
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            Automated Exfiltration1
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
            Masquerading
            NTDS1
            Process Discovery
            Distributed Component Object Model1
            Input Capture
            Scheduled Transfer11
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script131
            Virtualization/Sandbox Evasion
            LSA Secrets131
            Virtualization/Sandbox Evasion
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common111
            Process Injection
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items1
            Hidden Files and Directories
            DCSync1
            System Owner/User Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
            Remote System Discovery
            Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 830558 Sample: PO.exe Startdate: 20/03/2023 Architecture: WINDOWS Score: 100 45 Multi AV Scanner detection for submitted file 2->45 47 Yara detected AgentTesla 2->47 49 Machine Learning detection for sample 2->49 6 PO.exe 3 2->6         started        10 keWKhH.exe 3 2->10         started        12 keWKhH.exe 2 2->12         started        process3 file4 27 C:\Users\user\AppData\Local\...\PO.exe.log, ASCII 6->27 dropped 51 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->51 53 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 6->53 14 PO.exe 2 5 6->14         started        55 Multi AV Scanner detection for dropped file 10->55 57 Machine Learning detection for dropped file 10->57 59 Injects a PE file into a foreign processes 10->59 19 keWKhH.exe 2 10->19         started        21 keWKhH.exe 10->21         started        23 keWKhH.exe 2 12->23         started        25 keWKhH.exe 12->25         started        signatures5 process6 dnsIp7 33 us2.smtp.mailhostbox.com 208.91.198.143, 49700, 49702, 587 PUBLIC-DOMAIN-REGISTRYUS United States 14->33 29 C:\Users\user\AppData\Roaming\...\keWKhH.exe, PE32 14->29 dropped 31 C:\Users\user\...\keWKhH.exe:Zone.Identifier, ASCII 14->31 dropped 37 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->37 39 Tries to steal Mail credentials (via file / registry access) 14->39 41 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->41 35 208.91.199.223, 49703, 587 PUBLIC-DOMAIN-REGISTRYUS United States 23->35 43 Tries to harvest and steal browser information (history, passwords, etc) 23->43 file8 signatures9

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            PO.exe38%ReversingLabsWin32.Trojan.Generic
            PO.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe38%ReversingLabsWin32.Trojan.Generic
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
            https://sectigo.com/CPS00%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://ocsp.sectigo.com0A0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            us2.smtp.mailhostbox.com
            208.91.198.143
            truefalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.apache.org/licenses/LICENSE-2.0PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designersGPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://sectigo.com/CPS0PO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/?PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bThePO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://us2.smtp.mailhostbox.comPO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designers?PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.tiro.comPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.goodfont.co.krPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comlPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.comPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/cThePO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.comPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-jones.htmlPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.jiyu-kobo.co.jp/PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/DPleasePO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8PO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://ocsp.sectigo.com0APO.exe, 00000006.00000002.533158671.0000000001258000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 00000006.00000002.536082591.0000000002ED9000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 00000006.00000002.533158671.000000000129D000.00000004.00000020.00020000.00000000.sdmp, keWKhH.exe, 0000000D.00000002.536833086.0000000003169000.00000004.00000800.00020000.00000000.sdmp, keWKhH.exe, 00000010.00000002.536562013.0000000002AF9000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fonts.comPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.krPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.deDPleasePO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cnPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sakkal.comPO.exe, 00000000.00000002.309764794.0000000006B82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    208.91.198.143
                                    us2.smtp.mailhostbox.comUnited States
                                    394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                    208.91.199.223
                                    unknownUnited States
                                    394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                    Joe Sandbox Version:37.0.0 Beryl
                                    Analysis ID:830558
                                    Start date and time:2023-03-20 13:54:26 +01:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 9m 30s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:19
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample file name:PO.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@13/4@4/2
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HDC Information:Failed
                                    HCA Information:
                                    • Successful, ratio: 98%
                                    • Number of executed functions: 51
                                    • Number of non-executed functions: 9
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • VT rate limit hit for: PO.exe
                                    TimeTypeDescription
                                    13:55:36API Interceptor28x Sleep call for process: PO.exe modified
                                    13:55:43AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run keWKhH C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                    13:55:52AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run keWKhH C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                    13:55:56API Interceptor63x Sleep call for process: keWKhH.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    208.91.198.143DHL_Shipping_Document2.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                      2303-64687.exeGet hashmaliciousAgentTeslaBrowse
                                        DHL_AWB_copy_&_draft_COO.exeGet hashmaliciousAgentTeslaBrowse
                                          Enercov_PO_202246755181.exeGet hashmaliciousAgentTeslaBrowse
                                            JSyBhM74Sj.exeGet hashmaliciousAgentTeslaBrowse
                                              Statement- Feb 2023.exeGet hashmaliciousAgentTeslaBrowse
                                                PO_190834253.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                  wH6Ft5wweX.exeGet hashmaliciousAgentTeslaBrowse
                                                    Remittance_Advice_MT103.exeGet hashmaliciousAgentTeslaBrowse
                                                      9JNEJMGVi4.exeGet hashmaliciousAgentTeslaBrowse
                                                        file.exeGet hashmaliciousAgentTeslaBrowse
                                                          Swift_92be67ab-e027-4955-b6fc-64b.exeGet hashmaliciousAgentTeslaBrowse
                                                            file.exeGet hashmaliciousAgentTeslaBrowse
                                                              vbc.exeGet hashmaliciousAgentTeslaBrowse
                                                                WzmnvvSETF.exeGet hashmaliciousAgentTeslaBrowse
                                                                  RxcddfrL4j.exeGet hashmaliciousAgentTeslaBrowse
                                                                    RU5NzaLwKA.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                      4N8M1a0RZ0.exeGet hashmaliciousAgentTeslaBrowse
                                                                        jq5AqYT6rm.exeGet hashmaliciousAgentTeslaBrowse
                                                                          Re RETURN PAYMENT TT.exeGet hashmaliciousAgentTeslaBrowse
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            us2.smtp.mailhostbox.comDHL_Shipping_Document2.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                            • 208.91.199.223
                                                                            2303-64687.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.198.143
                                                                            DHL_AWB_copy_&_draft_COO.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.198.143
                                                                            Enercov_PO_202246755181.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.198.143
                                                                            ORIGINAL_SHIPPING_DOCUMENT.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.199.223
                                                                            Shipping_doc.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.199.225
                                                                            JSyBhM74Sj.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.198.143
                                                                            dxet2ADvMO.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.199.223
                                                                            Statement- Feb 2023.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.198.143
                                                                            PO_190834253.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                            • 208.91.198.143
                                                                            final_docs..exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.199.224
                                                                            SST_Statement-_Feb_2023.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                            • 208.91.199.224
                                                                            o72aqcE3gB.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.199.223
                                                                            wH6Ft5wweX.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.198.143
                                                                            r05593373.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.199.223
                                                                            INV_50057_0111986532214.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.199.224
                                                                            SecuriteInfo.com.Win32.PWSX-gen.32656.4667.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.199.223
                                                                            RFQ_080323MECHNBIMar-23.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                            • 208.91.199.225
                                                                            ARRIVAL_NOTICE_-_BL_-_TSHHKG23020096A_NEW_SHIPMENT_FCL.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.199.223
                                                                            PENDING_ORDERS.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.199.224
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            PUBLIC-DOMAIN-REGISTRYUSDHL_Shipping_Document2.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                            • 208.91.199.223
                                                                            2303-64687.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.198.143
                                                                            New_Order.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 199.79.62.115
                                                                            https://www.dr-aljumaa.com/favicon.icoGet hashmaliciousUnknownBrowse
                                                                            • 162.222.226.174
                                                                            DHL_AWB_copy_&_draft_COO.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.198.143
                                                                            Enercov_PO_202246755181.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.198.143
                                                                            http://comfin.mx/notasbancos/16eluniversal14-supConvencionBancaria-bancoppGet hashmaliciousUnknownBrowse
                                                                            • 199.79.62.169
                                                                            ORIGINAL_SHIPPING_DOCUMENT.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.199.224
                                                                            DISCOUNT_PRICES.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                            • 199.79.62.12
                                                                            Proforma_Invoice.exeGet hashmaliciousFormBookBrowse
                                                                            • 216.10.248.111
                                                                            Shipping_doc.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.199.223
                                                                            PURCHASE_CONTRACT.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 199.79.62.12
                                                                            ARRIVAL_NOTICE.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 199.79.62.12
                                                                            Proforma_Invoice.exeGet hashmaliciousFormBookBrowse
                                                                            • 216.10.248.111
                                                                            https://www.dropbox.com/scl/fi/m5mvxzev2p1sywrwhx645/You-have-received-some-incoming-secured-fax-document.paper?dl=0&rlkey=ssarv205bn9gfqqvovrswidd9Get hashmaliciousHTMLPhisherBrowse
                                                                            • 103.211.216.141
                                                                            JSyBhM74Sj.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.199.223
                                                                            dxet2ADvMO.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.91.199.224
                                                                            PO2300109.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 199.79.62.12
                                                                            PO_#JB2210-0005.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                            • 199.79.62.12
                                                                            URGENT_REGUEST.exeGet hashmaliciousFormBookBrowse
                                                                            • 216.10.248.111
                                                                            No context
                                                                            No context
                                                                            Process:C:\Users\user\Desktop\PO.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1216
                                                                            Entropy (8bit):5.355304211458859
                                                                            Encrypted:false
                                                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                            MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                            SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                            SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                            SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                            Malicious:true
                                                                            Reputation:high, very likely benign file
                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                            Process:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1216
                                                                            Entropy (8bit):5.355304211458859
                                                                            Encrypted:false
                                                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                            MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                            SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                            SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                            SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                            Malicious:false
                                                                            Reputation:high, very likely benign file
                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                            Process:C:\Users\user\Desktop\PO.exe
                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):744960
                                                                            Entropy (8bit):7.861489987265584
                                                                            Encrypted:false
                                                                            SSDEEP:12288:chmmYMUnFW/NQbwf4i9aXFc4fUDC/MbGh+796B5PthWxnr569lgx/0PHSHFfG2Sc:chmUWPWa75EbGhK92Vcnr8Q90PQY2ShW
                                                                            MD5:03D90E26C8A6FBBEB284359B0F90EE91
                                                                            SHA1:68B83832A4423003564A8DF9AF2CDA29622190A0
                                                                            SHA-256:EB2AD014AA499FD10C8EC16353295ACE996E28A7D822097CAF7BD11929C0B558
                                                                            SHA-512:2D36BF943AC0B78940780209273C400F6B99344CAECEF2351A7EAE639A62B1B93DF8FF796215D75380B61CA2906DB1DB0A2A620BC7CB596B31806A2333CFE180
                                                                            Malicious:true
                                                                            Antivirus:
                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                            • Antivirus: ReversingLabs, Detection: 38%
                                                                            Reputation:low
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..............0..H...........f... ........@.. ....................................@.................................mf..O...................................XR..T............................................ ............... ..H............text....F... ...H.................. ..`.rsrc................J..............@..@.reloc...............\..............@..B.................f......H.......@V...1......".......H............................................0..R..........4...%..{....{L....%.r...p.%..|....(.....%.r...p.%..{.....X...(.....(.......+..*...0..&..........{........,...{.....+....{....Z.+..*".(.....*..0..z..............}...........}......}.....(.......(......{.....s!...%.d}M...%r!..p}L...%.{....}P...%.{....}O.....{.....s!...%.d}M...%r)..p}L...%.{....}P...%.{....}O.....{.....s!...%.d}M...%r1..p}L...%.{....}P...%.{....}O......{.......+........o....&.
                                                                            Process:C:\Users\user\Desktop\PO.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:modified
                                                                            Size (bytes):26
                                                                            Entropy (8bit):3.95006375643621
                                                                            Encrypted:false
                                                                            SSDEEP:3:ggPYV:rPYV
                                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                            Malicious:true
                                                                            Reputation:high, very likely benign file
                                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                            Entropy (8bit):7.861489987265584
                                                                            TrID:
                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                            • DOS Executable Generic (2002/1) 0.01%
                                                                            File name:PO.exe
                                                                            File size:744960
                                                                            MD5:03d90e26c8a6fbbeb284359b0f90ee91
                                                                            SHA1:68b83832a4423003564a8df9af2cda29622190a0
                                                                            SHA256:eb2ad014aa499fd10c8ec16353295ace996e28a7d822097caf7bd11929c0b558
                                                                            SHA512:2d36bf943ac0b78940780209273c400f6b99344caecef2351a7eae639a62b1b93df8ff796215d75380b61ca2906db1db0a2a620bc7cb596b31806a2333cfe180
                                                                            SSDEEP:12288:chmmYMUnFW/NQbwf4i9aXFc4fUDC/MbGh+796B5PthWxnr569lgx/0PHSHFfG2Sc:chmUWPWa75EbGhK92Vcnr8Q90PQY2ShW
                                                                            TLSH:B2F401392BAA5238F83657BD85E42290577D77A32B17C58D14F121CE5B73B038AD0A3B
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d..............0..H...........f... ........@.. ....................................@................................
                                                                            Icon Hash:209480e66eb84902
                                                                            Entrypoint:0x4b66c2
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:false
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                            Time Stamp:0x6417B6B1 [Mon Mar 20 01:28:17 2023 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:4
                                                                            OS Version Minor:0
                                                                            File Version Major:4
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:4
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                            Instruction
                                                                            jmp dword ptr [00402000h]
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xb666d0x4f.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xb80000x1110.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xba0000xc.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xb52580x54.text
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x20000xb46c80xb4800False0.926453482081025data7.870304849303137IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .rsrc0xb80000x11100x1200False0.7298177083333334data6.6330181066106375IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .reloc0xba0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountry
                                                                            RT_ICON0xb81000xa79PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                            RT_GROUP_ICON0xb8b8c0x14data
                                                                            RT_VERSION0xb8bb00x360data
                                                                            RT_MANIFEST0xb8f200x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                            DLLImport
                                                                            mscoree.dll_CorExeMain
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Mar 20, 2023 13:55:51.379208088 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:51.561971903 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:51.568327904 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:51.822913885 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:51.823677063 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:52.006165981 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:52.007561922 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:52.022155046 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:52.204807043 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:52.277923107 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:52.469763041 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:52.469798088 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:52.469816923 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:52.469832897 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:52.469852924 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:52.469980001 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:52.652877092 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:52.694524050 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:52.722714901 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:52.906130075 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:53.065079927 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:53.248606920 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:53.249872923 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:53.435743093 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:53.436301947 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:53.630464077 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:53.631983042 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:53.817394018 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:53.817768097 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:54.025801897 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:54.051700115 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:54.235774040 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:54.238713026 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:54.238836050 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:54.238903046 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:54.238959074 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:55:54.421613932 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:54.421794891 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:54.549983978 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:55:54.694654942 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:19.372095108 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:19.556463957 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:19.558954954 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:19.747483969 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:19.750802994 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:19.933517933 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:19.933639050 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:19.934598923 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:20.118187904 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:20.132863045 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:20.316102028 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:20.316154957 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:20.316188097 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:20.316232920 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:20.316243887 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:20.316360950 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:20.319158077 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:20.400011063 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:20.499293089 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:20.507908106 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:20.691613913 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:20.766664982 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:20.949820995 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:20.950285912 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:21.136104107 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:21.136550903 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:21.325586081 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:21.325930119 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:21.512427092 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:21.512749910 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:21.726322889 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:21.753025055 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:21.937357903 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:21.938667059 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:21.938776016 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:21.938776016 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:21.938776016 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:22.121570110 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:22.121669054 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:22.253518105 CET58749702208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:56:22.400196075 CET49702587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:56:29.827996016 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:30.011459112 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:30.014067888 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:30.268151045 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:30.269398928 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:30.452392101 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:30.452708006 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:30.453392982 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:30.636518955 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:30.647614002 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:30.832444906 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:30.832494020 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:30.832515955 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:30.832532883 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:30.832700968 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:30.832743883 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:30.833830118 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:30.901175022 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:31.015933990 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:31.018685102 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:31.202668905 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:31.244693995 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:31.250622034 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:31.438999891 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:31.439589977 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:31.626100063 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:31.626549006 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:31.816194057 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:31.816536903 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:32.002883911 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:32.003215075 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:32.213926077 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:32.214193106 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:32.400808096 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:32.401885033 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:32.402004957 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:32.402059078 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:32.402106047 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:56:32.585180044 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:32.585311890 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:32.724270105 CET58749703208.91.199.223192.168.2.3
                                                                            Mar 20, 2023 13:56:32.776011944 CET49703587192.168.2.3208.91.199.223
                                                                            Mar 20, 2023 13:57:31.375132084 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:57:31.558640003 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:57:31.559303045 CET58749700208.91.198.143192.168.2.3
                                                                            Mar 20, 2023 13:57:31.560026884 CET49700587192.168.2.3208.91.198.143
                                                                            Mar 20, 2023 13:57:31.569428921 CET49700587192.168.2.3208.91.198.143
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Mar 20, 2023 13:55:51.338753939 CET4997753192.168.2.38.8.8.8
                                                                            Mar 20, 2023 13:55:51.360728979 CET53499778.8.8.8192.168.2.3
                                                                            Mar 20, 2023 13:56:19.286415100 CET5799053192.168.2.38.8.8.8
                                                                            Mar 20, 2023 13:56:19.307167053 CET53579908.8.8.8192.168.2.3
                                                                            Mar 20, 2023 13:56:28.777345896 CET5238753192.168.2.38.8.8.8
                                                                            Mar 20, 2023 13:56:29.781128883 CET5238753192.168.2.38.8.8.8
                                                                            Mar 20, 2023 13:56:29.801374912 CET53523878.8.8.8192.168.2.3
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                            Mar 20, 2023 13:55:51.338753939 CET192.168.2.38.8.8.80x12edStandard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                                                            Mar 20, 2023 13:56:19.286415100 CET192.168.2.38.8.8.80x4bacStandard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                                                            Mar 20, 2023 13:56:28.777345896 CET192.168.2.38.8.8.80x2cd4Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                                                            Mar 20, 2023 13:56:29.781128883 CET192.168.2.38.8.8.80x2cd4Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                            Mar 20, 2023 13:55:51.360728979 CET8.8.8.8192.168.2.30x12edNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                                            Mar 20, 2023 13:55:51.360728979 CET8.8.8.8192.168.2.30x12edNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                                            Mar 20, 2023 13:55:51.360728979 CET8.8.8.8192.168.2.30x12edNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                                            Mar 20, 2023 13:55:51.360728979 CET8.8.8.8192.168.2.30x12edNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                                            Mar 20, 2023 13:56:19.307167053 CET8.8.8.8192.168.2.30x4bacNo error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                                            Mar 20, 2023 13:56:19.307167053 CET8.8.8.8192.168.2.30x4bacNo error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                                            Mar 20, 2023 13:56:19.307167053 CET8.8.8.8192.168.2.30x4bacNo error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                                            Mar 20, 2023 13:56:19.307167053 CET8.8.8.8192.168.2.30x4bacNo error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                                            Mar 20, 2023 13:56:29.801374912 CET8.8.8.8192.168.2.30x2cd4No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                                            Mar 20, 2023 13:56:29.801374912 CET8.8.8.8192.168.2.30x2cd4No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                                            Mar 20, 2023 13:56:29.801374912 CET8.8.8.8192.168.2.30x2cd4No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                                            Mar 20, 2023 13:56:29.801374912 CET8.8.8.8192.168.2.30x2cd4No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                                            TimestampSource PortDest PortSource IPDest IPCommands
                                                                            Mar 20, 2023 13:55:51.822913885 CET58749700208.91.198.143192.168.2.3220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                            Mar 20, 2023 13:55:51.823677063 CET49700587192.168.2.3208.91.198.143EHLO 494126
                                                                            Mar 20, 2023 13:55:52.007561922 CET58749700208.91.198.143192.168.2.3250-us2.outbound.mailhostbox.com
                                                                            250-PIPELINING
                                                                            250-SIZE 41648128
                                                                            250-VRFY
                                                                            250-ETRN
                                                                            250-STARTTLS
                                                                            250-AUTH PLAIN LOGIN
                                                                            250-AUTH=PLAIN LOGIN
                                                                            250-ENHANCEDSTATUSCODES
                                                                            250-8BITMIME
                                                                            250-DSN
                                                                            250 CHUNKING
                                                                            Mar 20, 2023 13:55:52.022155046 CET49700587192.168.2.3208.91.198.143STARTTLS
                                                                            Mar 20, 2023 13:55:52.204807043 CET58749700208.91.198.143192.168.2.3220 2.0.0 Ready to start TLS
                                                                            Mar 20, 2023 13:56:19.747483969 CET58749702208.91.198.143192.168.2.3220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                            Mar 20, 2023 13:56:19.750802994 CET49702587192.168.2.3208.91.198.143EHLO 494126
                                                                            Mar 20, 2023 13:56:19.933639050 CET58749702208.91.198.143192.168.2.3250-us2.outbound.mailhostbox.com
                                                                            250-PIPELINING
                                                                            250-SIZE 41648128
                                                                            250-VRFY
                                                                            250-ETRN
                                                                            250-STARTTLS
                                                                            250-AUTH PLAIN LOGIN
                                                                            250-AUTH=PLAIN LOGIN
                                                                            250-ENHANCEDSTATUSCODES
                                                                            250-8BITMIME
                                                                            250-DSN
                                                                            250 CHUNKING
                                                                            Mar 20, 2023 13:56:19.934598923 CET49702587192.168.2.3208.91.198.143STARTTLS
                                                                            Mar 20, 2023 13:56:20.118187904 CET58749702208.91.198.143192.168.2.3220 2.0.0 Ready to start TLS
                                                                            Mar 20, 2023 13:56:30.268151045 CET58749703208.91.199.223192.168.2.3220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                            Mar 20, 2023 13:56:30.269398928 CET49703587192.168.2.3208.91.199.223EHLO 494126
                                                                            Mar 20, 2023 13:56:30.452708006 CET58749703208.91.199.223192.168.2.3250-us2.outbound.mailhostbox.com
                                                                            250-PIPELINING
                                                                            250-SIZE 41648128
                                                                            250-VRFY
                                                                            250-ETRN
                                                                            250-STARTTLS
                                                                            250-AUTH PLAIN LOGIN
                                                                            250-AUTH=PLAIN LOGIN
                                                                            250-ENHANCEDSTATUSCODES
                                                                            250-8BITMIME
                                                                            250-DSN
                                                                            250 CHUNKING
                                                                            Mar 20, 2023 13:56:30.453392982 CET49703587192.168.2.3208.91.199.223STARTTLS
                                                                            Mar 20, 2023 13:56:30.636518955 CET58749703208.91.199.223192.168.2.3220 2.0.0 Ready to start TLS

                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            Click to dive into process behavior distribution

                                                                            Click to jump to process

                                                                            Target ID:0
                                                                            Start time:13:55:28
                                                                            Start date:20/03/2023
                                                                            Path:C:\Users\user\Desktop\PO.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\Desktop\PO.exe
                                                                            Imagebase:0x690000
                                                                            File size:744960 bytes
                                                                            MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Reputation:low

                                                                            Target ID:6
                                                                            Start time:13:55:38
                                                                            Start date:20/03/2023
                                                                            Path:C:\Users\user\Desktop\PO.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\Desktop\PO.exe
                                                                            Imagebase:0xb40000
                                                                            File size:744960 bytes
                                                                            MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.536082591.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.536082591.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            Target ID:11
                                                                            Start time:13:55:52
                                                                            Start date:20/03/2023
                                                                            Path:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe"
                                                                            Imagebase:0xa0000
                                                                            File size:744960 bytes
                                                                            MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Antivirus matches:
                                                                            • Detection: 100%, Joe Sandbox ML
                                                                            • Detection: 38%, ReversingLabs
                                                                            Reputation:low

                                                                            Target ID:12
                                                                            Start time:13:55:58
                                                                            Start date:20/03/2023
                                                                            Path:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                                                            Imagebase:0x10000
                                                                            File size:744960 bytes
                                                                            MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:low

                                                                            Target ID:13
                                                                            Start time:13:55:58
                                                                            Start date:20/03/2023
                                                                            Path:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                                                            Imagebase:0xd70000
                                                                            File size:744960 bytes
                                                                            MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.536833086.000000000311C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.536833086.000000000311C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            Target ID:14
                                                                            Start time:13:56:00
                                                                            Start date:20/03/2023
                                                                            Path:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe"
                                                                            Imagebase:0x850000
                                                                            File size:744960 bytes
                                                                            MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Reputation:low

                                                                            Target ID:15
                                                                            Start time:13:56:15
                                                                            Start date:20/03/2023
                                                                            Path:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                                                            Imagebase:0x3a0000
                                                                            File size:744960 bytes
                                                                            MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:low

                                                                            Target ID:16
                                                                            Start time:13:56:15
                                                                            Start date:20/03/2023
                                                                            Path:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\AppData\Roaming\keWKhH\keWKhH.exe
                                                                            Imagebase:0x660000
                                                                            File size:744960 bytes
                                                                            MD5 hash:03D90E26C8A6FBBEB284359B0F90EE91
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.536562013.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.536562013.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            Reset < >

                                                                              Execution Graph

                                                                              Execution Coverage:8.6%
                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                              Signature Coverage:0%
                                                                              Total number of Nodes:91
                                                                              Total number of Limit Nodes:7
                                                                              execution_graph 18962 5b32b78 18963 5b32d03 18962->18963 18964 5b32b9e 18962->18964 18964->18963 18967 5b32df1 18964->18967 18971 5b32df8 PostMessageW 18964->18971 18968 5b32df6 PostMessageW 18967->18968 18970 5b32d91 18967->18970 18969 5b32e64 18968->18969 18969->18964 18970->18964 18972 5b32e64 18971->18972 18972->18964 18973 fd40d0 18974 fd40e2 18973->18974 18975 fd40ee 18974->18975 18979 fd41e0 18974->18979 18984 fd3c64 18975->18984 18977 fd410d 18980 fd4205 18979->18980 18988 fd42e0 18980->18988 18992 fd42d0 18980->18992 18985 fd3c6f 18984->18985 19000 fd51a4 18985->19000 18987 fd7241 18987->18977 18990 fd4307 18988->18990 18989 fd43e4 18989->18989 18990->18989 18996 fd3de8 18990->18996 18994 fd4307 18992->18994 18993 fd43e4 18993->18993 18994->18993 18995 fd3de8 CreateActCtxA 18994->18995 18995->18993 18997 fd5370 CreateActCtxA 18996->18997 18999 fd5433 18997->18999 19001 fd51af 19000->19001 19004 fd6dc0 19001->19004 19003 fd784d 19003->18987 19005 fd6dcb 19004->19005 19008 fd6df0 19005->19008 19007 fd7922 19007->19003 19009 fd6dfb 19008->19009 19012 fd6e20 19009->19012 19011 fd7a22 19011->19007 19014 fd6e2b 19012->19014 19013 fd817c 19013->19011 19014->19013 19016 fdc038 19014->19016 19017 fdc069 19016->19017 19018 fdc08d 19017->19018 19021 fdc1f8 19017->19021 19025 fdc1e8 19017->19025 19018->19013 19022 fdc205 19021->19022 19024 fdc23f 19022->19024 19029 fda9c4 19022->19029 19024->19018 19026 fdc1f8 19025->19026 19027 fdc23f 19026->19027 19028 fda9c4 2 API calls 19026->19028 19027->19018 19028->19027 19030 fda9c9 19029->19030 19032 fdcf38 19030->19032 19033 fdc574 19030->19033 19032->19032 19034 fdc57f 19033->19034 19035 fd6e20 2 API calls 19034->19035 19036 fdcfa7 19035->19036 19039 fded5c 19036->19039 19040 fdcfe0 19039->19040 19041 fded75 19039->19041 19040->19032 19043 fdf1a8 LoadLibraryExW GetModuleHandleW 19041->19043 19044 fdf1b0 LoadLibraryExW GetModuleHandleW 19041->19044 19042 fdedad 19043->19042 19044->19042 19045 fd9f30 19048 fda028 19045->19048 19046 fd9f3f 19049 fda03b 19048->19049 19050 fda053 19049->19050 19056 fda2b0 19049->19056 19060 fda2a0 19049->19060 19050->19046 19051 fda04b 19051->19050 19052 fda250 GetModuleHandleW 19051->19052 19053 fda27d 19052->19053 19053->19046 19057 fda2c4 19056->19057 19058 fda2e9 19057->19058 19064 fd93d8 19057->19064 19058->19051 19062 fda2b0 19060->19062 19061 fda2e9 19061->19051 19062->19061 19063 fd93d8 LoadLibraryExW 19062->19063 19063->19061 19065 fda490 LoadLibraryExW 19064->19065 19067 fda509 19065->19067 19067->19058 19068 fdc310 GetCurrentProcess 19069 fdc38a GetCurrentThread 19068->19069 19070 fdc383 19068->19070 19071 fdc3c7 GetCurrentProcess 19069->19071 19072 fdc3c0 19069->19072 19070->19069 19075 fdc3fd 19071->19075 19072->19071 19073 fdc425 GetCurrentThreadId 19074 fdc456 19073->19074 19075->19073 19076 fdc940 DuplicateHandle 19077 fdc9d6 19076->19077

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 175 5b302e0-5b302e1 176 5b302e3-5b302f0 175->176 177 5b302ff-5b30308 175->177 178 5b3056b-5b30587 176->178 177->178 180 5b30590 178->180 181 5b30589 178->181 200 5b30596-5b3059d 180->200 181->180 182 5b30413-5b30425 181->182 183 5b30550-5b30562 181->183 184 5b302f5-5b302fe 181->184 185 5b30334-5b30354 181->185 186 5b30378-5b3040e 181->186 187 5b30380-5b303c0 181->187 188 5b30326-5b3032f 181->188 189 5b302c6-5b302d9 181->189 190 5b30564 181->190 191 5b30504-5b3050f 181->191 192 5b3042a-5b30451 181->192 193 5b3036d-5b30377 181->193 194 5b3030d-5b30314 181->194 182->178 183->178 184->177 197 5b302b1-5b302b7 185->197 210 5b3035a-5b30362 185->210 186->178 203 5b303c2-5b303dc 187->203 204 5b303e8-5b303f7 187->204 188->178 189->178 190->178 191->197 198 5b30453 192->198 199 5b30458-5b3046f 192->199 205 5b3031c-5b30324 194->205 206 5b302c0-5b302c1 197->206 207 5b302b9 197->207 198->199 201 5b30471 199->201 202 5b30476-5b30498 199->202 208 5b305a4-5b305aa 200->208 201->202 219 5b3049a 202->219 220 5b3049f-5b304d2 202->220 203->197 218 5b303e2-5b303e3 203->218 204->208 205->197 211 5b30514-5b30526 206->211 207->182 207->183 207->184 207->185 207->186 207->187 207->188 207->189 207->190 207->191 207->192 207->193 207->194 207->206 207->211 212 5b302de-5b302df 207->212 213 5b3053c-5b3054e 207->213 214 5b30367-5b30368 207->214 215 5b30528-5b3053a 207->215 208->178 210->197 211->178 212->175 213->178 214->193 214->200 215->178 219->220 223 5b304d4 220->223 224 5b304d9-5b304f8 220->224 223->224 224->197 226 5b304fe 224->226 226->191
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.309596975.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_5b30000_PO.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: pl-pl
                                                                              • API String ID: 0-363781727
                                                                              • Opcode ID: 2f9a4dfb5903d06738c4729203b810eef1147bd69b93a921a8edeeb5157fddca
                                                                              • Instruction ID: 7e755be17e71c7896666bfa05a6f003386faf0e2768ea047c990127081fbd9b1
                                                                              • Opcode Fuzzy Hash: 2f9a4dfb5903d06738c4729203b810eef1147bd69b93a921a8edeeb5157fddca
                                                                              • Instruction Fuzzy Hash: 139103B4A4521DDFCB04DFA9C5855EDFBB2FF48300F24A59AD006BB215D734A942CB64
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32 ref: 00FDC370
                                                                              • GetCurrentThread.KERNEL32 ref: 00FDC3AD
                                                                              • GetCurrentProcess.KERNEL32 ref: 00FDC3EA
                                                                              • GetCurrentThreadId.KERNEL32 ref: 00FDC443
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.288270588.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_fd0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: Current$ProcessThread
                                                                              • String ID:
                                                                              • API String ID: 2063062207-0
                                                                              • Opcode ID: 3188dc6b951cd998be0f49e8eda5260fbf01d84c251894ea289d8d4f1797ba37
                                                                              • Instruction ID: d3386f4c160105213d9c75af204e02fa788af3b583801d581aeef670d6d14b20
                                                                              • Opcode Fuzzy Hash: 3188dc6b951cd998be0f49e8eda5260fbf01d84c251894ea289d8d4f1797ba37
                                                                              • Instruction Fuzzy Hash: FF5176B4D002498FDB11CFAAC98879EBFF1AF49314F24C49AE009A7391C7756984CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32 ref: 00FDC370
                                                                              • GetCurrentThread.KERNEL32 ref: 00FDC3AD
                                                                              • GetCurrentProcess.KERNEL32 ref: 00FDC3EA
                                                                              • GetCurrentThreadId.KERNEL32 ref: 00FDC443
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.288270588.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_fd0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: Current$ProcessThread
                                                                              • String ID:
                                                                              • API String ID: 2063062207-0
                                                                              • Opcode ID: 8637d31703531aa10fc17f1f89dc26da5eabca57f4cae33e5b3b731b6cf0eaff
                                                                              • Instruction ID: a2b22f372277b8c6eb1c0088cf10db470c236e3d7e45f95055c789403342d407
                                                                              • Opcode Fuzzy Hash: 8637d31703531aa10fc17f1f89dc26da5eabca57f4cae33e5b3b731b6cf0eaff
                                                                              • Instruction Fuzzy Hash: E65156B4D002498FDB10CFAAC988B9EBBF1BF48314F24C45AE409A7391C7756984CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 38 fda028-fda03d call fd9370 41 fda03f 38->41 42 fda053-fda057 38->42 91 fda045 call fda2b0 41->91 92 fda045 call fda2a0 41->92 43 fda059-fda063 42->43 44 fda06b-fda0ac 42->44 43->44 49 fda0ae-fda0b6 44->49 50 fda0b9-fda0c7 44->50 45 fda04b-fda04d 45->42 47 fda188-fda248 45->47 86 fda24a-fda24d 47->86 87 fda250-fda27b GetModuleHandleW 47->87 49->50 52 fda0c9-fda0ce 50->52 53 fda0eb-fda0ed 50->53 54 fda0d9 52->54 55 fda0d0-fda0d7 call fd937c 52->55 56 fda0f0-fda0f7 53->56 59 fda0db-fda0e9 54->59 55->59 60 fda0f9-fda101 56->60 61 fda104-fda10b 56->61 59->56 60->61 63 fda10d-fda115 61->63 64 fda118-fda121 call fd938c 61->64 63->64 68 fda12e-fda133 64->68 69 fda123-fda12b 64->69 71 fda135-fda13c 68->71 72 fda151-fda155 68->72 69->68 71->72 73 fda13e-fda14e call fd939c call fd93ac 71->73 93 fda158 call fda599 72->93 94 fda158 call fda5a8 72->94 73->72 76 fda15b-fda15e 79 fda181-fda187 76->79 80 fda160-fda17e 76->80 80->79 86->87 88 fda27d-fda283 87->88 89 fda284-fda298 87->89 88->89 91->45 92->45 93->76 94->76
                                                                              APIs
                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00FDA26E
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.288270588.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_fd0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: HandleModule
                                                                              • String ID:
                                                                              • API String ID: 4139908857-0
                                                                              • Opcode ID: 5ee8d7f84f4be157d01aa505168e3f50e92bdf22c3449116ac9e467c5a8d7606
                                                                              • Instruction ID: 1386c7b63a288627995dce529d5cd5f8cf7f41457b89d209d6b8ec50b53c7a11
                                                                              • Opcode Fuzzy Hash: 5ee8d7f84f4be157d01aa505168e3f50e92bdf22c3449116ac9e467c5a8d7606
                                                                              • Instruction Fuzzy Hash: 74714470A00B058FDB24DF6AD44475ABBF2BF88314F04892EE08AD7B50DB75E8459F96
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 95 fd5364-fd536e 96 fd5370-fd5431 CreateActCtxA 95->96 98 fd543a-fd5494 96->98 99 fd5433-fd5439 96->99 106 fd5496-fd5499 98->106 107 fd54a3-fd54a7 98->107 99->98 106->107 108 fd54a9-fd54b5 107->108 109 fd54b8 107->109 108->109 111 fd54b9 109->111 111->111
                                                                              APIs
                                                                              • CreateActCtxA.KERNEL32(?), ref: 00FD5421
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.288270588.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_fd0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: Create
                                                                              • String ID:
                                                                              • API String ID: 2289755597-0
                                                                              • Opcode ID: 9f0f769b617f2fe5da826c05fa94fcefb9138b6a0b219774f2e107a2d644d9dc
                                                                              • Instruction ID: 0ed479c83b707b14a2c1287ee5b2e56080d5f7b657b44d3e93ebad2861d0778f
                                                                              • Opcode Fuzzy Hash: 9f0f769b617f2fe5da826c05fa94fcefb9138b6a0b219774f2e107a2d644d9dc
                                                                              • Instruction Fuzzy Hash: CD41F471C00618CFDB24DF99C884B8EBBF6BF49314F24809AD409AB251DBB55986CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 112 fd3de8-fd5431 CreateActCtxA 115 fd543a-fd5494 112->115 116 fd5433-fd5439 112->116 123 fd5496-fd5499 115->123 124 fd54a3-fd54a7 115->124 116->115 123->124 125 fd54a9-fd54b5 124->125 126 fd54b8 124->126 125->126 128 fd54b9 126->128 128->128
                                                                              APIs
                                                                              • CreateActCtxA.KERNEL32(?), ref: 00FD5421
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.288270588.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_fd0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: Create
                                                                              • String ID:
                                                                              • API String ID: 2289755597-0
                                                                              • Opcode ID: bfd3376b4fbc378e866d2267f7441d74ccc47c9535689558ebceaa36a1cd967e
                                                                              • Instruction ID: 323e29e4f3132e52df327a4ca7fdd99032c782d11082f204fa50550fbc68e54f
                                                                              • Opcode Fuzzy Hash: bfd3376b4fbc378e866d2267f7441d74ccc47c9535689558ebceaa36a1cd967e
                                                                              • Instruction Fuzzy Hash: 6641F271C0061CCFDB24DFA9C884B8EBBF6BF49305F24809AD409AB251DBB56985CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 129 5b32df1-5b32df4 130 5b32d91-5b32dc7 129->130 131 5b32df6-5b32e62 PostMessageW 129->131 135 5b32dd0-5b32de4 130->135 136 5b32dc9-5b32dcf 130->136 132 5b32e64-5b32e6a 131->132 133 5b32e6b-5b32e7f 131->133 132->133 136->135
                                                                              APIs
                                                                              • PostMessageW.USER32(?,?,?,?), ref: 05B32E55
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.309596975.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_5b30000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: MessagePost
                                                                              • String ID:
                                                                              • API String ID: 410705778-0
                                                                              • Opcode ID: 6d2af169ffc5f2253d6151c2cb892f8a55837327573eebb10e2bbcb8f0111835
                                                                              • Instruction ID: df650032b78cfb5c20007c22bb7c25e7cd32bfcd905527bedfb09981fcd1186d
                                                                              • Opcode Fuzzy Hash: 6d2af169ffc5f2253d6151c2cb892f8a55837327573eebb10e2bbcb8f0111835
                                                                              • Instruction Fuzzy Hash: B131F4B98002099FDB10CF99D986BDEFBF4FB48324F20845AE459B7600C375A584CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 139 fdc938-fdc9d4 DuplicateHandle 140 fdc9dd-fdc9fa 139->140 141 fdc9d6-fdc9dc 139->141 141->140
                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00FDC9C7
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.288270588.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_fd0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID:
                                                                              • API String ID: 3793708945-0
                                                                              • Opcode ID: 2637ac06136f0f6d484ac2f03c178ebcb4638c72e886237adc04dc4036c8ce47
                                                                              • Instruction ID: 586affe4840c3d40b839ee2dfd65f5de934ae894261bcfaee25cfb6b37e27476
                                                                              • Opcode Fuzzy Hash: 2637ac06136f0f6d484ac2f03c178ebcb4638c72e886237adc04dc4036c8ce47
                                                                              • Instruction Fuzzy Hash: 932105B5D00249DFDB10CFA9D984ADEBFF5EB48324F14845AE814A3310C378A944CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 144 fdc940-fdc9d4 DuplicateHandle 145 fdc9dd-fdc9fa 144->145 146 fdc9d6-fdc9dc 144->146 146->145
                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00FDC9C7
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.288270588.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_fd0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID:
                                                                              • API String ID: 3793708945-0
                                                                              • Opcode ID: ffb951ede93329a21c745fb56f63b963d8593589361e52a762ac51029cf5ce49
                                                                              • Instruction ID: 3a350dc2291812a4f9afdc5e92f997c79c61a3ed2527109b17002f6742f3f456
                                                                              • Opcode Fuzzy Hash: ffb951ede93329a21c745fb56f63b963d8593589361e52a762ac51029cf5ce49
                                                                              • Instruction Fuzzy Hash: FA21E0B59002099FDB10CFAAD984ADEBFF9EB48324F14841AE914A3310C379A944CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 157 fda488-fda4d0 159 fda4d8-fda507 LoadLibraryExW 157->159 160 fda4d2-fda4d5 157->160 161 fda509-fda50f 159->161 162 fda510-fda52d 159->162 160->159 161->162
                                                                              APIs
                                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00FDA2E9,00000800,00000000,00000000), ref: 00FDA4FA
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.288270588.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_fd0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: LibraryLoad
                                                                              • String ID:
                                                                              • API String ID: 1029625771-0
                                                                              • Opcode ID: 51671f690c82d01c6b3c71e288dba5a9b3dfcd9a52338285f39eb58de80e36f5
                                                                              • Instruction ID: c7f859ef38a79588bace36eb0546e56340be02cc21495ab698253ea73df383b0
                                                                              • Opcode Fuzzy Hash: 51671f690c82d01c6b3c71e288dba5a9b3dfcd9a52338285f39eb58de80e36f5
                                                                              • Instruction Fuzzy Hash: BB1114B6D002099FDB10CF9AD844BDEFBF5AB49324F14852EE419A7310C3B5A945CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 149 fd93d8-fda4d0 151 fda4d8-fda507 LoadLibraryExW 149->151 152 fda4d2-fda4d5 149->152 153 fda509-fda50f 151->153 154 fda510-fda52d 151->154 152->151 153->154
                                                                              APIs
                                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00FDA2E9,00000800,00000000,00000000), ref: 00FDA4FA
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.288270588.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_fd0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: LibraryLoad
                                                                              • String ID:
                                                                              • API String ID: 1029625771-0
                                                                              • Opcode ID: 2b4b2d0ff448610d6bcefee8ea614d2944a5482870ce3e9da7dd70772e119f1c
                                                                              • Instruction ID: 6463cfa5f20e020bdb77098857b6ee56a4397ad565599f50bf4912cc99478402
                                                                              • Opcode Fuzzy Hash: 2b4b2d0ff448610d6bcefee8ea614d2944a5482870ce3e9da7dd70772e119f1c
                                                                              • Instruction Fuzzy Hash: 741103B6D002099FCB10CF9AD844BEEBBF5AB49324F54846EE419B7310C3B5A945CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 165 fda208-fda248 166 fda24a-fda24d 165->166 167 fda250-fda27b GetModuleHandleW 165->167 166->167 168 fda27d-fda283 167->168 169 fda284-fda298 167->169 168->169
                                                                              APIs
                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00FDA26E
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.288270588.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_fd0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: HandleModule
                                                                              • String ID:
                                                                              • API String ID: 4139908857-0
                                                                              • Opcode ID: 7c50c2fcbf5599a6ece3d702559115fa9add47d1513d92285cf404698a4d33dd
                                                                              • Instruction ID: 1ff10576e4cf3957f4d41a29ee537d368789ddcef84a5cfd7166ada4625205d4
                                                                              • Opcode Fuzzy Hash: 7c50c2fcbf5599a6ece3d702559115fa9add47d1513d92285cf404698a4d33dd
                                                                              • Instruction Fuzzy Hash: 581113B5C002498FCB10CF9AC844BDEFBF5AB88324F14845AD419A7300C379A545CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 171 5b32df8-5b32e62 PostMessageW 172 5b32e64-5b32e6a 171->172 173 5b32e6b-5b32e7f 171->173 172->173
                                                                              APIs
                                                                              • PostMessageW.USER32(?,?,?,?), ref: 05B32E55
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.309596975.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_5b30000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: MessagePost
                                                                              • String ID:
                                                                              • API String ID: 410705778-0
                                                                              • Opcode ID: 602dbe92a45cb9b1fcbbdfc250117144483c870ee8b03a62bfb960b161934303
                                                                              • Instruction ID: 9e8f254bc81b4f8d11064186fa685278693804871ee940c7270bebf0be46c269
                                                                              • Opcode Fuzzy Hash: 602dbe92a45cb9b1fcbbdfc250117144483c870ee8b03a62bfb960b161934303
                                                                              • Instruction Fuzzy Hash: 4911D3B58002499FDB20CF9AD985BDEFBF8FB48324F208459E459B7600C375A984CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.309379681.00000000054A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054A0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_54a0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d6e863cba2e84d162e157bb878c9cabf62712ad70fbad3d15c274da987057744
                                                                              • Instruction ID: 2e670c94801f51ba595267ff16dec043628784c9092cf91355c38796d2b0c993
                                                                              • Opcode Fuzzy Hash: d6e863cba2e84d162e157bb878c9cabf62712ad70fbad3d15c274da987057744
                                                                              • Instruction Fuzzy Hash: 23E04F34900208EFCB44DF94E44499DBFB4FF09311F208095E80517324C731AE54DF84
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.309379681.00000000054A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054A0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_54a0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: @
                                                                              • API String ID: 0-2766056989
                                                                              • Opcode ID: 92fc01c6f08093487427be4da4971ffb4a7e15f3e93f076e1f4641d29f1e8e8f
                                                                              • Instruction ID: 29ba27ba8d1f774150167629ad4ffd8d8b3754e3279ea706f600b4b57e73bc72
                                                                              • Opcode Fuzzy Hash: 92fc01c6f08093487427be4da4971ffb4a7e15f3e93f076e1f4641d29f1e8e8f
                                                                              • Instruction Fuzzy Hash: 7F410EB1E016688BEB6CCF6B8D4479AFAF7BFC9200F14C1BAD40DA6255DB7109958F01
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.309596975.0000000005B30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_5b30000_PO.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 40fd5a020408ba268699bc41180c2dae33208ac58716d0c2b693098221b50a1f
                                                                              • Instruction ID: 8949e284f05f79f098b75ad51a3f9f60d57559fb52cc69b165457844761ad33c
                                                                              • Opcode Fuzzy Hash: 40fd5a020408ba268699bc41180c2dae33208ac58716d0c2b693098221b50a1f
                                                                              • Instruction Fuzzy Hash: FBD1BE31B046048FDB19DB79C456BAEB7F7AF89700F1484AAD046EB391DB39E805CB51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.288270588.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_fd0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a5853b994a48bd3fbdaa55e2631f771470f23657cf6b24caca74565f589d6219
                                                                              • Instruction ID: 4370cbe986b94ce880612fe326c11135c5d600d874fdd23d6a7400f0676bf38e
                                                                              • Opcode Fuzzy Hash: a5853b994a48bd3fbdaa55e2631f771470f23657cf6b24caca74565f589d6219
                                                                              • Instruction Fuzzy Hash: F712B5F1411F4ACAD310CF65ED981A93BA9FF81B28B514308D3616BAF1D7B8116AEF44
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.288270588.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_fd0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: fe746b0b931023bc40c98031cfeaceb58753a6810c06d51943718252c002d887
                                                                              • Instruction ID: 9923e74a99032f6cc37a277d053f6b35d529b35a4aef5a9a9b4b23cf532eb068
                                                                              • Opcode Fuzzy Hash: fe746b0b931023bc40c98031cfeaceb58753a6810c06d51943718252c002d887
                                                                              • Instruction Fuzzy Hash: 0BA18F36E0021A8FCF05DFA5C8845DDBBB3FF85310B19856AE905AF361DB35A905DB40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.288270588.0000000000FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FD0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_fd0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f1dbe2e1c5e88c440fc8a3bdeece1a0d824855712210d453186a1ccc435f5064
                                                                              • Instruction ID: 3370bd756f8049508d13275c014fb059cd1a22c9f744b7851bc7909e5138c448
                                                                              • Opcode Fuzzy Hash: f1dbe2e1c5e88c440fc8a3bdeece1a0d824855712210d453186a1ccc435f5064
                                                                              • Instruction Fuzzy Hash: F4C117B1811F4A8BD710CF65EC881A93BA9FF85B28F514309D3616B6F0D7B8116AEF44
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.309379681.00000000054A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054A0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_54a0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8aca78abe4be397011d5bc937c39d185cd7c80ce391693aaa6a6535e02fb8ad9
                                                                              • Instruction ID: d0ef7283192a70a6db8ac5c6e6d481967e0ac02dec18932ff7689870cc2541e9
                                                                              • Opcode Fuzzy Hash: 8aca78abe4be397011d5bc937c39d185cd7c80ce391693aaa6a6535e02fb8ad9
                                                                              • Instruction Fuzzy Hash: 99717C7090124C8FD748EFBAE9416AE7BF7FFC4304B14C56AC0099B66AEB741906CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.309379681.00000000054A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054A0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_54a0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0ba6e84cd0a7e3c4b0a68d681bea434cd4ad4aa880578e611af6468127180c04
                                                                              • Instruction ID: 9a6f3ab24773c52006bd47b4cf70d70980a5ba792eebed773280f70188a89198
                                                                              • Opcode Fuzzy Hash: 0ba6e84cd0a7e3c4b0a68d681bea434cd4ad4aa880578e611af6468127180c04
                                                                              • Instruction Fuzzy Hash: 5A613A70A0024D8BD748EFAAE9416AE7BF7FFC4304F14C42AD0199B669EF745905CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.309379681.00000000054A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054A0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_54a0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: cfd860c8c0b329e49b0773cfa54780965d7348ed9667490cebad310c7a5627bb
                                                                              • Instruction ID: 79e516a4272dbf2ba06000a3d7198a4ca921b53945a1a678d71dfaa8c19726db
                                                                              • Opcode Fuzzy Hash: cfd860c8c0b329e49b0773cfa54780965d7348ed9667490cebad310c7a5627bb
                                                                              • Instruction Fuzzy Hash: 6C413371E05A588BEB5CCF6B8D4069EFAF7BFC9201F14C1BA840DAA255DB3055468E41
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.309379681.00000000054A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054A0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_54a0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 45104e5944fec898c20531628d82f5d58f55b7d6409e9d014f25f32954bb1e47
                                                                              • Instruction ID: f8010cb842a7da719e94d1f769543b6b1002ee22bde0035910909909c6bd6e97
                                                                              • Opcode Fuzzy Hash: 45104e5944fec898c20531628d82f5d58f55b7d6409e9d014f25f32954bb1e47
                                                                              • Instruction Fuzzy Hash: 3B4114B1E016588BEB5CCF6B9D4169DFAF3BFC8200F18C1BAD40DAA255DB3105568F01
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Execution Graph

                                                                              Execution Coverage:9.1%
                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                              Signature Coverage:3.7%
                                                                              Total number of Nodes:81
                                                                              Total number of Limit Nodes:7
                                                                              execution_graph 34702 6aa3928 34703 6aa392e 34702->34703 34709 6aa4a18 34703->34709 34717 6aa49b0 34703->34717 34725 6aa49d3 34703->34725 34734 6aa4988 34703->34734 34704 6aa396f 34711 6aa4a2a 34709->34711 34710 6aa4a79 34753 6aa3b4c 34710->34753 34711->34710 34713 6aa4a69 34711->34713 34743 6aa4ba0 34713->34743 34748 6aa4b90 34713->34748 34714 6aa4a77 34718 6aa49b3 34717->34718 34718->34704 34719 6aa4a79 34718->34719 34721 6aa4a69 34718->34721 34720 6aa3b4c CallWindowProcW 34719->34720 34722 6aa4a77 34720->34722 34723 6aa4ba0 CallWindowProcW 34721->34723 34724 6aa4b90 CallWindowProcW 34721->34724 34723->34722 34724->34722 34726 6aa4a4f 34725->34726 34730 6aa49da 34725->34730 34727 6aa4a79 34726->34727 34728 6aa4a69 34726->34728 34729 6aa3b4c CallWindowProcW 34727->34729 34732 6aa4ba0 CallWindowProcW 34728->34732 34733 6aa4b90 CallWindowProcW 34728->34733 34731 6aa4a77 34729->34731 34730->34704 34732->34731 34733->34731 34735 6aa4a02 34734->34735 34736 6aa492a 34734->34736 34737 6aa4a79 34735->34737 34739 6aa4a69 34735->34739 34736->34704 34738 6aa3b4c CallWindowProcW 34737->34738 34740 6aa4a77 34738->34740 34741 6aa4ba0 CallWindowProcW 34739->34741 34742 6aa4b90 CallWindowProcW 34739->34742 34741->34740 34742->34740 34744 6aa4bb4 34743->34744 34757 6aa4c48 34744->34757 34761 6aa4c58 34744->34761 34745 6aa4c40 34745->34714 34750 6aa4b94 34748->34750 34749 6aa4c40 34749->34714 34751 6aa4c48 CallWindowProcW 34750->34751 34752 6aa4c58 CallWindowProcW 34750->34752 34751->34749 34752->34749 34754 6aa3b52 34753->34754 34755 6aa61ba CallWindowProcW 34754->34755 34756 6aa6169 34754->34756 34755->34756 34756->34714 34758 6aa4c4c 34757->34758 34759 6aa4c69 34758->34759 34764 6aa6100 34758->34764 34759->34745 34762 6aa4c69 34761->34762 34763 6aa6100 CallWindowProcW 34761->34763 34762->34745 34763->34762 34765 6aa3b4c CallWindowProcW 34764->34765 34766 6aa610a 34765->34766 34766->34759 34779 632a2a0 34781 632a2b5 34779->34781 34780 632a500 34781->34780 34782 632a920 GlobalMemoryStatusEx 34781->34782 34782->34781 34767 2d65ad0 34768 2d65aee 34767->34768 34771 2d65a64 34768->34771 34770 2d65b25 34773 2d675f0 LoadLibraryA 34771->34773 34774 2d676e9 34773->34774 34783 6aa3770 34784 6aa3776 CreateWindowExW 34783->34784 34786 6aa3894 34784->34786 34787 6aaa610 34788 6aaa638 34787->34788 34791 6aaa664 34787->34791 34789 6aaa641 34788->34789 34792 6aa76e4 34788->34792 34794 6aa76ef 34792->34794 34793 6aaaafb 34793->34791 34794->34793 34796 6aa7700 34794->34796 34797 6aaab30 OleInitialize 34796->34797 34799 6aaab94 34797->34799 34799->34793 34775 2d6f6d8 34777 2d6f6dd GetUserNameW 34775->34777 34778 2d6f825 34777->34778

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 803 2d6f6d8-2d6f737 805 2d6f7a2-2d6f7a6 803->805 806 2d6f739-2d6f764 803->806 807 2d6f7d1-2d6f7dc 805->807 808 2d6f7a8-2d6f7cb 805->808 812 2d6f766-2d6f768 806->812 813 2d6f794 806->813 809 2d6f7de-2d6f7e6 807->809 810 2d6f7e8-2d6f823 GetUserNameW 807->810 808->807 809->810 814 2d6f825-2d6f82b 810->814 815 2d6f82c-2d6f842 810->815 817 2d6f78a-2d6f792 812->817 818 2d6f76a-2d6f774 812->818 824 2d6f799-2d6f79c 813->824 814->815 819 2d6f844-2d6f850 815->819 820 2d6f858-2d6f87f 815->820 817->824 821 2d6f776 818->821 822 2d6f778-2d6f786 818->822 819->820 829 2d6f881-2d6f885 820->829 830 2d6f88f 820->830 821->822 822->822 827 2d6f788 822->827 824->805 827->817 829->830 831 2d6f887 829->831 832 2d6f890 830->832 831->830 832->832
                                                                              APIs
                                                                              • GetUserNameW.ADVAPI32(00000000,00000000), ref: 02D6F813
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.535856884.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_2d60000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: NameUser
                                                                              • String ID:
                                                                              • API String ID: 2645101109-0
                                                                              • Opcode ID: c20728e2d598f3de2c7e237b324b06439186b520b191a88419e557a1fbb4b64f
                                                                              • Instruction ID: 78cc5d29204aa98d4ed6d2f068b9f875aec04157673cbad3dcac94504fa6a559
                                                                              • Opcode Fuzzy Hash: c20728e2d598f3de2c7e237b324b06439186b520b191a88419e557a1fbb4b64f
                                                                              • Instruction Fuzzy Hash: F95136B4D006188FDB18CFA9D888BADBBF5BF48314F248119E816BB755CB749844CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 651 6aa3610-6aa3612 652 6aa361a 651->652 653 6aa3614-6aa3618 651->653 654 6aa361c 652->654 655 6aa3622-6aa3632 652->655 653->652 654->655 656 6aa363a 655->656 657 6aa3634-6aa3638 655->657 658 6aa363c-6aa3641 656->658 659 6aa3642-6aa3672 656->659 657->656 658->659 661 6aa367a 659->661 662 6aa3674-6aa3678 659->662 663 6aa367c 661->663 664 6aa3682-6aa3692 661->664 662->661 663->664 665 6aa369a 664->665 666 6aa3694-6aa3699 664->666 667 6aa369c 665->667 668 6aa36a2-6aa36b2 665->668 666->665 667->668 669 6aa36ba 668->669 670 6aa36b4-6aa36b9 668->670 671 6aa36bc 669->671 672 6aa36c2-6aa36d0 669->672 670->669 671->672 673 6aa373f-6aa3741 672->673 674 6aa36d2 672->674 675 6aa3743-6aa3745 673->675 676 6aa3747-6aa3749 673->676 677 6aa36da 674->677 678 6aa36d4-6aa36d8 674->678 675->676 679 6aa374b-6aa374d 676->679 680 6aa374f-6aa3756 676->680 681 6aa36dc-6aa36e0 677->681 682 6aa36e2-6aa36f8 677->682 678->677 679->680 681->682 684 6aa36fa 682->684 685 6aa3767-6aa376c 682->685 687 6aa36fc-6aa3700 684->687 688 6aa3702-6aa371d 684->688 686 6aa376e 685->686 690 6aa3770-6aa3775 686->690 691 6aa3776-6aa377e 686->691 687->688 693 6aa371f-6aa3724 688->693 694 6aa3780-6aa37d6 688->694 690->691 691->694 697 6aa375e-6aa3766 693->697 698 6aa3726-6aa373d 693->698 695 6aa37d8-6aa37de 694->695 696 6aa37e1-6aa37e8 694->696 695->696 699 6aa37ea-6aa37f0 696->699 700 6aa37f3-6aa382b 696->700 697->685 697->686 698->673 699->700 701 6aa3833-6aa3892 CreateWindowExW 700->701 702 6aa389b-6aa38d3 701->702 703 6aa3894-6aa389a 701->703 707 6aa38e0 702->707 708 6aa38d5-6aa38d8 702->708 703->702 709 6aa38e1 707->709 708->707 709->709
                                                                              APIs
                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06AA3882
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.553997729.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6aa0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: CreateWindow
                                                                              • String ID:
                                                                              • API String ID: 716092398-0
                                                                              • Opcode ID: ef4b9fb312e8553ee5df89e6833041202fbde4af69be7ec868bf26fb993afcab
                                                                              • Instruction ID: b15d450f94f9d3b6ca736c82a20e7a8f95df182d23c3a3934f9b27bf6ff565af
                                                                              • Opcode Fuzzy Hash: ef4b9fb312e8553ee5df89e6833041202fbde4af69be7ec868bf26fb993afcab
                                                                              • Instruction Fuzzy Hash: EB9199B1C093889FDF52DFA5C8509DEBFB2EF0A250F19819BE444EB262C3759845CB61
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 710 2d6f679-2d6f680 711 2d6f682-2d6f6c3 710->711 712 2d6f6dd-2d6f737 710->712 714 2d6f7a2-2d6f7a6 712->714 715 2d6f739-2d6f764 712->715 716 2d6f7d1-2d6f7dc 714->716 717 2d6f7a8-2d6f7cb 714->717 722 2d6f766-2d6f768 715->722 723 2d6f794 715->723 718 2d6f7de-2d6f7e6 716->718 719 2d6f7e8-2d6f823 GetUserNameW 716->719 717->716 718->719 724 2d6f825-2d6f82b 719->724 725 2d6f82c-2d6f842 719->725 727 2d6f78a-2d6f792 722->727 728 2d6f76a-2d6f774 722->728 735 2d6f799-2d6f79c 723->735 724->725 730 2d6f844-2d6f850 725->730 731 2d6f858-2d6f87f 725->731 727->735 732 2d6f776 728->732 733 2d6f778-2d6f786 728->733 730->731 741 2d6f881-2d6f885 731->741 742 2d6f88f 731->742 732->733 733->733 738 2d6f788 733->738 735->714 738->727 741->742 743 2d6f887 741->743 744 2d6f890 742->744 743->742 744->744
                                                                              APIs
                                                                              • GetUserNameW.ADVAPI32(00000000,00000000), ref: 02D6F813
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.535856884.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_2d60000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: NameUser
                                                                              • String ID:
                                                                              • API String ID: 2645101109-0
                                                                              • Opcode ID: 1884ac0af4f7a2d505c7f97dccb4266ce71e3583e94d21c6760632a52df004ef
                                                                              • Instruction ID: cf43299e3747430c559df86ee0c6a2a8c4d9765749b77b315ac8dce6cceec00c
                                                                              • Opcode Fuzzy Hash: 1884ac0af4f7a2d505c7f97dccb4266ce71e3583e94d21c6760632a52df004ef
                                                                              • Instruction Fuzzy Hash: BB5145B0D002188FDB14CFA9D888BADBBF2FB48314F248559D816BB755DB74A844CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 745 632c3a9-632c3bb 746 632c3e5-632c404 call 632b504 745->746 747 632c3bd-632c3e4 call 632a914 745->747 753 632c406-632c409 746->753 754 632c40a-632c40f 746->754 755 632c418-632c44c 754->755 759 632c44e-632c469 755->759 762 632c46b-632c46e 759->762 763 632c46f-632c4fc GlobalMemoryStatusEx 759->763 767 632c505-632c52d 763->767 768 632c4fe-632c504 763->768 768->767
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.552427206.0000000006320000.00000040.00000800.00020000.00000000.sdmp, Offset: 06320000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6320000_PO.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 243bd8a4f38a2e2bac5a5656d076c5be2f8df5a54e6b9eca2bc53785436515a2
                                                                              • Instruction ID: 40245ecd6419a219491ddbb34d66efa3fe86e656621416cf971946b84667a671
                                                                              • Opcode Fuzzy Hash: 243bd8a4f38a2e2bac5a5656d076c5be2f8df5a54e6b9eca2bc53785436515a2
                                                                              • Instruction Fuzzy Hash: F0412571D003968FCB55CF7AC8002AEFFF5AF8A320F15856AD445A7241DB389845CBE1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 771 2d6f6cc-2d6f6d5 772 2d6f6d7-2d6f737 771->772 773 2d6f738-2d6f748 771->773 778 2d6f7a2-2d6f7a6 772->778 779 2d6f739-2d6f748 772->779 775 2d6f74f-2d6f764 773->775 776 2d6f766-2d6f768 775->776 777 2d6f794 775->777 780 2d6f78a-2d6f792 776->780 781 2d6f76a-2d6f774 776->781 788 2d6f799-2d6f79c 777->788 782 2d6f7d1-2d6f7dc 778->782 783 2d6f7a8-2d6f7cb 778->783 779->775 780->788 786 2d6f776 781->786 787 2d6f778-2d6f786 781->787 784 2d6f7de-2d6f7e6 782->784 785 2d6f7e8-2d6f823 GetUserNameW 782->785 783->782 784->785 789 2d6f825-2d6f82b 785->789 790 2d6f82c-2d6f842 785->790 786->787 787->787 791 2d6f788 787->791 788->778 789->790 793 2d6f844-2d6f850 790->793 794 2d6f858-2d6f87f 790->794 791->780 793->794 799 2d6f881-2d6f885 794->799 800 2d6f88f 794->800 799->800 801 2d6f887 799->801 802 2d6f890 800->802 801->800 802->802
                                                                              APIs
                                                                              • GetUserNameW.ADVAPI32(00000000,00000000), ref: 02D6F813
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.535856884.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_2d60000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: NameUser
                                                                              • String ID:
                                                                              • API String ID: 2645101109-0
                                                                              • Opcode ID: 36e464cdd07ed65455eddd3c881572731894533bf8770c35ef73c546e63a8481
                                                                              • Instruction ID: ce7b1a35c169341f5a6891aa36f059032045033a4eb841479d5520e232a914fd
                                                                              • Opcode Fuzzy Hash: 36e464cdd07ed65455eddd3c881572731894533bf8770c35ef73c546e63a8481
                                                                              • Instruction Fuzzy Hash: 5D5144B5D006188FDB18CFA9D888BADBBF1BF48314F25811AE816BB755CB749844CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 833 6aa3770-6aa37d6 836 6aa37d8-6aa37de 833->836 837 6aa37e1-6aa37e8 833->837 836->837 838 6aa37ea-6aa37f0 837->838 839 6aa37f3-6aa3892 CreateWindowExW 837->839 838->839 841 6aa389b-6aa38d3 839->841 842 6aa3894-6aa389a 839->842 846 6aa38e0 841->846 847 6aa38d5-6aa38d8 841->847 842->841 848 6aa38e1 846->848 847->846 848->848
                                                                              APIs
                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06AA3882
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.553997729.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6aa0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: CreateWindow
                                                                              • String ID:
                                                                              • API String ID: 716092398-0
                                                                              • Opcode ID: eecf1a265e60953c8ab02ed314c9e1e150862d1f4377b0e9fe94171dfb0f2b25
                                                                              • Instruction ID: 4d4b3367927d6e12f3d7ec1a11be5657ed2d0d99e9bb0bdf086f622dababb743
                                                                              • Opcode Fuzzy Hash: eecf1a265e60953c8ab02ed314c9e1e150862d1f4377b0e9fe94171dfb0f2b25
                                                                              • Instruction Fuzzy Hash: 0C41EFB5D00309DFDF15CF9AC880ADEBBB6BF48310F24852AE819AB210D7759885CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 869 2d675e4-2d67647 870 2d6769b-2d676e7 LoadLibraryA 869->870 871 2d67649-2d6766e 869->871 874 2d676f0-2d67721 870->874 875 2d676e9-2d676ef 870->875 871->870 876 2d67670-2d67672 871->876 881 2d67723-2d67727 874->881 882 2d67731 874->882 875->874 878 2d67674-2d6767e 876->878 879 2d67695-2d67698 876->879 883 2d67682-2d67691 878->883 884 2d67680 878->884 879->870 881->882 886 2d67729 881->886 887 2d67732 882->887 883->883 885 2d67693 883->885 884->883 885->879 886->882 887->887
                                                                              APIs
                                                                              • LoadLibraryA.KERNELBASE(?), ref: 02D676D7
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.535856884.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_2d60000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: LibraryLoad
                                                                              • String ID:
                                                                              • API String ID: 1029625771-0
                                                                              • Opcode ID: d0eb0c15a0cf6217092866be6c20120aed0cad965ee7c79a1c5bae481e30cca5
                                                                              • Instruction ID: c985990a64197dbb02ab74ac61e4d9c392fc7b98dc9183a364cf1ab80ebcc590
                                                                              • Opcode Fuzzy Hash: d0eb0c15a0cf6217092866be6c20120aed0cad965ee7c79a1c5bae481e30cca5
                                                                              • Instruction Fuzzy Hash: 024158B1D002598FEB14CFA9C9847AEFBF1FB48718F248529D815AB344D7789846CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 849 2d65a64-2d67647 851 2d6769b-2d676e7 LoadLibraryA 849->851 852 2d67649-2d6766e 849->852 855 2d676f0-2d67721 851->855 856 2d676e9-2d676ef 851->856 852->851 857 2d67670-2d67672 852->857 862 2d67723-2d67727 855->862 863 2d67731 855->863 856->855 859 2d67674-2d6767e 857->859 860 2d67695-2d67698 857->860 864 2d67682-2d67691 859->864 865 2d67680 859->865 860->851 862->863 867 2d67729 862->867 868 2d67732 863->868 864->864 866 2d67693 864->866 865->864 866->860 867->863 868->868
                                                                              APIs
                                                                              • LoadLibraryA.KERNELBASE(?), ref: 02D676D7
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.535856884.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_2d60000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: LibraryLoad
                                                                              • String ID:
                                                                              • API String ID: 1029625771-0
                                                                              • Opcode ID: f7cae2b2db7d3b56c715ec880433ac8b4a0922c0268a6dd7284804585541f30e
                                                                              • Instruction ID: b7c5b795b31806810e3582159effb73c3e11878d74b94eb8fa0d6a9eb37c6e7b
                                                                              • Opcode Fuzzy Hash: f7cae2b2db7d3b56c715ec880433ac8b4a0922c0268a6dd7284804585541f30e
                                                                              • Instruction Fuzzy Hash: 384158B0D0024D8FEB10CFA9C8887AEFBF1EB48718F148429E815AB344D7749845CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 888 6aa3b4c-6aa615c 894 6aa620c-6aa622c 888->894 895 6aa6162-6aa6167 888->895 901 6aa622f-6aa623c 894->901 896 6aa61ba-6aa61f2 CallWindowProcW 895->896 897 6aa6169-6aa61a0 895->897 899 6aa61fb-6aa620a 896->899 900 6aa61f4-6aa61fa 896->900 903 6aa61a9-6aa61b8 897->903 904 6aa61a2-6aa61a8 897->904 899->894 899->901 900->899 903->901 904->903
                                                                              APIs
                                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 06AA61E1
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.553997729.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6aa0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: CallProcWindow
                                                                              • String ID:
                                                                              • API String ID: 2714655100-0
                                                                              • Opcode ID: bdfa100495ef93eaa9c76c8b7684cfb09c461ed783d8f5e3c17aa8d2e40ef69f
                                                                              • Instruction ID: 03af84acc547f4272079e3700300f631bee01bae32db5fee8213335fbc7a1739
                                                                              • Opcode Fuzzy Hash: bdfa100495ef93eaa9c76c8b7684cfb09c461ed783d8f5e3c17aa8d2e40ef69f
                                                                              • Instruction Fuzzy Hash: E1413DB89003058FDB54DF99C848AAEBFF5FB88314F28D55AE419AB311D775A841CFA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1528 632c488-632c4c6 1529 632c4ce-632c4fc GlobalMemoryStatusEx 1528->1529 1530 632c505-632c52d 1529->1530 1531 632c4fe-632c504 1529->1531 1531->1530
                                                                              APIs
                                                                              • GlobalMemoryStatusEx.KERNELBASE ref: 0632C4EF
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.552427206.0000000006320000.00000040.00000800.00020000.00000000.sdmp, Offset: 06320000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6320000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: GlobalMemoryStatus
                                                                              • String ID:
                                                                              • API String ID: 1890195054-0
                                                                              • Opcode ID: 72a045f3057d7e5c359fd1b741cc135a1791700198fe8e45e5a8199066dff175
                                                                              • Instruction ID: c5d69869be736aab2411f93ec93ebcbeb02368c9fc728f0233ea110ca8085f21
                                                                              • Opcode Fuzzy Hash: 72a045f3057d7e5c359fd1b741cc135a1791700198fe8e45e5a8199066dff175
                                                                              • Instruction Fuzzy Hash: A31112B5C0022A9BCB10CF9AC844BDEFBF5AF48324F15812AD818B7240D379A944CFE5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1534 6aaab28-6aaab2a 1535 6aaab2c 1534->1535 1536 6aaab32-6aaab57 1534->1536 1537 6aaab59-6aaab92 OleInitialize 1535->1537 1538 6aaab2e-6aaab31 1535->1538 1536->1537 1540 6aaab9b-6aaabb8 1537->1540 1541 6aaab94-6aaab9a 1537->1541 1538->1536 1541->1540
                                                                              APIs
                                                                              • OleInitialize.OLE32(00000000), ref: 06AAAB85
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.553997729.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6aa0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: Initialize
                                                                              • String ID:
                                                                              • API String ID: 2538663250-0
                                                                              • Opcode ID: 35b5c045cd426f837c54528cfa796328cbd5ba1968805a6d5e9f76955d7d82de
                                                                              • Instruction ID: 16d0f53bef52e702ed9a0349c26fb5a48481527227031e06396b1abbbe64adf4
                                                                              • Opcode Fuzzy Hash: 35b5c045cd426f837c54528cfa796328cbd5ba1968805a6d5e9f76955d7d82de
                                                                              • Instruction Fuzzy Hash: 331133B5C003488FDB60DF9AD884BDEBBF5AB58324F24851AD519A7310C37AA945CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1544 6aa7700-6aaab92 OleInitialize 1548 6aaab9b-6aaabb8 1544->1548 1549 6aaab94-6aaab9a 1544->1549 1549->1548
                                                                              APIs
                                                                              • OleInitialize.OLE32(00000000), ref: 06AAAB85
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.553997729.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6aa0000_PO.jbxd
                                                                              Similarity
                                                                              • API ID: Initialize
                                                                              • String ID:
                                                                              • API String ID: 2538663250-0
                                                                              • Opcode ID: a9b6a953093c7f33e273aaf8ffe0fde2e3c755e3bebff95c13bff69e15ac6ff6
                                                                              • Instruction ID: 8cc6a09273cef10af3970de7b9937b130821ed78d6193acd180b2644585f7dce
                                                                              • Opcode Fuzzy Hash: a9b6a953093c7f33e273aaf8ffe0fde2e3c755e3bebff95c13bff69e15ac6ff6
                                                                              • Instruction Fuzzy Hash: 7D1148B58003088FCB60DF9AC484BDEBBF5EB48324F24851AD519A7300C375A944CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Execution Graph

                                                                              Execution Coverage:10.8%
                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                              Signature Coverage:0%
                                                                              Total number of Nodes:308
                                                                              Total number of Limit Nodes:10
                                                                              execution_graph 28707 65f5288 FindCloseChangeNotification 28708 65f52ef 28707->28708 28732 65f2bf8 28733 65f2d83 28732->28733 28734 65f2c1e 28732->28734 28734->28733 28739 4a80c20 SetWindowLongW 28734->28739 28741 4a80c18 SetWindowLongW 28734->28741 28743 65f2e70 28734->28743 28748 65f2e78 PostMessageW 28734->28748 28740 4a80c8c 28739->28740 28740->28734 28742 4a80c8c 28741->28742 28742->28734 28744 65f2e76 PostMessageW 28743->28744 28746 65f2e11 28743->28746 28747 65f2ee4 28744->28747 28746->28734 28747->28734 28749 65f2ee4 28748->28749 28749->28734 28937 65f06a8 28938 65f06c8 28937->28938 28939 65f070d 28938->28939 28949 65f13a8 28938->28949 28952 65f17d8 28938->28952 28955 65f1819 28938->28955 28959 65f1f8c 28938->28959 28962 65f142e 28938->28962 28965 65f13f0 28938->28965 28968 65f0f10 28938->28968 28972 65f17a1 28938->28972 28976 65f1d92 28938->28976 28980 65e82a0 28949->28980 28984 65e8648 28952->28984 28988 65f2af0 28955->28988 28992 65f2ae0 28955->28992 28956 65f0e7a 29000 65e8528 28959->29000 29004 65e8840 28962->29004 29008 65e81c0 28965->29008 28969 65f0f27 28968->28969 28971 65e8528 WriteProcessMemory 28969->28971 28970 65f0e7a 28971->28970 29012 65f2aa8 28972->29012 29016 65f2a97 28972->29016 28973 65f17b9 28977 65f1d9c 28976->28977 28979 65e8528 WriteProcessMemory 28977->28979 28978 65f1de7 28979->28978 28981 65e82e5 SetThreadContext 28980->28981 28983 65e832d 28981->28983 28985 65e8693 ReadProcessMemory 28984->28985 28987 65e86d7 28985->28987 28987->28938 28989 65f2b05 28988->28989 28996 65e8438 28989->28996 28993 65f2af0 28992->28993 28995 65e8438 VirtualAllocEx 28993->28995 28994 65f2b24 28994->28956 28995->28994 28997 65e8478 VirtualAllocEx 28996->28997 28999 65e84b5 28997->28999 28999->28956 29001 65e8570 WriteProcessMemory 29000->29001 29003 65e85c7 29001->29003 29005 65e88c9 CreateProcessA 29004->29005 29007 65e8a8b 29005->29007 29009 65e8200 ResumeThread 29008->29009 29011 65e8231 29009->29011 29013 65f2abd 29012->29013 29015 65e82a0 SetThreadContext 29013->29015 29014 65f2ad3 29014->28973 29015->29014 29017 65f2abd 29016->29017 29019 65e82a0 SetThreadContext 29017->29019 29018 65f2ad3 29018->28973 29019->29018 28750 4a855c0 28751 4a855ed 28750->28751 28776 4a84264 28751->28776 28753 4a85694 28754 4a84264 4 API calls 28753->28754 28755 4a856c6 28754->28755 28756 4a84264 4 API calls 28755->28756 28757 4a856f8 28756->28757 28758 4a84264 4 API calls 28757->28758 28759 4a8572a 28758->28759 28760 4a84264 4 API calls 28759->28760 28761 4a8575c 28760->28761 28781 4a84fd4 28761->28781 28763 4a857fe 28764 4a84fd4 4 API calls 28763->28764 28765 4a85830 28764->28765 28766 4a84fd4 4 API calls 28765->28766 28767 4a85862 28766->28767 28785 4a84fe4 28767->28785 28771 4a858c6 28772 4a84ff4 4 API calls 28771->28772 28773 4a8592a 28772->28773 28774 4a84fe4 4 API calls 28773->28774 28775 4a859c0 28774->28775 28777 4a8426f 28776->28777 28793 22c6e20 28777->28793 28802 22c7ea2 28777->28802 28778 4a88848 28778->28753 28782 4a84fdf 28781->28782 28784 4a88be5 28782->28784 28913 4a85438 28782->28913 28784->28763 28786 4a84fef 28785->28786 28787 4a85438 4 API calls 28786->28787 28788 4a85894 28787->28788 28789 4a84ff4 28788->28789 28790 4a84fff 28789->28790 28918 4a8910c 28790->28918 28792 4a89d4a 28792->28771 28794 22c6e2b 28793->28794 28796 22c813e 28794->28796 28811 4a89423 28794->28811 28815 4a89430 28794->28815 28819 4a888d0 28794->28819 28822 4a888c0 28794->28822 28795 22c817c 28795->28778 28796->28795 28827 22cc038 28796->28827 28803 22c7eb0 28802->28803 28805 22c813e 28803->28805 28806 4a888c0 2 API calls 28803->28806 28807 4a888d0 2 API calls 28803->28807 28808 4a89430 2 API calls 28803->28808 28809 4a89423 2 API calls 28803->28809 28804 22c817c 28804->28778 28805->28804 28810 22cc038 4 API calls 28805->28810 28806->28805 28807->28805 28808->28805 28809->28805 28810->28804 28832 4a894b8 28811->28832 28835 4a894c8 28811->28835 28812 4a8943f 28812->28796 28816 4a8943f 28815->28816 28817 4a894b8 2 API calls 28815->28817 28818 4a894c8 2 API calls 28815->28818 28816->28796 28817->28816 28818->28816 28821 22ca028 2 API calls 28819->28821 28820 4a888dd 28820->28796 28821->28820 28823 4a888c3 28822->28823 28824 4a8886d 28822->28824 28826 22ca028 2 API calls 28823->28826 28824->28796 28825 4a888dd 28825->28796 28826->28825 28828 22cc069 28827->28828 28829 22cc08d 28828->28829 28838 22cc1e8 28828->28838 28842 22cc1f8 28828->28842 28829->28795 28834 22ca028 2 API calls 28832->28834 28833 4a894d7 28833->28812 28834->28833 28836 4a894d7 28835->28836 28837 22ca028 2 API calls 28835->28837 28836->28812 28837->28836 28839 22cc205 28838->28839 28840 22cc23f 28839->28840 28846 22ca9c4 28839->28846 28840->28829 28843 22cc205 28842->28843 28844 22cc23f 28843->28844 28845 22ca9c4 4 API calls 28843->28845 28844->28829 28845->28844 28847 22ca9c9 28846->28847 28849 22ccf38 28847->28849 28850 22cc574 28847->28850 28849->28849 28851 22cc57f 28850->28851 28852 22c6e20 4 API calls 28851->28852 28853 22ccfa7 28852->28853 28857 22ced30 28853->28857 28869 22ced18 28853->28869 28854 22ccfe0 28854->28849 28859 22ced61 28857->28859 28862 22cee52 28857->28862 28858 22ced6d 28858->28854 28859->28858 28860 22ced9f 28859->28860 28865 22ced18 4 API calls 28859->28865 28866 22ced30 4 API calls 28859->28866 28880 22cf1b0 28860->28880 28883 22cf1a0 28860->28883 28861 22cedad 28887 22cfb68 28861->28887 28892 22cfb78 28861->28892 28862->28854 28865->28860 28866->28860 28871 22ced23 28869->28871 28870 22ced6d 28870->28854 28871->28870 28872 22ced9f 28871->28872 28874 22ced18 4 API calls 28871->28874 28875 22ced30 4 API calls 28871->28875 28876 22cf1a0 2 API calls 28872->28876 28877 22cf1b0 2 API calls 28872->28877 28873 22cedad 28878 22cfb68 2 API calls 28873->28878 28879 22cfb78 2 API calls 28873->28879 28874->28872 28875->28872 28876->28873 28877->28873 28878->28870 28879->28870 28881 22ca028 2 API calls 28880->28881 28882 22cf1b9 28880->28882 28881->28882 28882->28861 28884 22cf1ab 28883->28884 28886 22cf1b9 28883->28886 28885 22ca028 2 API calls 28884->28885 28885->28886 28886->28861 28888 22cfba2 28887->28888 28889 22cfc49 28888->28889 28897 4a80988 28888->28897 28901 4a80882 28888->28901 28893 22cfba2 28892->28893 28894 22cfc49 28893->28894 28895 4a80988 2 API calls 28893->28895 28896 4a80882 2 API calls 28893->28896 28895->28894 28896->28894 28898 4a809bd 28897->28898 28905 4a809d8 28897->28905 28909 4a809cc 28897->28909 28898->28889 28903 4a809d8 CreateWindowExW 28901->28903 28904 4a809cc CreateWindowExW 28901->28904 28902 4a809bd 28902->28889 28903->28902 28904->28902 28906 4a80a40 CreateWindowExW 28905->28906 28908 4a80afc 28906->28908 28910 4a809d8 CreateWindowExW 28909->28910 28912 4a80afc 28910->28912 28912->28912 28914 4a85443 28913->28914 28916 22c6e20 4 API calls 28914->28916 28917 22c7ea2 4 API calls 28914->28917 28915 4a88f8c 28915->28784 28916->28915 28917->28915 28919 4a89117 28918->28919 28923 22c78b8 28919->28923 28927 22c6dc0 28919->28927 28920 4a8a2a9 28920->28792 28924 22c78c8 28923->28924 28931 22c6df0 28924->28931 28926 22c7922 28926->28920 28928 22c6dcb 28927->28928 28929 22c6df0 4 API calls 28928->28929 28930 22c7922 28929->28930 28930->28920 28932 22c6dfb 28931->28932 28933 22c6e20 4 API calls 28932->28933 28934 22c7a22 28933->28934 28934->28926 29020 4a80b90 29021 4a80bb6 29020->29021 29025 4a81878 29021->29025 29031 4a81888 29021->29031 29026 4a818b5 29025->29026 29027 4a818e7 29026->29027 29037 4a81adc 29026->29037 29043 4a81a10 29026->29043 29048 4a81a00 29026->29048 29032 4a818b5 29031->29032 29033 4a818e7 29032->29033 29034 4a81adc 2 API calls 29032->29034 29035 4a81a00 2 API calls 29032->29035 29036 4a81a10 2 API calls 29032->29036 29034->29033 29035->29033 29036->29033 29038 4a81a9a 29037->29038 29039 4a81aea 29037->29039 29053 4a81ab8 29038->29053 29056 4a81ac8 29038->29056 29040 4a81ab0 29040->29027 29044 4a81a24 29043->29044 29046 4a81ab8 2 API calls 29044->29046 29047 4a81ac8 2 API calls 29044->29047 29045 4a81ab0 29045->29027 29046->29045 29047->29045 29050 4a81a24 29048->29050 29049 4a81ab0 29049->29027 29051 4a81ab8 2 API calls 29050->29051 29052 4a81ac8 2 API calls 29050->29052 29051->29049 29052->29049 29054 4a81ad9 29053->29054 29059 4a82f60 29053->29059 29054->29040 29057 4a81ad9 29056->29057 29058 4a82f60 2 API calls 29056->29058 29057->29040 29058->29057 29063 4a82f80 29059->29063 29067 4a82f90 29059->29067 29060 4a82f7a 29060->29054 29064 4a82fd2 29063->29064 29066 4a82fd9 29063->29066 29065 4a8302a CallWindowProcW 29064->29065 29064->29066 29065->29066 29066->29060 29068 4a82fd9 29067->29068 29069 4a82fd2 29067->29069 29068->29060 29069->29068 29070 4a8302a CallWindowProcW 29069->29070 29070->29068 28709 22c9f30 28710 22c9f3f 28709->28710 28712 22ca028 28709->28712 28713 22ca03b 28712->28713 28714 22ca053 28713->28714 28720 22ca2a0 28713->28720 28724 22ca2b0 28713->28724 28714->28710 28715 22ca04b 28715->28714 28716 22ca250 GetModuleHandleW 28715->28716 28717 22ca27d 28716->28717 28717->28710 28721 22ca2c4 28720->28721 28722 22ca2e9 28721->28722 28728 22c93d8 28721->28728 28722->28715 28725 22ca2c4 28724->28725 28726 22ca2e9 28725->28726 28727 22c93d8 LoadLibraryExW 28725->28727 28726->28715 28727->28726 28729 22ca490 LoadLibraryExW 28728->28729 28731 22ca509 28729->28731 28731->28722 28935 22cc940 DuplicateHandle 28936 22cc9d6 28935->28936 29071 22c40d0 29072 22c40e2 29071->29072 29073 22c40ee 29072->29073 29077 22c41e0 29072->29077 29082 22c3c64 29073->29082 29075 22c410d 29078 22c4205 29077->29078 29086 22c42e0 29078->29086 29090 22c42d0 29078->29090 29083 22c3c6f 29082->29083 29098 22c51a4 29083->29098 29085 22c7241 29085->29075 29087 22c4307 29086->29087 29089 22c43e4 29087->29089 29094 22c3de8 29087->29094 29092 22c4307 29090->29092 29091 22c43e4 29091->29091 29092->29091 29093 22c3de8 CreateActCtxA 29092->29093 29093->29091 29095 22c5370 CreateActCtxA 29094->29095 29097 22c5433 29095->29097 29099 22c51af 29098->29099 29100 22c6dc0 4 API calls 29099->29100 29101 22c784d 29100->29101 29101->29085 29102 22cc310 GetCurrentProcess 29103 22cc38a GetCurrentThread 29102->29103 29104 22cc383 29102->29104 29105 22cc3c7 GetCurrentProcess 29103->29105 29106 22cc3c0 29103->29106 29104->29103 29109 22cc3fd 29105->29109 29106->29105 29107 22cc425 GetCurrentThreadId 29108 22cc456 29107->29108 29109->29107

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32 ref: 022CC370
                                                                              • GetCurrentThread.KERNEL32 ref: 022CC3AD
                                                                              • GetCurrentProcess.KERNEL32 ref: 022CC3EA
                                                                              • GetCurrentThreadId.KERNEL32 ref: 022CC443
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.332033543.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_22c0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: Current$ProcessThread
                                                                              • String ID:
                                                                              • API String ID: 2063062207-0
                                                                              • Opcode ID: 9a187940de21ac69b8b43a111a5b4443b1fee82a964831177b91035cb8bb3a54
                                                                              • Instruction ID: 59a84cf3f47986bb3c5f7eb013c9af475c8f9ff6062197b751cb4549eee93f6a
                                                                              • Opcode Fuzzy Hash: 9a187940de21ac69b8b43a111a5b4443b1fee82a964831177b91035cb8bb3a54
                                                                              • Instruction Fuzzy Hash: 5C5174B4A002498FDB10CFAADA487EEBFF5AF48314F24C59EE449A7250C7755888CF65
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32 ref: 022CC370
                                                                              • GetCurrentThread.KERNEL32 ref: 022CC3AD
                                                                              • GetCurrentProcess.KERNEL32 ref: 022CC3EA
                                                                              • GetCurrentThreadId.KERNEL32 ref: 022CC443
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.332033543.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_22c0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: Current$ProcessThread
                                                                              • String ID:
                                                                              • API String ID: 2063062207-0
                                                                              • Opcode ID: 92a9fca627af718570c2b0832ce7a03de18b58f46105c92f4d27e48f72179e04
                                                                              • Instruction ID: 10c7c236d1a7167caf1e8cb391df2a5f91163f2c9715ac205e71188d559f91c9
                                                                              • Opcode Fuzzy Hash: 92a9fca627af718570c2b0832ce7a03de18b58f46105c92f4d27e48f72179e04
                                                                              • Instruction Fuzzy Hash: 795155B4A002498FDB10CFAADA487EEBBF5AF48314F20C55EE409B7250C7759884CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1284 65e8840-65e88d5 1286 65e890e-65e892e 1284->1286 1287 65e88d7-65e88e1 1284->1287 1292 65e8967-65e8996 1286->1292 1293 65e8930-65e893a 1286->1293 1287->1286 1288 65e88e3-65e88e5 1287->1288 1289 65e8908-65e890b 1288->1289 1290 65e88e7-65e88f1 1288->1290 1289->1286 1294 65e88f5-65e8904 1290->1294 1295 65e88f3 1290->1295 1303 65e89cf-65e8a89 CreateProcessA 1292->1303 1304 65e8998-65e89a2 1292->1304 1293->1292 1296 65e893c-65e893e 1293->1296 1294->1294 1297 65e8906 1294->1297 1295->1294 1298 65e8940-65e894a 1296->1298 1299 65e8961-65e8964 1296->1299 1297->1289 1301 65e894e-65e895d 1298->1301 1302 65e894c 1298->1302 1299->1292 1301->1301 1305 65e895f 1301->1305 1302->1301 1315 65e8a8b-65e8a91 1303->1315 1316 65e8a92-65e8b18 1303->1316 1304->1303 1306 65e89a4-65e89a6 1304->1306 1305->1299 1308 65e89a8-65e89b2 1306->1308 1309 65e89c9-65e89cc 1306->1309 1310 65e89b6-65e89c5 1308->1310 1311 65e89b4 1308->1311 1309->1303 1310->1310 1313 65e89c7 1310->1313 1311->1310 1313->1309 1315->1316 1326 65e8b1a-65e8b1e 1316->1326 1327 65e8b28-65e8b2c 1316->1327 1326->1327 1328 65e8b20 1326->1328 1329 65e8b2e-65e8b32 1327->1329 1330 65e8b3c-65e8b40 1327->1330 1328->1327 1329->1330 1331 65e8b34 1329->1331 1332 65e8b42-65e8b46 1330->1332 1333 65e8b50-65e8b54 1330->1333 1331->1330 1332->1333 1334 65e8b48 1332->1334 1335 65e8b66-65e8b6d 1333->1335 1336 65e8b56-65e8b5c 1333->1336 1334->1333 1337 65e8b6f-65e8b7e 1335->1337 1338 65e8b84 1335->1338 1336->1335 1337->1338
                                                                              APIs
                                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 065E8A76
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.356087964.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_65e0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: CreateProcess
                                                                              • String ID:
                                                                              • API String ID: 963392458-0
                                                                              • Opcode ID: f5aa3805f7dbf3930362477f09216f7617e4879aa3e5389cb8ce2e52983772aa
                                                                              • Instruction ID: efb4aac559c9b9ab92619f01b7871c4dbc8e09e2b43542d95999065a7d21aa07
                                                                              • Opcode Fuzzy Hash: f5aa3805f7dbf3930362477f09216f7617e4879aa3e5389cb8ce2e52983772aa
                                                                              • Instruction Fuzzy Hash: 19915971D00219CFDF64CFA8C8817ADBBB2BF48314F1485A9E849B7280DB759985CF92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1340 22ca028-22ca03d call 22c9370 1343 22ca03f 1340->1343 1344 22ca053-22ca057 1340->1344 1395 22ca045 call 22ca2a0 1343->1395 1396 22ca045 call 22ca2b0 1343->1396 1345 22ca059-22ca063 1344->1345 1346 22ca06b-22ca0ac 1344->1346 1345->1346 1351 22ca0ae-22ca0b6 1346->1351 1352 22ca0b9-22ca0c7 1346->1352 1347 22ca04b-22ca04d 1347->1344 1348 22ca188-22ca248 1347->1348 1388 22ca24a-22ca24d 1348->1388 1389 22ca250-22ca27b GetModuleHandleW 1348->1389 1351->1352 1354 22ca0c9-22ca0ce 1352->1354 1355 22ca0eb-22ca0ed 1352->1355 1356 22ca0d9 1354->1356 1357 22ca0d0-22ca0d7 call 22c937c 1354->1357 1358 22ca0f0-22ca0f7 1355->1358 1360 22ca0db-22ca0e9 1356->1360 1357->1360 1361 22ca0f9-22ca101 1358->1361 1362 22ca104-22ca10b 1358->1362 1360->1358 1361->1362 1365 22ca10d-22ca115 1362->1365 1366 22ca118-22ca121 call 22c938c 1362->1366 1365->1366 1371 22ca12e-22ca133 1366->1371 1372 22ca123-22ca12b 1366->1372 1373 22ca135-22ca13c 1371->1373 1374 22ca151-22ca155 1371->1374 1372->1371 1373->1374 1375 22ca13e-22ca14e call 22c939c call 22c93ac 1373->1375 1393 22ca158 call 22ca5a8 1374->1393 1394 22ca158 call 22ca580 1374->1394 1375->1374 1378 22ca15b-22ca15e 1381 22ca160-22ca17e 1378->1381 1382 22ca181-22ca187 1378->1382 1381->1382 1388->1389 1390 22ca27d-22ca283 1389->1390 1391 22ca284-22ca298 1389->1391 1390->1391 1393->1378 1394->1378 1395->1347 1396->1347
                                                                              APIs
                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 022CA26E
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.332033543.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_22c0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: HandleModule
                                                                              • String ID:
                                                                              • API String ID: 4139908857-0
                                                                              • Opcode ID: c93c2500743f41f4bf6e3c936cbe8f0270ae84d968912f3969e902052f26ec36
                                                                              • Instruction ID: dfd6696fe10a742de28ee8b84ddbba67b71ef2632988ee39e1b16b60cfc7a9e2
                                                                              • Opcode Fuzzy Hash: c93c2500743f41f4bf6e3c936cbe8f0270ae84d968912f3969e902052f26ec36
                                                                              • Instruction Fuzzy Hash: F0714570A10B098FDB20DF6AD44475ABBF1BF88314F108A2DD04AD7A54D775E845CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1397 4a809cc-4a80a3e 1399 4a80a49-4a80a50 1397->1399 1400 4a80a40-4a80a46 1397->1400 1401 4a80a5b-4a80afa CreateWindowExW 1399->1401 1402 4a80a52-4a80a58 1399->1402 1400->1399 1404 4a80afc-4a80b02 1401->1404 1405 4a80b03-4a80b3b 1401->1405 1402->1401 1404->1405 1409 4a80b48 1405->1409 1410 4a80b3d-4a80b40 1405->1410 1411 4a80b49 1409->1411 1410->1409 1411->1411
                                                                              APIs
                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04A80AEA
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.353646326.0000000004A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4a80000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: CreateWindow
                                                                              • String ID:
                                                                              • API String ID: 716092398-0
                                                                              • Opcode ID: 835edb85db7f4b0c36cc85dffb92c1c0c7a08ee8fbd380ab38966611af31725f
                                                                              • Instruction ID: 29e490e468bbb405632bebc6c16e00d71edddbc76af0ba72e13e7e7ea75d5d93
                                                                              • Opcode Fuzzy Hash: 835edb85db7f4b0c36cc85dffb92c1c0c7a08ee8fbd380ab38966611af31725f
                                                                              • Instruction Fuzzy Hash: DC51D0B5D00309DFDB14CF9AC884ADEBBB5FF48314F64852AE418AB210D775A885CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1412 4a809d8-4a80a3e 1413 4a80a49-4a80a50 1412->1413 1414 4a80a40-4a80a46 1412->1414 1415 4a80a5b-4a80afa CreateWindowExW 1413->1415 1416 4a80a52-4a80a58 1413->1416 1414->1413 1418 4a80afc-4a80b02 1415->1418 1419 4a80b03-4a80b3b 1415->1419 1416->1415 1418->1419 1423 4a80b48 1419->1423 1424 4a80b3d-4a80b40 1419->1424 1425 4a80b49 1423->1425 1424->1423 1425->1425
                                                                              APIs
                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04A80AEA
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.353646326.0000000004A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4a80000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: CreateWindow
                                                                              • String ID:
                                                                              • API String ID: 716092398-0
                                                                              • Opcode ID: 3bcf5ddf3e9d759554fa98120d0b0587f7dfd3402e3c3c173edaa67f951f8e86
                                                                              • Instruction ID: aba83d7d04b8113d844f7adeb2eeaf48f5931911d83d17799dfe1a5c6a667fbc
                                                                              • Opcode Fuzzy Hash: 3bcf5ddf3e9d759554fa98120d0b0587f7dfd3402e3c3c173edaa67f951f8e86
                                                                              • Instruction Fuzzy Hash: 9B41B0B5D00309DFDB14CF9AC884ADEBBB5FF48314F25812AE419AB210D775A985CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1426 22c5364-22c5431 CreateActCtxA 1428 22c543a-22c5494 1426->1428 1429 22c5433-22c5439 1426->1429 1436 22c5496-22c5499 1428->1436 1437 22c54a3-22c54a7 1428->1437 1429->1428 1436->1437 1438 22c54b8 1437->1438 1439 22c54a9-22c54b5 1437->1439 1441 22c54b9 1438->1441 1439->1438 1441->1441
                                                                              APIs
                                                                              • CreateActCtxA.KERNEL32(?), ref: 022C5421
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.332033543.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_22c0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: Create
                                                                              • String ID:
                                                                              • API String ID: 2289755597-0
                                                                              • Opcode ID: 03ee48ba641434030933c1f1d28e9fcf77f8cb4b032d3e06076b4574da849620
                                                                              • Instruction ID: efe7e025dab7d061d37805b00ae39c5302d24f45bb662a55509680e016ab45f5
                                                                              • Opcode Fuzzy Hash: 03ee48ba641434030933c1f1d28e9fcf77f8cb4b032d3e06076b4574da849620
                                                                              • Instruction Fuzzy Hash: D7411571C00219CFDB24CFA9C8847DDBBB6BF44305F648159D409BB255DBB5A986CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1442 22c3de8-22c5431 CreateActCtxA 1445 22c543a-22c5494 1442->1445 1446 22c5433-22c5439 1442->1446 1453 22c5496-22c5499 1445->1453 1454 22c54a3-22c54a7 1445->1454 1446->1445 1453->1454 1455 22c54b8 1454->1455 1456 22c54a9-22c54b5 1454->1456 1458 22c54b9 1455->1458 1456->1455 1458->1458
                                                                              APIs
                                                                              • CreateActCtxA.KERNEL32(?), ref: 022C5421
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.332033543.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_22c0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: Create
                                                                              • String ID:
                                                                              • API String ID: 2289755597-0
                                                                              • Opcode ID: 4cf3b5a324163965962500d0fb8f053aaa0f7b05905cb147e4835670d13e8b5a
                                                                              • Instruction ID: e0980f56fc4c3cd200747cbf28d6f831800032046973788a1d3c8d02851a0d5d
                                                                              • Opcode Fuzzy Hash: 4cf3b5a324163965962500d0fb8f053aaa0f7b05905cb147e4835670d13e8b5a
                                                                              • Instruction Fuzzy Hash: 5341F170C10619CFDB24CFA9C884B9EBBB6FF48304F608159D409BB255DBB5A986CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1459 4a82f90-4a82fcc 1460 4a8307c-4a8309c 1459->1460 1461 4a82fd2-4a82fd7 1459->1461 1468 4a8309f-4a830ac 1460->1468 1462 4a82fd9-4a83010 1461->1462 1463 4a8302a-4a83062 CallWindowProcW 1461->1463 1469 4a83019-4a83028 1462->1469 1470 4a83012-4a83018 1462->1470 1464 4a8306b-4a8307a 1463->1464 1465 4a83064-4a8306a 1463->1465 1464->1468 1465->1464 1469->1468 1470->1469
                                                                              APIs
                                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 04A83051
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.353646326.0000000004A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4a80000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: CallProcWindow
                                                                              • String ID:
                                                                              • API String ID: 2714655100-0
                                                                              • Opcode ID: f4712ef164bf2fd72045c0ba228fafbf0924a3bf792d8ef8e9e8b68739b3f692
                                                                              • Instruction ID: fc5e0198a338b39eebfbed5dc09ce56a52906dac723add3d80e1a4c0e9d6b8ed
                                                                              • Opcode Fuzzy Hash: f4712ef164bf2fd72045c0ba228fafbf0924a3bf792d8ef8e9e8b68739b3f692
                                                                              • Instruction Fuzzy Hash: EF414CB8A002058FDB14DF99C488BAABBF5FB48314F24C45CD519A7321D776A841CFA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1473 65f2e70-65f2e74 1474 65f2e76-65f2ee2 PostMessageW 1473->1474 1475 65f2e11-65f2e47 1473->1475 1477 65f2eeb-65f2eff 1474->1477 1478 65f2ee4-65f2eea 1474->1478 1480 65f2e49-65f2e4f 1475->1480 1481 65f2e50-65f2e64 1475->1481 1478->1477 1480->1481
                                                                              APIs
                                                                              • PostMessageW.USER32(?,?,?,?), ref: 065F2ED5
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.356293522.00000000065F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_65f0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: MessagePost
                                                                              • String ID:
                                                                              • API String ID: 410705778-0
                                                                              • Opcode ID: bd371bda8a3fb3d63c535dce5dec9b67226a1bd8b1e5f578c972ef9a8842b591
                                                                              • Instruction ID: 5e2a519e1d560a2111c007e6200184438aba8ab8b1a20af3cdc0d3db0b871143
                                                                              • Opcode Fuzzy Hash: bd371bda8a3fb3d63c535dce5dec9b67226a1bd8b1e5f578c972ef9a8842b591
                                                                              • Instruction Fuzzy Hash: C0310AB58002499FDB10CF9AD885BEEFBF8FB48324F20841AE554A7600C375A584CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1484 65e8528-65e8576 1486 65e8578-65e8584 1484->1486 1487 65e8586-65e85c5 WriteProcessMemory 1484->1487 1486->1487 1489 65e85ce-65e85fe 1487->1489 1490 65e85c7-65e85cd 1487->1490 1490->1489
                                                                              APIs
                                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 065E85B8
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.356087964.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_65e0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: MemoryProcessWrite
                                                                              • String ID:
                                                                              • API String ID: 3559483778-0
                                                                              • Opcode ID: 0f3e9534d96a552ba4c7b154ebde193d2f95ba75b24f595af0d2b2584bd4c6c6
                                                                              • Instruction ID: 8d8ba1e4e948d80d86edee010168608b5340b06fec0aa1b95cb245e39d20c197
                                                                              • Opcode Fuzzy Hash: 0f3e9534d96a552ba4c7b154ebde193d2f95ba75b24f595af0d2b2584bd4c6c6
                                                                              • Instruction Fuzzy Hash: 972115759002499FCF50CFAAC8847DEBBF6FF48314F14842AE919A7240DB789944CFA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1494 22cc938-22cc9d4 DuplicateHandle 1495 22cc9dd-22cc9fa 1494->1495 1496 22cc9d6-22cc9dc 1494->1496 1496->1495
                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 022CC9C7
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.332033543.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_22c0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID:
                                                                              • API String ID: 3793708945-0
                                                                              • Opcode ID: f3c28d3f0420c65b0796fb7605fb02edf7743ea722e11d57eda46b7a8c096a92
                                                                              • Instruction ID: 356b9aaa9ac51a22263e74ab16573abc3b614061408e16107f14e778eea6c3ab
                                                                              • Opcode Fuzzy Hash: f3c28d3f0420c65b0796fb7605fb02edf7743ea722e11d57eda46b7a8c096a92
                                                                              • Instruction Fuzzy Hash: B521E9B5D002499FDB10CFAAD984AEEBFF5EB58314F14845AE854B3350C375A945CFA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 065E86C8
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.356087964.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_65e0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: MemoryProcessRead
                                                                              • String ID:
                                                                              • API String ID: 1726664587-0
                                                                              • Opcode ID: ab3465845772757904426a9046b85cc4b8037e3fe2a029aee30c6ddb9acf81e3
                                                                              • Instruction ID: e1f57a2d7bdc7ecbc174002cee67fac9955c655e1ebfe9390ec11250dee26004
                                                                              • Opcode Fuzzy Hash: ab3465845772757904426a9046b85cc4b8037e3fe2a029aee30c6ddb9acf81e3
                                                                              • Instruction Fuzzy Hash: 542125B5D002499FCF10CFAAC880AEEBBF5FF48324F54842AE518A7240D7799945CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1499 65e82a0-65e82eb 1501 65e82ed-65e82f9 1499->1501 1502 65e82fb-65e832b SetThreadContext 1499->1502 1501->1502 1504 65e832d-65e8333 1502->1504 1505 65e8334-65e8364 1502->1505 1504->1505
                                                                              APIs
                                                                              • SetThreadContext.KERNELBASE(?,00000000), ref: 065E831E
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.356087964.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_65e0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: ContextThread
                                                                              • String ID:
                                                                              • API String ID: 1591575202-0
                                                                              • Opcode ID: 807f56d5b939e605efdf099ed06e87421d4213978c5f6654a5a81f50fb1b9629
                                                                              • Instruction ID: 4d7239697e51f431279816e1a79a567a7edd4b6f95f4ec1eaa41c4daf3124b6b
                                                                              • Opcode Fuzzy Hash: 807f56d5b939e605efdf099ed06e87421d4213978c5f6654a5a81f50fb1b9629
                                                                              • Instruction Fuzzy Hash: 68213575D002098FCB54CFAEC8847EEBBF5EF58324F54842AD459A7240CB78A945CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 022CC9C7
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.332033543.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_22c0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID:
                                                                              • API String ID: 3793708945-0
                                                                              • Opcode ID: af832ac6abf3260f7aadd80ab2aa7f8ccf77eccc60e8f1e12a1a06bc76bbd386
                                                                              • Instruction ID: 387e3b0e03b5ae084a7fc460d6aac3b7b7888b2e76620a9bf43421a578d685b4
                                                                              • Opcode Fuzzy Hash: af832ac6abf3260f7aadd80ab2aa7f8ccf77eccc60e8f1e12a1a06bc76bbd386
                                                                              • Instruction Fuzzy Hash: 9521E6B59002099FDB10CF9AD984ADEBBF5EB48314F14841AE918A3310C374A944CFA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,022CA2E9,00000800,00000000,00000000), ref: 022CA4FA
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.332033543.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_22c0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: LibraryLoad
                                                                              • String ID:
                                                                              • API String ID: 1029625771-0
                                                                              • Opcode ID: d7a27ed141c9a3e2c3bfb0b9d760961012c3c413829c391f08a000c2cf323c16
                                                                              • Instruction ID: 6634742547d02aa0166c85de64ccb934027392513725ef8f5eb03aef3203d5e4
                                                                              • Opcode Fuzzy Hash: d7a27ed141c9a3e2c3bfb0b9d760961012c3c413829c391f08a000c2cf323c16
                                                                              • Instruction Fuzzy Hash: D811D8B5D002499FDB10CF9AC844BAEBBF5AB48314F14855DD415B7600C375A545CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,022CA2E9,00000800,00000000,00000000), ref: 022CA4FA
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.332033543.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_22c0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: LibraryLoad
                                                                              • String ID:
                                                                              • API String ID: 1029625771-0
                                                                              • Opcode ID: cadd072c7ef8e4a70474ce95243661f4ed8c51709d056e24904c1c0aa0ae73f3
                                                                              • Instruction ID: 0dbba3d32a1b7e89fecd2fd2327100ddb961053341c48e24cdd6363c348d78cf
                                                                              • Opcode Fuzzy Hash: cadd072c7ef8e4a70474ce95243661f4ed8c51709d056e24904c1c0aa0ae73f3
                                                                              • Instruction Fuzzy Hash: 291126B6D002498FCB20CFAAC884BEEFBF5AB98314F14855ED419B7200C379A545CFA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 065E84A6
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.356087964.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_65e0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: AllocVirtual
                                                                              • String ID:
                                                                              • API String ID: 4275171209-0
                                                                              • Opcode ID: 163c03a7875cfa4836019af251b1c5e3bb81dda554dc43ea54735837d3c449f9
                                                                              • Instruction ID: 6548f41fa84c682e344f4dea66b897006a09e649ee674f6ad89294a30b6b4bef
                                                                              • Opcode Fuzzy Hash: 163c03a7875cfa4836019af251b1c5e3bb81dda554dc43ea54735837d3c449f9
                                                                              • Instruction Fuzzy Hash: 661129759002499BCF14DFAAC8447DFBFF6EF48324F148419E465A7250C7759944CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • FindCloseChangeNotification.KERNELBASE(?), ref: 065F52E0
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.356293522.00000000065F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_65f0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: ChangeCloseFindNotification
                                                                              • String ID:
                                                                              • API String ID: 2591292051-0
                                                                              • Opcode ID: d5bec4646e10b38286ff4469158f4555392eaa15984e30523be655474497ec16
                                                                              • Instruction ID: c140f6e60ad837ae01f7beefa4e686ee8eac0fbdfec464ebd28da69102d5c38e
                                                                              • Opcode Fuzzy Hash: d5bec4646e10b38286ff4469158f4555392eaa15984e30523be655474497ec16
                                                                              • Instruction Fuzzy Hash: 3B116DB58002499FCB10CF9AC845BDEBFF8FB48324F108419E554A7640D779A544CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.356087964.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_65e0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: ResumeThread
                                                                              • String ID:
                                                                              • API String ID: 947044025-0
                                                                              • Opcode ID: 7c0d28bbb22ed8209ab5e2cc42b372e41d81efe2ce48c7fdd1e34b538a222ac9
                                                                              • Instruction ID: f27df755ce2b7fd2acff21041192b3970191fd0ac886b1141238f6c37fdc7853
                                                                              • Opcode Fuzzy Hash: 7c0d28bbb22ed8209ab5e2cc42b372e41d81efe2ce48c7fdd1e34b538a222ac9
                                                                              • Instruction Fuzzy Hash: 4C113A75D002498BCB14DFAEC8447DFFBF5AF98324F148419D419A7240C779A944CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 022CA26E
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.332033543.00000000022C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_22c0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: HandleModule
                                                                              • String ID:
                                                                              • API String ID: 4139908857-0
                                                                              • Opcode ID: ed72eebb3279402aa62220a8197454a3a46e475df72d785e64c102522ad6a5a6
                                                                              • Instruction ID: e2d453cedb28bde70fbe19e9822888c80873d9f842dc0ac92a3b15f78648f533
                                                                              • Opcode Fuzzy Hash: ed72eebb3279402aa62220a8197454a3a46e475df72d785e64c102522ad6a5a6
                                                                              • Instruction Fuzzy Hash: DD1113B6C002498FCB10CF9AC844BDEFBF4AF88324F20851AD429A7204C3B9A545CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • FindCloseChangeNotification.KERNELBASE(?), ref: 065F52E0
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.356293522.00000000065F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_65f0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: ChangeCloseFindNotification
                                                                              • String ID:
                                                                              • API String ID: 2591292051-0
                                                                              • Opcode ID: f9ee8bec1346810f3449fbcebfccac26aa89e6dcf77817595ef5a5787351653f
                                                                              • Instruction ID: 012d63f2a9cda80d87272f971c489cfbf6ee38a303a08a67d893e74498fd9aa0
                                                                              • Opcode Fuzzy Hash: f9ee8bec1346810f3449fbcebfccac26aa89e6dcf77817595ef5a5787351653f
                                                                              • Instruction Fuzzy Hash: 031148B5C002498FCB10CF9AC885BDEBBF4FB58324F208419D558A7340D779A544CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SetWindowLongW.USER32(?,?,?), ref: 04A80C7D
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.353646326.0000000004A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4a80000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: LongWindow
                                                                              • String ID:
                                                                              • API String ID: 1378638983-0
                                                                              • Opcode ID: 2f21775ee19ad6ad6ea1fca60596f6f13d3915544626e62db1f78d586358d701
                                                                              • Instruction ID: 139d0a32b3f36338a8998adad567a72d15af90ac271b71f33e825ee646d5a909
                                                                              • Opcode Fuzzy Hash: 2f21775ee19ad6ad6ea1fca60596f6f13d3915544626e62db1f78d586358d701
                                                                              • Instruction Fuzzy Hash: 7F1148B58002488FDB20CF9AD585BDEBFF4EB58324F248419D858B3301C375A945CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SetWindowLongW.USER32(?,?,?), ref: 04A80C7D
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.353646326.0000000004A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A80000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_4a80000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: LongWindow
                                                                              • String ID:
                                                                              • API String ID: 1378638983-0
                                                                              • Opcode ID: 5f4248e2783bb20b590db833cd10fe56adf04ee7f4e425d363dabefec83a5a71
                                                                              • Instruction ID: 1f435a11db3ed00cdca6ce7cb7ec45708925eace67fe3b4099aea85eb12d6888
                                                                              • Opcode Fuzzy Hash: 5f4248e2783bb20b590db833cd10fe56adf04ee7f4e425d363dabefec83a5a71
                                                                              • Instruction Fuzzy Hash: C711E8B58002499FDB10DF9AD985BDEBBF8EB58324F108419D859A7700C375A944CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • PostMessageW.USER32(?,?,?,?), ref: 065F2ED5
                                                                              Memory Dump Source
                                                                              • Source File: 0000000B.00000002.356293522.00000000065F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_11_2_65f0000_keWKhH.jbxd
                                                                              Similarity
                                                                              • API ID: MessagePost
                                                                              • String ID:
                                                                              • API String ID: 410705778-0
                                                                              • Opcode ID: a71fcb7f8d6a231335f0d0419a40069a105a03a3278dae42be7b703215d80562
                                                                              • Instruction ID: 1bb5a2ce1ddfd8a5c188988c76bc3d2cec2a4e25b86dbf3bc3014e780d1dbe87
                                                                              • Opcode Fuzzy Hash: a71fcb7f8d6a231335f0d0419a40069a105a03a3278dae42be7b703215d80562
                                                                              • Instruction Fuzzy Hash: 6311E8B58003499FDB10CF9AC985BDFBBF8FB48324F208419E554A7600C375A584CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%