Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe

Overview

General Information

Sample Name:SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
Analysis ID:1345579
MD5:4a57aaabbc130e2ff9f78a1231680e14
SHA1:a372c732016750f03ecf5465a4b71ee170a0ae52
SHA256:5ef8f6039eee8fa8cb4a3ae505f4f17d4a98570ec25c3279a89ee829aa6f0431
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Host": "us2.smtp.mailhostbox.com", "Username": "lawsaman@steveboi.com", "Password": "!Gphfth8  "}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3324006845.0000000002F71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000003.00000002.3324006845.0000000002F71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.2071631481.0000000003FFE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe PID: 1936JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe PID: 6448JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.4039e00.9.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.4039e00.9.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.raw.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.6448.3.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "us2.smtp.mailhostbox.com", "Username": "lawsaman@steveboi.com", "Password": "!Gphfth8 "}
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeReversingLabs: Detection: 23%
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeVirustotal: Detection: 27%Perma Link
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeJoe Sandbox ML: detected
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Yandex Browser
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Yandex\YandexBrowser\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Iridium Browser
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Iridium\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Chromium
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Chromium\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 7Star
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 7Star\7Star\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Torch Browser
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Torch\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Cool Novo
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: MapleStudio\ChromePlus\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Kometa
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Kometa\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Amigo
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Amigo\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Brave
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: BraveSoftware\Brave-Browser\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: CentBrowser
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: CentBrowser\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Chedot
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Chedot\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Orbitum
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Orbitum\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Sputnik
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Sputnik\Sputnik\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Comodo Dragon
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Comodo\Dragon\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Vivaldi
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Vivaldi\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Citrio
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: CatalinaGroup\Citrio\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 360 Browser
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 360Chrome\Chrome\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Uran
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: uCozMedia\Uran\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Liebao Browser
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: liebao\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Elements Browser
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Elements Browser\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Epic Privacy
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Epic Privacy Browser\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Coccoc
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: CocCoc\Browser\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Sleipnir 6
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: QIP Surf
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: QIP Surf\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Coowon
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Coowon\Coowon\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Chrome
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Google\Chrome\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Edge Chromium
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Microsoft\Edge\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Firefox
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Mozilla\Firefox\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SeaMonkey
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Mozilla\SeaMonkey\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Thunderbird
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Thunderbird\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: BlackHawk
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \NETGATE Technologies\BlackHawk\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: CyberFox
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \8pecxstudios\Cyberfox\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: K-Meleon
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \K-Meleon\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: IceCat
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Mozilla\icecat\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: PaleMoon
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Moonchild Productions\Pale Moon\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: IceDragon
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Comodo\IceDragon\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: WaterFox
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Waterfox\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Postbox
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Postbox\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Flock
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Flock\Browser\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: APPDATA
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 00061561
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Berkelet DB
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 00000002
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 1.85 (Hash, version 2, native byte-order)
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Unknow database format
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SQLite format 3
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: table
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: UNIQUE
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SEQUENCE {
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {0:X2}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {0:X2}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {0:X2}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Windows Credential
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: credential
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: policy
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: blob
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: chrome
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {{{0}}}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: chrome
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {{{0}}}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: sha512
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: sha512
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: ObjectLength
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: ChainingModeGCM
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: AuthTagLength
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: ChainingMode
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: KeyDataBlob
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Microsoft Primitive Provider
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: :Zone.Identifier
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SystemDrive
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {0:X2}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SELECT * FROM Win32_Processor
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Name
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: .tmp
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: None
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: win32_processor
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: processorID
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 0903b35d-ffcd-4c9d-a3b7-51fd7e4b2c22
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Win32_NetworkAdapterConfiguration
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: IPEnabled
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: MacAddress
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 8f1b120f-6033-4b90-8e60-8a414f8d073f
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Win32_BaseBoard
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SerialNumber
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 299748ea-2a39-43bb-bba9-e1c716c8b7f5
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: yyyy_MM_dd_HH_mm_ss
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: .html
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: text/html
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: yyyy_MM_dd_HH_mm_ss
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: .html
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {0}:
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: StorageSize: {0} (0x{0:X})
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Version: 0x{0:X}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: FormatID: {0}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Size of the SerializedPropertyStorage is less than 28 ({0})
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Size of the SerializedPropertyStore is less than {0} ({1})
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Version is not equal to {0} ({1})
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {D5CDD505-2E9C-101B-9397-08002B2CF9AE}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Type: {0}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Value: {0}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: ValueSize: {0} (0x{0:X})
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: NameSize: {0} (0x{0:X})
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Name: {0}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Size of the StringName is less than 9 ({0})
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Size of the StringName is not equal to {0} ({1})
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Size of the NameSize is not equal to {0} ({1})
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: ValueSize: {0} (0x{0:X})
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: ID: 0x{0:X}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Size of the StringName is less than 9 ({0})
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Size of the StringName is not equal to {0} ({1})
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Size of the SerializedPropertyStore is less than 8 ({0})
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Size of the SerializedPropertyStore is less than {0} ({1})
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: StoreSize: {0} (0x{0X})
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Device\LanmanRedirector\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Device\LanmanRedirector\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Failed to retrieve system handle information.
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: ()]G.
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: YsSY
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: XRxX
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: XXxX
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: ccccCicb
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: ?=__
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: UyYY
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: XRxX
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SYX}qYYYIyYYYYyY
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: XPxX
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: X\xX
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: X^xX
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: BB[bB
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: *SY[rqXY
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: BBMbB
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: '''''?'''"
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: T:T5
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: image/jpg
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: yyyy_MM_dd_HH_mm_ss
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: .jpeg
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: /log.tmp
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <br>[
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: ]<br>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <br>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Time:
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <br>User Name:
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <br>Computer Name:
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <br>OSFullName:
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <br>CPU:
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <br>RAM:
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <br>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: IP Address:
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <br>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <hr>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: New
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: IP Address:
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: false
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: false
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: false
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: false
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: false
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: false
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: false
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: true
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: false
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: us2.smtp.mailhostbox.com
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: lawsaman@steveboi.com
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: !Gphfth8
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: lawsaman@steveboi.com
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: false
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: false
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: appdata
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: yCfxxa
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: yCfxxa.exe
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: yCfxxa
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Type
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <br>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <hr>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <br>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <b>[
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: ]</b> (
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: )<br>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {BACK}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {ALT+TAB}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {ALT+F4}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {TAB}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {ESC}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {Win}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {CAPSLOCK}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {KEYUP}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {KEYDOWN}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {KEYLEFT}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {KEYRIGHT}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {DEL}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {END}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {HOME}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {Insert}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {NumLock}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {PageDown}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {PageUp}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {ENTER}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {F1}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {F2}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {F3}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {F4}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {F5}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {F6}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {F7}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {F8}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {F9}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {F10}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {F11}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {F12}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: control
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: {CTRL}
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: &amp;
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: &lt;
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: &gt;
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: &quot;
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <br><hr>Copied Text: <br>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <hr>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: logins
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: IE/Edge
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Windows Secure Note
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Windows Web Password Credential
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Windows Credential Picker Protector
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Web Credentials
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Windows Credentials
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Windows Domain Certificate Credential
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Windows Domain Password Credential
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Windows Extended Credential
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SchemaId
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: pResourceElement
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: pIdentityElement
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: pPackageSid
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: pAuthenticatorElement
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: IE/Edge
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: UC Browser
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: UCBrowser\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Login Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: journal
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: wow_logins
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Safari for Windows
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <array>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <dict>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <string>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: </string>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <string>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: </string>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: <data>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: </data>
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: -convert xml1 -s -o "
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \fixed_keychain.xml"
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Microsoft\Credentials\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Microsoft\Credentials\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Microsoft\Credentials\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Microsoft\Credentials\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Microsoft\Protect\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: credential
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: QQ Browser
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Tencent\QQBrowser\User Data
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Default\EncryptedStorage
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Profile
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \EncryptedStorage
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: entries
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: category
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Password
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: str3
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: str2
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: blob0
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: password_value
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: IncrediMail
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: PopPassword
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SmtpPassword
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Software\IncrediMail\Identities\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Accounts_New
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: PopPassword
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SmtpPassword
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SmtpServer
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: EmailAddress
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Eudora
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: current
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Settings
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SavePasswordText
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Settings
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: ReturnAddress
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Falkon Browser
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \falkon\profiles\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: profiles.ini
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: profiles.ini
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \browsedata.db
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: autofill
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: ClawsMail
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Claws-mail
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \clawsrc
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \clawsrc
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: passkey0
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: master_passphrase_salt=(.+)
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \accountrc
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: smtp_server
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: address
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: account
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Email
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Server
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SchemaId
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: pResourceElement
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: pIdentityElement
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: pPackageSid
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: pAuthenticatorElement
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: syncpassword
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: mailoutgoing
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: FoxMail
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Executable
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: FoxmailPath
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Storage\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Storage\
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \mail
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \mail
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Accounts\Account.rec0
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Accounts\Account.rec0
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Account.stg
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Account.stg
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: POP3Host
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SMTPHost
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: IncomingServer
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Account
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: MailAddress
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Password
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: POP3Password
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Opera Mail
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: opera:
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: PocoMail
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: appdata
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: \Pocomail\accounts.ini
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Email
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: POPPass
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SMTPPass
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: SMTP
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: eM Client
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: eM Client\accounts.dat
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: eM Client
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: Accounts
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: "Username":"
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpackString decryptor: "Secret":"
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: qEk.pdbSHA256K source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: Binary string: qEk.pdb source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: Joe Sandbox ViewIP Address: 208.91.198.143 208.91.198.143
                    Source: global trafficTCP traffic: 192.168.2.6:49701 -> 208.91.198.143:587
                    Source: global trafficTCP traffic: 192.168.2.6:49701 -> 208.91.198.143:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3324006845.0000000002FC7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3322598459.0000000000F10000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3327151487.00000000066F2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3327151487.00000000066F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3322598459.0000000000F10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3324006845.0000000002FC7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3322598459.0000000000F10000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3327151487.00000000066F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3324006845.0000000002FC7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3322598459.0000000000F10000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3327151487.00000000066F2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3327151487.00000000066F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3324006845.0000000002FC7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3322598459.0000000000F10000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3327151487.00000000066F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0A
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3324006845.0000000002FC7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3324006845.0000000002FC7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3322598459.0000000000F10000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3327151487.00000000066F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                    Source: unknownDNS traffic detected: queries for: us2.smtp.mailhostbox.com

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.4039e00.9.raw.unpack, rty.cs.Net Code: PI75tnp3f
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.raw.unpack, rty.cs.Net Code: PI75tnp3f

                    System Summary

                    barindex
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.2e73e84.0.raw.unpack, RFebBaClhEWIFvwxqU.csLarge array initialization: : array initializer size 9041
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.5690000.10.raw.unpack, RFebBaClhEWIFvwxqU.csLarge array initialization: : array initializer size 9041
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 0_2_0134F6980_2_0134F698
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 0_2_0134CE1C0_2_0134CE1C
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 0_2_0134F6880_2_0134F688
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_017542283_2_01754228
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_0175AB383_2_0175AB38
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_01754E403_2_01754E40
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_017545703_2_01754570
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_061C00403_2_061C0040
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_061CD5983_2_061CD598
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_061CBAA83_2_061CBAA8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_0620CCF03_2_0620CCF0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_0620BD083_2_0620BD08
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_06206A003_2_06206A00
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_062023783_2_06202378
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_062083403_2_06208340
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_062059483_2_06205948
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_0620F3303_2_0620F330
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_062000403_2_06200040
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_062060D83_2_062060D8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_062000163_2_06200016
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000000.00000002.2074467383.0000000007650000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000000.00000002.2071631481.0000000003FFE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename68d39da3-494e-457a-86fc-063f75f57104.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000000.00000002.2071631481.0000000003FFE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000000.00000002.2074698879.0000000007760000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameqEk.exe> vs SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000000.00000002.2068910816.0000000000FFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000000.00000000.2059076341.0000000000B2A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameqEk.exe> vs SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000000.00000002.2071062606.0000000002E5C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename68d39da3-494e-457a-86fc-063f75f57104.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3322355919.0000000000D39000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3322250910.000000000043E000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename68d39da3-494e-457a-86fc-063f75f57104.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3322598459.0000000000E68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeBinary or memory string: OriginalFilenameqEk.exe> vs SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeReversingLabs: Detection: 23%
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeVirustotal: Detection: 27%
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.logJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, qTfQUvDQoguZrmp9yH.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, qTfQUvDQoguZrmp9yH.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, qTfQUvDQoguZrmp9yH.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, RQmbubB7xiBqv88hTo.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dllJump to behavior
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.4039e00.9.raw.unpack, XYinPl.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.4039e00.9.raw.unpack, XYinPl.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.4039e00.9.raw.unpack, XYinPl.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.4039e00.9.raw.unpack, XYinPl.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.4039e00.9.raw.unpack, SGDyC.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.4039e00.9.raw.unpack, SGDyC.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.4039e00.9.raw.unpack, OXoLR2U.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.4039e00.9.raw.unpack, OXoLR2U.csCryptographic APIs: 'TransformFinalBlock'
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: qEk.pdbSHA256K source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                    Source: Binary string: qEk.pdb source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe

                    Data Obfuscation

                    barindex
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, qTfQUvDQoguZrmp9yH.cs.Net Code: hg4fPor1O4 System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.2e73e84.0.raw.unpack, RFebBaClhEWIFvwxqU.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.5690000.10.raw.unpack, RFebBaClhEWIFvwxqU.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 0_2_01345947 pushfd ; retf 0_2_01345951
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeCode function: 3_2_061C76B1 push esp; retf 3_2_061C76BD
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.9804605454045685
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, Ewlu4OlmJJrDIZkXBQ.csHigh entropy of concatenated method names: 'DgZUHpaNGR', 'cmMUX0RcRl', 'BA7oQrt6rv', 'p9co147ejK', 'pNioFl2ko0', 'bmsogi15hA', 'eecoWCJIAt', 'DCyoLT3GmT', 'HmLoKBb0ML', 'TrYoCNaN0R'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, FWPu0kbfoEgNVl3Iob.csHigh entropy of concatenated method names: 'aR3PLFZxm', 'mHxa6iaJa', 'gmwV7TShU', 'HeaXif24T', 'hhL2GUXrk', 'xWql3x39M', 'RsN3RB81JTjSkesKs0', 'aw0WlucuO9jK4WWvXO', 'PhYnIx7GO', 'VnKc50759'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, FbKmdhxG3dpFOIJr68.csHigh entropy of concatenated method names: 'nKcqv9ZPaE', 'W85qJd6awW', 'TyKqfxbA38', 'a2sqOYUSVX', 'f17qso28Js', 'EyGqU1d3ho', 'zG7qIlJDF8', 'lAwn3uBncY', 'b7xnNJAEap', 'ROdnYYJ8mi'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, ygpumEfJhwtKISr76d.csHigh entropy of concatenated method names: 'Ou4vEQmbub', 'uxivDBqv88', 'L2Qv6c7oKQ', 'AJcveS2wlu', 'nkXvmBQcLT', 'QqBvAUr62J', 'bETHWi6qgPTC0JLS0O', 'buOewEDIMgGZ8i64NQ', 'G0Cvvbo7lF', 'fcBvJqWiXS'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, HTetuCYx2cnLU8oSVj.csHigh entropy of concatenated method names: 'B0Un8hGOTv', 'sQCn0LMG74', 'd2LnQExPY5', 'hiIn1hAU5T', 'ae4nkfL6ND', 'LwOnF4YKWT', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, CYu3iW22Qc7oKQHJcS.csHigh entropy of concatenated method names: 'OcwoaBj2So', 'tcgoVd9Mfq', 't4LoBp921k', 'NjXo2GHCG6', 'JHqomDg8cW', 'ltXoAK4Ws0', 'uiKoMHqLrh', 'YAvonCTOVW', 'qaooqAh432', 'VZZocHkLNR'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, zNLnS4kjxhFJyLNFIJ.csHigh entropy of concatenated method names: 'sNdmCR0cGA', 'YBXmw5ZfYd', 'hVgmknVQkT', 'uREm4sQXpL', 'OBLm0egZh6', 'K3tmQnSyAg', 'b7Fm1PoGgi', 'slEmF48U40', 'x2umgc7Lax', 'R5smWHPnMA'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, j6AN2rzrZuHcEVGLaY.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 't16qZcAu33', 't9FqmG8oo9', 'lsxqA73cA7', 'Oy8qMm9D5f', 'ghJqnrZD1O', 'cH4qqbJOw3', 'jqBqcWOmyv'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, DpFK4evJOmJOJFPMKAf.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'aqqckp2wcl', 'kHLc40F98x', 'CAhcp5KMfK', 'Mp2c5sBZk6', 'yrRcihC56T', 'HQccdVBmvj', 'gTrc37PfW7'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, sLT9qB8Ur62Jvjdil0.csHigh entropy of concatenated method names: 'aOHIRyCZNn', 'bOMIsu0mfJ', 'mR8IUOp63a', 'GyJIECUlGY', 'XPbIDjD0WG', 'OUQUi3s0eo', 'adNUdZTEh3', 'jiNU3jbcYf', 'xIBUNSk4IZ', 'lIMUYHxQpk'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, Awwyg2dAgUkNGlv85i.csHigh entropy of concatenated method names: 'Q5KMNOsUyj', 'qbDMx1QUKC', 'VMLnuSIKDR', 'awknv45SsX', 'ftiMSaVpZ3', 'kqHMwPmjIR', 'ydXM9NZl0O', 'sQlMkm8OIF', 'xcVM4UrJRS', 'nDnMpcOOr3'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, JcK93u9dmt6AOiULJk.csHigh entropy of concatenated method names: 'SlpZBQtDAc', 'rBjZ24fOQ8', 'FwPZ8A6PvO', 'iJ4Z0kkMav', 'ikxZ1jCg6L', 'udQZFgMQw6', 'td9ZWxkqrj', 'MH1ZLq7ho6', 'mPPZCYgnQh', 'NeaZStDb2o'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, AVtOeHonjWY5gT9u12.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'apnbYV8aRP', 'k26bxY7pi8', 'gchbzVUass', 'OUnJuNHxJT', 'a74JvhRsr3', 'eS9JbsXQfU', 'z8QJJIJyH6', 'FW3HrOIWikSqAL6XkQH'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, Ws654NglxAGvjHgiiV.csHigh entropy of concatenated method names: 'PNKIpKs40A', 'El8I57A0og', 'zwvIiIVsMR', 'ToString', 'DT4IdM6Hmc', 'dYrI35BMXx', 'Wk3g0v2GCfdbNaUhG2f', 'mtPbRb2uEFlAL1SVaQU', 'vX3dJ22dc22r0qQxB49', 'EIj5AV2KCZJOv69kGj7'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, DFsGsPpsdQW4TYyxMN.csHigh entropy of concatenated method names: 'ToString', 'Qs1ASdFmVh', 'N7vA0H6UUG', 'YQEAQvcAU7', 'sNVA1qUJfc', 'pYWAFnJ3mY', 'qV9AgXflAN', 'QjeAW6a2DQ', 'PwYALR4FHL', 'zVMAKkWYhG'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, WWfyqDvu1AcOSSvRl5e.csHigh entropy of concatenated method names: 'wGwqjr35h9', 'uxHqr4PwEp', 'Xt1qPW5rPA', 'Qx1qaXtNn6', 'YbOqHj0MGx', 'tVlqV2N5SM', 'OlvqXB99mG', 'WVLqBg1hX9', 'i0pq2hhpiZ', 'yWWqlNEy5X'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, bH8p3XNmQfoJKA8eku.csHigh entropy of concatenated method names: 'ICsnOu6RNZ', 'FkYns3tlha', 'sdQnomcnTy', 'eKXnUkY4O9', 'Wv8nI9KI3p', 'DLknEikFdX', 'uo9nDUHMt0', 'abVnTE8bZ2', 'dN7n6kYhIy', 'isrnepp5Wn'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, qTfQUvDQoguZrmp9yH.csHigh entropy of concatenated method names: 'VD5JRHoYxd', 'A3vJOYiEOo', 'uaZJswMKxj', 'zPcJo2vTKy', 'kv5JUwr9R2', 'c5UJI1tJ90', 'SLxJE3GIBv', 'NshJD7Q2wX', 'cJUJTIS8o1', 'XcaJ6Iw63r'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, VOQ4m5KO8jvf7NLmhH.csHigh entropy of concatenated method names: 'ovOEjdJ9Hb', 'Go6Er6TTCW', 'EToEPtKHyQ', 'IhdEaZB2fJ', 'wB0EHw9Lkp', 'YGtEVcpG9x', 'PG0EXl7INp', 'v0mEB6D2p0', 'jk0E2ixvop', 'NjaElXwmiX'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, RQmbubB7xiBqv88hTo.csHigh entropy of concatenated method names: 'erosk6il0F', 'ySRs4vxRKB', 'nsGsp1aWCF', 'Ap8s5P4jeM', 'HOYsikWqiI', 'FSMsdjT4pT', 'oEOs3BRrdN', 'AkYsNi2JO4', 'vJ3sYl24eC', 'CfUsxmFqDw'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.7650000.13.raw.unpack, dDwAO9sHaPfheN0kNk.csHigh entropy of concatenated method names: 'Dispose', 'FvwvYjfcjh', 'OnMb07v7JM', 'mhHvvDv7MT', 'hbHvx8p3Xm', 'HfovzJKA8e', 'ProcessDialogKey', 'Qu0buTetuC', 'Y2cbvnLU8o', 'OVjbblbKmd'
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe PID: 1936, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 6536Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -99875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 5132Thread sleep count: 8328 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 5132Thread sleep count: 1537 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -99765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -99656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -99547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -99437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -99328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -99218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -99109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -98999s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -98890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -98781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -98656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -98546s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -98437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -98325s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -98218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -98109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -98000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -97890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -97781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -97670s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -97562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -97453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -97343s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -97234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -97125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -97015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -96906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -96796s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -96687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -96578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -96468s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -96359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -96249s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -96140s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -96031s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -95919s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -95812s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -95703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -95593s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -95484s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -95375s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -95265s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -95156s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -95046s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -94937s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -94810s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -94703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe TID: 1048Thread sleep time: -94593s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeWindow / User API: threadDelayed 8328Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeWindow / User API: threadDelayed 1537Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 99765Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 99656Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 99547Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 99437Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 99328Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 99218Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 99109Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 98999Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 98890Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 98781Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 98656Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 98546Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 98437Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 98325Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 98218Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 98109Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 98000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 97890Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 97781Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 97670Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 97562Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 97453Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 97343Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 97234Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 97125Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 97015Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 96906Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 96796Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 96687Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 96578Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 96468Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 96359Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 96249Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 96140Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 96031Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 95919Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 95812Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 95703Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 95593Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 95484Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 95375Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 95265Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 95156Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 95046Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 94937Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 94810Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 94703Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeThread delayed: delay time: 94593Jump to behavior
                    Source: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3322598459.0000000000F10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000003.00000002.3324006845.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe PID: 6448, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.4039e00.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.4039e00.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2071631481.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: Yara matchFile source: 00000003.00000002.3324006845.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe PID: 6448, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000003.00000002.3324006845.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe PID: 6448, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.4039e00.9.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.4039e00.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe.3ffe5e0.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2071631481.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
                    Valid Accounts121
                    Windows Management Instrumentation
                    Path Interception11
                    Process Injection
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    111
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
                    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Disable or Modify Tools
                    1
                    Input Capture
                    1
                    Process Discovery
                    Remote Desktop Protocol1
                    Input Capture
                    Exfiltration Over Bluetooth1
                    Non-Standard Port
                    SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
                    Domain AccountsAtLogon Script (Windows)Logon Script (Windows)131
                    Virtualization/Sandbox Evasion
                    1
                    Credentials in Registry
                    131
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares11
                    Archive Collected Data
                    Automated Exfiltration1
                    Non-Application Layer Protocol
                    Data Encrypted for ImpactDNS ServerEmail Addresses
                    Local AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object Model1
                    Data from Local System
                    Traffic Duplication11
                    Application Layer Protocol
                    Data DestructionVirtual Private ServerEmployee Names
                    Cloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    File and Directory Discovery
                    SSHKeyloggingScheduled TransferFallback ChannelsData Encrypted for ImpactServerGather Victim Network Information
                    Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                    Obfuscated Files or Information
                    Cached Domain Credentials24
                    System Information Discovery
                    VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
                    External Remote ServicesSystemd TimersStartup ItemsStartup Items12
                    Software Packing
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe24%ReversingLabsWin32.Trojan.Generic
                    SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe28%VirustotalBrowse
                    SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    http://ocsp.sectigo.com0A0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    us2.smtp.mailhostbox.com
                    208.91.198.143
                    truefalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3324006845.0000000002FC7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3322598459.0000000000F10000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3327151487.00000000066F2000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://ocsp.sectigo.com0ASecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3324006845.0000000002FC7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3322598459.0000000000F10000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3327151487.00000000066F2000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://sectigo.com/CPS0SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3324006845.0000000002FC7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3322598459.0000000000F10000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3327151487.00000000066F2000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://us2.smtp.mailhostbox.comSecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe, 00000003.00000002.3324006845.0000000002FC7000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        208.91.198.143
                        us2.smtp.mailhostbox.comUnited States
                        394695PUBLIC-DOMAIN-REGISTRYUSfalse
                        Joe Sandbox Version:38.0.0 Ammolite
                        Analysis ID:1345579
                        Start date and time:2023-11-21 04:17:06 +01:00
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 6m 15s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:8
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample file name:SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 140
                        • Number of non-executed functions: 1
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        TimeTypeDescription
                        04:17:51API Interceptor75x Sleep call for process: SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        208.91.198.143cargo_023354663.exeGet hashmaliciousAgentTeslaBrowse
                          SecuriteInfo.com.Win32.PWSX-gen.30886.6003.exeGet hashmaliciousAgentTeslaBrowse
                            payment_slip_&_voucher.pdf.exeGet hashmaliciousAgentTeslaBrowse
                              0324_Request_For_Quotation.exeGet hashmaliciousAgentTeslaBrowse
                                REVISED_INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                                  SecuriteInfo.com.Win32.PWSX-gen.32346.7773.exeGet hashmaliciousAgentTeslaBrowse
                                    SecuriteInfo.com.Win32.PWSX-gen.5587.31902.exeGet hashmaliciousAgentTeslaBrowse
                                      PO-PO2723030194_Version_1.exeGet hashmaliciousAgentTeslaBrowse
                                        RFQ.exeGet hashmaliciousAgentTeslaBrowse
                                          New_Order.exeGet hashmaliciousAgentTeslaBrowse
                                            SecuriteInfo.com.Win32.PWSX-gen.21137.26359.exeGet hashmaliciousAgentTeslaBrowse
                                              Request_For_Quotation_PO34223.exeGet hashmaliciousAgentTeslaBrowse
                                                cotizacion.exeGet hashmaliciousAgentTeslaBrowse
                                                  DHL_no_8611234214.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                    PO.NO_#U2013MFV2324POSRMP00132.exeGet hashmaliciousAgentTeslaBrowse
                                                      invoice_for_payment.exeGet hashmaliciousAgentTeslaBrowse
                                                        DHL_DOC_74653898.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                          4PgMquUqV4.exeGet hashmaliciousAgentTeslaBrowse
                                                            SecuriteInfo.com.Win32.PWSX-gen.13658.1821.exeGet hashmaliciousAgentTeslaBrowse
                                                              SecuriteInfo.com.PWSX-gen.17970.9828.exeGet hashmaliciousAgentTeslaBrowse
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                us2.smtp.mailhostbox.comPayment_Advice_-_Advice_RefA1T9IvYc5tfi.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.223
                                                                rTTSwiftCopy.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.225
                                                                rBANKSTATEMENTSOFACCOUNT(S).exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.225
                                                                Request_for_500kg_Fertilizer.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.223
                                                                cargo_023354663.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.198.143
                                                                SecuriteInfo.com.Win32.PWSX-gen.30886.6003.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.198.143
                                                                SecuriteInfo.com.Win32.PWSX-gen.22041.32545.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.224
                                                                SecuriteInfo.com.Trojan.Inject4.59820.20999.20761.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.223
                                                                payment_slip_&_voucher.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.198.143
                                                                invoice.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.223
                                                                0324_Request_For_Quotation.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.198.143
                                                                REVISED_INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.198.143
                                                                SecuriteInfo.com.Win32.PWSX-gen.564.11389.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.223
                                                                Remision_Copia_#190922-001.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.224
                                                                SecuriteInfo.com.Win32.PWSX-gen.32346.7773.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.198.143
                                                                SecuriteInfo.com.Win32.PWSX-gen.5587.31902.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.198.143
                                                                PO-PO2723030194_Version_1.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.198.143
                                                                AD9613BCPZ_COOPP03.23.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.224
                                                                SecuriteInfo.com.Win32.PWSX-gen.7740.23798.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.224
                                                                RFQ.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.198.143
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                PUBLIC-DOMAIN-REGISTRYUSPayment_Advice_-_Advice_RefA1T9IvYc5tfi.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.223
                                                                rTTSwiftCopy.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.225
                                                                rBANKSTATEMENTSOFACCOUNT(S).exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.225
                                                                PO771000.EXE.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 199.79.62.115
                                                                PO88100020.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 199.79.62.115
                                                                Request_for_500kg_Fertilizer.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.223
                                                                S009892823151530,PDF.exeGet hashmaliciousFormBookBrowse
                                                                • 162.222.226.77
                                                                cargo_023354663.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.198.143
                                                                PO-68723.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 216.10.246.178
                                                                SecuriteInfo.com.Win32.PWSX-gen.30886.6003.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.198.143
                                                                SecuriteInfo.com.Win32.PWSX-gen.22041.32545.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.224
                                                                SecuriteInfo.com.Trojan.Inject4.59820.20999.20761.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.223
                                                                https://r20.rs6.net/tn.jsp?f=001OD0JwB1Pf45JfKH6JC8CPfaRnRc3dCMxeq788K6zTWWLeuTziIrljVOB3NrAkxrdQWhrVMBC7sEGsK_ZNpcl1nZloFvHi2Y1fcOYRYlXVf_NftbS_YwJQVNgmjdS0hFIW3Sv0M8lDax_lqWRL7-vqXi5USS1A_aBD-qtXPwxOIU=&c=&ch=&__=a3Jvb25leUB1bml0ZWRvbmUub3Jn&d=DwMGaQGet hashmaliciousHTMLPhisherBrowse
                                                                • 111.118.212.66
                                                                https://r20.rs6.net/tn.jsp?f=001vJ-Hhk0Wb-jfLLeGuRAt7VnnHPdzLaNWSFYaCXh55mmkdjTAnw2aB9ctIoPD1Q4qZ6FZtpGLBYOmsGHcb2DO6Z9hhKK6RSerIEg5m-zpJBt4hixlwEw8RzL4NAh9I_bD4o_aWJuNHOBKiGLwbK1rVw==&c=&ch==&__=Grace/7355269/YmFybmFieS5tb2ZmYXRAZW52b3lkaWdpdGFsLmNvbQ==&c=E,1,2B7YQvHDqbKO-JT5p1Fii6loBR6AaaWUMfDMqmqlQeIKyocivhWnsEVsrWvOdIpnCxwMt8QW50QzojjYmrf-eML19f4FIHuaD8Gvgdnue8ua_8IVaA,,&typo=1Get hashmaliciousHTMLPhisherBrowse
                                                                • 111.118.212.66
                                                                payment_slip_&_voucher.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.198.143
                                                                invoice.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.223
                                                                0324_Request_For_Quotation.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.198.143
                                                                REVISED_INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.198.143
                                                                SecuriteInfo.com.Win32.PWSX-gen.564.11389.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.223
                                                                Remision_Copia_#190922-001.exeGet hashmaliciousAgentTeslaBrowse
                                                                • 208.91.199.224
                                                                No context
                                                                No context
                                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1216
                                                                Entropy (8bit):5.34331486778365
                                                                Encrypted:false
                                                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                Malicious:false
                                                                Reputation:high, very likely benign file
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Entropy (8bit):7.972761501742185
                                                                TrID:
                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                File name:SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                                                                File size:640'512 bytes
                                                                MD5:4a57aaabbc130e2ff9f78a1231680e14
                                                                SHA1:a372c732016750f03ecf5465a4b71ee170a0ae52
                                                                SHA256:5ef8f6039eee8fa8cb4a3ae505f4f17d4a98570ec25c3279a89ee829aa6f0431
                                                                SHA512:894ad53dea2d423b9566a43019dbd4c60178e9ebfa90a87206d65903dc4d865a2e8e18734a0e26842410613de5b9d4dccfc2a58f92466ccd300001ffbf509083
                                                                SSDEEP:12288:sYWBpJjfXqCGvEosj5/bESJH60M17KbTrhSXVRt5NlooKUNOUij:sY+fXq/vsj5zxHLM17K27vlooKUBi
                                                                TLSH:95D42346274C6E37DEDB2AF658909F8292B67F5E7095CA693C98B6ED3F233140110393
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....\e..............0..d...`........... ........@.. ....................... ............@................................
                                                                Icon Hash:4d860b293b0f8e4d
                                                                Entrypoint:0x4981f2
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x655C020B [Tue Nov 21 01:04:11 2023 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                Instruction
                                                                jmp dword ptr [00402000h]
                                                                sbb al, 42h
                                                                test byte ptr [ebx], ch
                                                                nop
                                                                mov byte ptr [ED943FCBh], al
                                                                push ebx
                                                                scasb
                                                                dec esi
                                                                sar byte ptr [edi], 0000007Ah
                                                                jo 00007F4360AF20F8h
                                                                cmp eax, 3F96C4D8h
                                                                mov ecx, dword ptr [edi+4Eh]
                                                                cld
                                                                mov bl, 4Ah
                                                                push edi
                                                                aas
                                                                add esp, 6Dh
                                                                mov ch, ch
                                                                xchg dh, bh
                                                                fidiv dword ptr [ebp+77h]
                                                                nop
                                                                mov al, byte ptr [B2DE3F97h]
                                                                das
                                                                xor al, EEh
                                                                cdq
                                                                inc edi
                                                                inc eax
                                                                mov eax, C9D57E55h
                                                                or byte ptr [esi-635237C0h], 00000052h
                                                                jnbe 00007F4360AF20ECh
                                                                les eax, fword ptr [eax-53h]
                                                                xchg dword ptr [ebx], edi
                                                                inc edx
                                                                jns 00007F4360AF211Ah
                                                                out 40h, al
                                                                inc ecx
                                                                inc ebp
                                                                aaa
                                                                aaa
                                                                pop ecx
                                                                xor eax, 3537355Ah
                                                                xor al, 38h
                                                                inc esi
                                                                push esi
                                                                inc edi
                                                                xor ecx, dword ptr [edx+35h]
                                                                pop eax
                                                                inc ebp
                                                                xor eax, F3000034h
                                                                div dword ptr [ecx+edx*8+4001E1CBh]
                                                                mov bh, 85h
                                                                xlatb
                                                                inc esp
                                                                out 20h, eax
                                                                inc eax
                                                                jno 00007F4360AF20DFh
                                                                jns 00007F4360AF20EAh
                                                                retn 90AEh
                                                                inc eax
                                                                in al, dx
                                                                rcr dl, cl
                                                                int3
                                                                mov esi, E140D1BAh
                                                                xchg eax, esp
                                                                dec eax
                                                                lds ecx, fword ptr [esi-64C04F30h]
                                                                lahf
                                                                in al, dx
                                                                stosb
                                                                inc ebp
                                                                inc esp
                                                                inc eax
                                                                out CDh, eax
                                                                push dword ptr [eax+406D6C69h]
                                                                mov edi, 82A96B49h
                                                                mov ebp, 9D274097h
                                                                mov byte ptr [B9558EECh], al
                                                                inc eax
                                                                mov dword ptr [E495C3A6h], eax
                                                                sub eax, 0E8640D2h
                                                                mov cl, 7Ch
                                                                sahf
                                                                or ah, cl
                                                                inc eax
                                                                in al, 6Fh
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x9819f0x4f.text
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x9a0000x5c84.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xa00000xc.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x96a2c0x54.text
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x20000x963380x96400False0.9704382669509152data7.9804605454045685IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rsrc0x9a0000x5c840x5e00False0.9362533244680851data7.663868202221351IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0xa00000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0x9a0c80x5874PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.973679561914856
                                                                RT_GROUP_ICON0x9f94c0x14data1.05
                                                                RT_VERSION0x9f9700x310data0.4272959183673469
                                                                DLLImport
                                                                mscoree.dll_CorExeMain
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 21, 2023 04:17:53.292102098 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:17:53.475784063 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:17:53.475982904 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:17:58.546459913 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:17:58.546744108 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:17:58.730278969 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:17:58.730577946 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:17:58.730947971 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:17:58.914560080 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:17:58.922327042 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:17:59.106168032 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:17:59.106190920 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:17:59.106204033 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:17:59.106220007 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:17:59.106498957 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:17:59.476581097 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:17:59.515078068 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:17:59.699527979 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:17:59.723494053 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:17:59.907325029 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:17:59.908348083 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:18:00.094052076 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:18:00.095391989 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:18:00.284511089 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:18:00.284872055 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:18:00.471643925 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:18:00.472103119 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:18:00.682701111 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:18:00.684704065 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:18:00.869927883 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:18:00.870786905 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:18:00.870846033 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:18:00.870874882 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:18:00.870907068 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:18:01.054611921 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:18:01.054779053 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:18:01.191059113 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:18:01.235436916 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:19:33.173408985 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:19:33.358047962 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:19:33.358675003 CET58749701208.91.198.143192.168.2.6
                                                                Nov 21, 2023 04:19:33.358767986 CET49701587192.168.2.6208.91.198.143
                                                                Nov 21, 2023 04:19:33.368081093 CET49701587192.168.2.6208.91.198.143
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 21, 2023 04:17:53.155025959 CET5451953192.168.2.61.1.1.1
                                                                Nov 21, 2023 04:17:53.283301115 CET53545191.1.1.1192.168.2.6
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Nov 21, 2023 04:17:53.155025959 CET192.168.2.61.1.1.10x5324Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Nov 21, 2023 04:17:53.283301115 CET1.1.1.1192.168.2.60x5324No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                                Nov 21, 2023 04:17:53.283301115 CET1.1.1.1192.168.2.60x5324No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                                Nov 21, 2023 04:17:53.283301115 CET1.1.1.1192.168.2.60x5324No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                                Nov 21, 2023 04:17:53.283301115 CET1.1.1.1192.168.2.60x5324No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                                Nov 21, 2023 04:17:58.546459913 CET58749701208.91.198.143192.168.2.6220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                                Nov 21, 2023 04:17:58.546744108 CET49701587192.168.2.6208.91.198.143EHLO 367706
                                                                Nov 21, 2023 04:17:58.730577946 CET58749701208.91.198.143192.168.2.6250-us2.outbound.mailhostbox.com
                                                                250-PIPELINING
                                                                250-SIZE 41648128
                                                                250-VRFY
                                                                250-ETRN
                                                                250-STARTTLS
                                                                250-AUTH PLAIN LOGIN
                                                                250-AUTH=PLAIN LOGIN
                                                                250-ENHANCEDSTATUSCODES
                                                                250-8BITMIME
                                                                250-DSN
                                                                250 CHUNKING
                                                                Nov 21, 2023 04:17:58.730947971 CET49701587192.168.2.6208.91.198.143STARTTLS
                                                                Nov 21, 2023 04:17:58.914560080 CET58749701208.91.198.143192.168.2.6220 2.0.0 Ready to start TLS

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:04:17:50
                                                                Start date:21/11/2023
                                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                                                                Imagebase:0xa90000
                                                                File size:640'512 bytes
                                                                MD5 hash:4A57AAABBC130E2FF9F78A1231680E14
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.2071631481.0000000003FFE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:3
                                                                Start time:04:17:51
                                                                Start date:21/11/2023
                                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.23172.5539.exe
                                                                Imagebase:0x900000
                                                                File size:640'512 bytes
                                                                MD5 hash:4A57AAABBC130E2FF9F78A1231680E14
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:.Net C# or VB.NET
                                                                Yara matches:
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3324006845.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3324006845.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:7%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:37
                                                                  Total number of Limit Nodes:8
                                                                  execution_graph 15327 134a510 15331 134a5f8 15327->15331 15339 134a608 15327->15339 15328 134a51f 15332 134a619 15331->15332 15333 134a63c 15331->15333 15332->15333 15347 134a8a0 15332->15347 15351 134a890 15332->15351 15333->15328 15334 134a634 15334->15333 15335 134a840 GetModuleHandleW 15334->15335 15336 134a86d 15335->15336 15336->15328 15340 134a619 15339->15340 15341 134a63c 15339->15341 15340->15341 15345 134a8a0 LoadLibraryExW 15340->15345 15346 134a890 LoadLibraryExW 15340->15346 15341->15328 15342 134a634 15342->15341 15343 134a840 GetModuleHandleW 15342->15343 15344 134a86d 15343->15344 15344->15328 15345->15342 15346->15342 15348 134a8b4 15347->15348 15349 134a8d9 15348->15349 15355 1349988 15348->15355 15349->15334 15352 134a8a0 15351->15352 15353 1349988 LoadLibraryExW 15352->15353 15354 134a8d9 15352->15354 15353->15354 15354->15334 15356 134aa80 LoadLibraryExW 15355->15356 15358 134aaf9 15356->15358 15358->15349 15359 134cef0 DuplicateHandle 15360 134cf7d 15359->15360 15361 134c8a0 15362 134c8e6 GetCurrentProcess 15361->15362 15364 134c931 15362->15364 15365 134c938 GetCurrentThread 15362->15365 15364->15365 15366 134c975 GetCurrentProcess 15365->15366 15367 134c96e 15365->15367 15368 134c9ab 15366->15368 15367->15366 15369 134c9d3 GetCurrentThreadId 15368->15369 15370 134ca04 15369->15370

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 688 134f698-134f80f 709 134f81a-134f845 688->709 710 134fbf4-134ff9c 709->710 711 134f84b-134fbf3 709->711
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2069795897.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1340000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 83640e00a0e44f1cb2f2ff31a9c767d6e4c3fb4bb7ac31568f64a94e2d8569e6
                                                                  • Instruction ID: 9e941cbf63df2e6b954df5df6e6692e50fa5542bad36bafad641bf4dc79839a5
                                                                  • Opcode Fuzzy Hash: 83640e00a0e44f1cb2f2ff31a9c767d6e4c3fb4bb7ac31568f64a94e2d8569e6
                                                                  • Instruction Fuzzy Hash: 2C1281B24117458BEB30CF69E94C1897BB9BB85B28F914309D2616F2E9DBB4314BCF44
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 823 134f688-134f7fc 844 134f808-134f80f 823->844 845 134f81a-134f845 844->845 846 134fbf4-134ff9c 845->846 847 134f84b-134fbf3 845->847
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2069795897.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1340000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 09db8b5e4c7f48fd6d359ea38f11b5e2bbb824a1cef43eef3984d1890121d544
                                                                  • Instruction ID: 41b5266159bf682d6d3f43fca69ebc40d4d8acb1888a3072c330d2a08046c7c3
                                                                  • Opcode Fuzzy Hash: 09db8b5e4c7f48fd6d359ea38f11b5e2bbb824a1cef43eef3984d1890121d544
                                                                  • Instruction Fuzzy Hash: 14C1E6B2811749CBDB30CF69E8481897BF9BB85B24F514319D2616B2E9DBB4348BCF44
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 0134C91E
                                                                  • GetCurrentThread.KERNEL32 ref: 0134C95B
                                                                  • GetCurrentProcess.KERNEL32 ref: 0134C998
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0134C9F1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2069795897.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1340000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: ea3d755bc06a9e3cc3f91d5371887f1f4e93a75e816b832e5d2696b11e311d9e
                                                                  • Instruction ID: c8271a975a08d521e0c89e6f342114532915800f284279d13652adc494bd27be
                                                                  • Opcode Fuzzy Hash: ea3d755bc06a9e3cc3f91d5371887f1f4e93a75e816b832e5d2696b11e311d9e
                                                                  • Instruction Fuzzy Hash: 5A5178B49013499FDB18CFAAD548B9EBFF1FF88318F208059D409A7360DB756844CB65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 0134C91E
                                                                  • GetCurrentThread.KERNEL32 ref: 0134C95B
                                                                  • GetCurrentProcess.KERNEL32 ref: 0134C998
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0134C9F1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2069795897.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1340000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: d83ab39b31cef123843f18bc1de47daef78d6dc095e92807c5984772cc7542b3
                                                                  • Instruction ID: 26440450ebca7bd186d3d8056e28364eceaf4608f15d6a46ee9e7a4a04bfd907
                                                                  • Opcode Fuzzy Hash: d83ab39b31cef123843f18bc1de47daef78d6dc095e92807c5984772cc7542b3
                                                                  • Instruction Fuzzy Hash: 195178B49013499FDB58CFAAD548B9EBBF1FF88318F208059D009A7360DB756844CB65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 44 134a608-134a617 45 134a643-134a647 44->45 46 134a619-134a626 call 1349924 44->46 47 134a649-134a653 45->47 48 134a65b-134a69c 45->48 53 134a63c 46->53 54 134a628 46->54 47->48 55 134a69e-134a6a6 48->55 56 134a6a9-134a6b7 48->56 53->45 99 134a62e call 134a8a0 54->99 100 134a62e call 134a890 54->100 55->56 58 134a6b9-134a6be 56->58 59 134a6db-134a6dd 56->59 57 134a634-134a636 57->53 60 134a778-134a838 57->60 62 134a6c0-134a6c7 call 1349930 58->62 63 134a6c9 58->63 61 134a6e0-134a6e7 59->61 94 134a840-134a86b GetModuleHandleW 60->94 95 134a83a-134a83d 60->95 64 134a6f4-134a6fb 61->64 65 134a6e9-134a6f1 61->65 66 134a6cb-134a6d9 62->66 63->66 68 134a6fd-134a705 64->68 69 134a708-134a711 call 1349940 64->69 65->64 66->61 68->69 75 134a713-134a71b 69->75 76 134a71e-134a723 69->76 75->76 77 134a725-134a72c 76->77 78 134a741-134a74e 76->78 77->78 80 134a72e-134a73e call 1349950 call 1349960 77->80 84 134a750-134a76e 78->84 85 134a771-134a777 78->85 80->78 84->85 96 134a874-134a888 94->96 97 134a86d-134a873 94->97 95->94 97->96 99->57 100->57
                                                                  APIs
                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0134A85E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2069795897.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1340000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: f75a09998b4666b2ac054cd6035f71438f798fda25eecfe7c25862d662e78f98
                                                                  • Instruction ID: 73681a439bc1745211ef2151d85e26b5748088fbf8aeaf32eba0d3b54faa9dbe
                                                                  • Opcode Fuzzy Hash: f75a09998b4666b2ac054cd6035f71438f798fda25eecfe7c25862d662e78f98
                                                                  • Instruction Fuzzy Hash: 8F813270A00B068FE724DF6AC44475ABBF5FF88318F108A2DD58A97A50DB78F845CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 101 134ceec-134cf79 DuplicateHandle 102 134cf7d-134cf84 101->102 103 134cf86-134cf8c 102->103 104 134cf8d-134cfaa 102->104 103->104
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0134CF77
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2069795897.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1340000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: e064854688c5ad6afc4adfaf64d8dd2aaefa2bd3056f53eeeb8b3c679e03b2f7
                                                                  • Instruction ID: 210becb39d7d7b4252e596ccc541ae20e32406aa6266d3154fb5886d556d9ac7
                                                                  • Opcode Fuzzy Hash: e064854688c5ad6afc4adfaf64d8dd2aaefa2bd3056f53eeeb8b3c679e03b2f7
                                                                  • Instruction Fuzzy Hash: 7C21E0B5901249DFDB10CFAAD984ADEBFF4FB48320F14801AE918A7350D378A954CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 107 134cef0-134cf79 DuplicateHandle 108 134cf7d-134cf84 107->108 109 134cf86-134cf8c 108->109 110 134cf8d-134cfaa 108->110 109->110
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0134CF77
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2069795897.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1340000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: 5cfbe14b32fc55e179573dfabbad03ed9b4f6fc68edac0568df87dcf48bd07ac
                                                                  • Instruction ID: ecdd1073703b7496615ac9b3d62e7a500a67f249b3e2cb2d81643c237fb64c94
                                                                  • Opcode Fuzzy Hash: 5cfbe14b32fc55e179573dfabbad03ed9b4f6fc68edac0568df87dcf48bd07ac
                                                                  • Instruction Fuzzy Hash: 7521E4B5901249DFDB10CFAAD984ADEBFF4FB48320F14801AE914A3350D378A954CF64
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 113 134aa78-134aac0 114 134aac2-134aac5 113->114 115 134aac8-134aaf7 LoadLibraryExW 113->115 114->115 116 134ab00-134ab1d 115->116 117 134aaf9-134aaff 115->117 117->116
                                                                  APIs
                                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0134A8D9,00000800,00000000,00000000), ref: 0134AAEA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2069795897.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1340000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad
                                                                  • String ID:
                                                                  • API String ID: 1029625771-0
                                                                  • Opcode ID: cb77bee3e01f9772a7328eb64dd33fafd54c98f37aed3a2bdf232446787c1765
                                                                  • Instruction ID: b6c8013d1c197be70eee8490e6a4a729516312676ea283448f837ac8bf7c944e
                                                                  • Opcode Fuzzy Hash: cb77bee3e01f9772a7328eb64dd33fafd54c98f37aed3a2bdf232446787c1765
                                                                  • Instruction Fuzzy Hash: 1C2103B6C003498FEB10CFAAD884ADEFBF5AF88324F14842AD559A7210C375A545CFA4
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 120 1349988-134aac0 122 134aac2-134aac5 120->122 123 134aac8-134aaf7 LoadLibraryExW 120->123 122->123 124 134ab00-134ab1d 123->124 125 134aaf9-134aaff 123->125 125->124
                                                                  APIs
                                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0134A8D9,00000800,00000000,00000000), ref: 0134AAEA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2069795897.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1340000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad
                                                                  • String ID:
                                                                  • API String ID: 1029625771-0
                                                                  • Opcode ID: 072ec02860e4e882130dd649ea6de2f91a7399557c70875a4ff3beeab51554b8
                                                                  • Instruction ID: 993bd8e315429c733c48394c65458be318b6b7bfdffb26ca931242257c573121
                                                                  • Opcode Fuzzy Hash: 072ec02860e4e882130dd649ea6de2f91a7399557c70875a4ff3beeab51554b8
                                                                  • Instruction Fuzzy Hash: 391114B6D043098FEB10CF9AC544B9EFBF4EB48324F10842AE51AA7200C3B5A545CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 128 134a7f8-134a838 129 134a840-134a86b GetModuleHandleW 128->129 130 134a83a-134a83d 128->130 131 134a874-134a888 129->131 132 134a86d-134a873 129->132 130->129 132->131
                                                                  APIs
                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0134A85E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2069795897.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1340000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: 3f14e1f8d1ccbf79333974f3d70166ce081c57bb98b777d5506f95ada3d17adf
                                                                  • Instruction ID: e40c4fe25bce4c833d66d70c878a73e66087c26dc42043616638dffa2de76c36
                                                                  • Opcode Fuzzy Hash: 3f14e1f8d1ccbf79333974f3d70166ce081c57bb98b777d5506f95ada3d17adf
                                                                  • Instruction Fuzzy Hash: FB11DFB6C006498FEB10CF9AC444B9EFFF4EB88624F10852AD519A7210D3B9A545CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2068867224.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fdd000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a3891b9d55655038f259b78eb675ce2055b7154619c6538fcaf9ce6b30123748
                                                                  • Instruction ID: f381bb3db5706898c41c43501221d195ea0443eab8c241e06f9ea66cdfd57f10
                                                                  • Opcode Fuzzy Hash: a3891b9d55655038f259b78eb675ce2055b7154619c6538fcaf9ce6b30123748
                                                                  • Instruction Fuzzy Hash: 27210672504244EFDB05DF14D9C0B26BF66FB94324F28C56AE9090B356C336E856EAA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2068867224.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fdd000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3707a9807aa3c8e6b5de4cbb0900a4d69f7d9c5d3e9f2d2695d0b53dcdc38901
                                                                  • Instruction ID: 33ce06eeee5ab036e791b9d721b68978e0a4108b0c9f4b616c67612611cc0284
                                                                  • Opcode Fuzzy Hash: 3707a9807aa3c8e6b5de4cbb0900a4d69f7d9c5d3e9f2d2695d0b53dcdc38901
                                                                  • Instruction Fuzzy Hash: 35213672904204EFDB05DF14E9C0B2ABF62FB84328F28816AD9090A356C336D815DBA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2068900480.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fed000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f25f43aa8bc28736a9b0ad08000ff0fe35d3ce1dafc9c0cf4d119e7db8422a96
                                                                  • Instruction ID: 3f8c364ec8f9b15e1933cb291c338815bf968f601062e8df5c216aa55098e440
                                                                  • Opcode Fuzzy Hash: f25f43aa8bc28736a9b0ad08000ff0fe35d3ce1dafc9c0cf4d119e7db8422a96
                                                                  • Instruction Fuzzy Hash: 4C213776504380DFCB14DF15D9C0B26BB61FB84324F28C56DDA0A0B65AC377D807DA61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2068900480.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fed000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c1cfa5340dcaa526cd089926258d18c79cca37d61b73b2a47ce47c825ab0017b
                                                                  • Instruction ID: b720814aa502d4d7908ea5809759c62e9a42855d874e1fb0096942a1344e50cf
                                                                  • Opcode Fuzzy Hash: c1cfa5340dcaa526cd089926258d18c79cca37d61b73b2a47ce47c825ab0017b
                                                                  • Instruction Fuzzy Hash: 9C216876904384EFDB04DF11D9C0F26BBA1FB84324F20C56DEA094B692C37AD806EB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2068900480.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fed000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 553a764b59ee1fe843af9830a1c75f51b6074f8e3926b5d199e88cc9a7facc5a
                                                                  • Instruction ID: b29d1f8ed38cfdea74cbae60ff538bfbb2df23489ed66c6a8d60010bd13e6f79
                                                                  • Opcode Fuzzy Hash: 553a764b59ee1fe843af9830a1c75f51b6074f8e3926b5d199e88cc9a7facc5a
                                                                  • Instruction Fuzzy Hash: 63215E755093C08FCB12CF24D994715BF71EB46324F28C5EAD9498B6A7C33A980ACB62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2068867224.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fdd000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                                  • Instruction ID: 2ec845e77a94278cfac9167e3f76ffae1c98f2922f7c15ae5e6133cf7ffe110b
                                                                  • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                                  • Instruction Fuzzy Hash: E511E6B6904284DFCB16CF10D5C4B16BF72FB94324F28C5AAD8490B756C33AE856DBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2068867224.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fdd000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                                  • Instruction ID: c627b339f5ea5b8b50c60a87188a6784fa32176ad3dfc1af949f93e011642359
                                                                  • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                                  • Instruction Fuzzy Hash: C211D676904244DFCB16CF14D5C4B16BF72FB94324F28C5AAD9050B356C336D856DB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2068900480.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fed000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                                  • Instruction ID: 5a6d76aecf86c8b48dd731f5d9e5bd4783afb4511674bd96a33b5345dc0046ee
                                                                  • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                                  • Instruction Fuzzy Hash: 5811DD79904280DFCB05CF10CAC0B15FBB1FB84324F24C6ADD9494B6A6C33AD80ADB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2068867224.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fdd000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6ad708d31e2e38298e1cd49e39616dda99f7ca74606e73b006b7e162a046ade0
                                                                  • Instruction ID: d4ae0fd6cfa4718e8f8a7e4a02611a6f9ecf2e059f273ce8e25d15b7961defca
                                                                  • Opcode Fuzzy Hash: 6ad708d31e2e38298e1cd49e39616dda99f7ca74606e73b006b7e162a046ade0
                                                                  • Instruction Fuzzy Hash: E20126728043449AF7204F25CD84B26BF99DF81334F1CC59BEE080A392C7B99840DAB1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2068867224.0000000000FDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FDD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_fdd000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c471cf169aee0e783f9a95def1a55c2e88f4d983b4b3b05c497ac7583bdd17f4
                                                                  • Instruction ID: 4842bd8980fccddd79b0c16070afbfa290bc9c49019d4b4581a1c1a0cce9b047
                                                                  • Opcode Fuzzy Hash: c471cf169aee0e783f9a95def1a55c2e88f4d983b4b3b05c497ac7583bdd17f4
                                                                  • Instruction Fuzzy Hash: 31F062718053449EE7148E15D988B62FF98EB91734F18C55BED085A396C379A844CBB1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2069795897.0000000001340000.00000040.00000800.00020000.00000000.sdmp, Offset: 01340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_1340000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9649a58d3c43796eb34535dfb30987d7e770827aecf968ee181889182b3d9176
                                                                  • Instruction ID: 306c8e16cfd179a9d27c3b0d9002c1f65546b4f837e18111ecd25e52fae63696
                                                                  • Opcode Fuzzy Hash: 9649a58d3c43796eb34535dfb30987d7e770827aecf968ee181889182b3d9176
                                                                  • Instruction Fuzzy Hash: 9BA18B32A0020ACFDF15DFB8C88459EBBF6FF84304B15857AE905AB265DB35E946CB40
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Execution Graph

                                                                  Execution Coverage:11.1%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:311
                                                                  Total number of Limit Nodes:37
                                                                  execution_graph 43236 1758630 43237 1758648 43236->43237 43240 1751440 43237->43240 43242 1751443 43240->43242 43241 17516e6 43242->43241 43249 17517ff 43242->43249 43258 1751a28 43242->43258 43263 1751a1a 43242->43263 43268 17572c8 43242->43268 43273 1757480 43242->43273 43280 17572d8 43242->43280 43251 175170e 43249->43251 43250 17517fc 43250->43242 43251->43250 43252 1757480 4 API calls 43251->43252 43253 17572d8 4 API calls 43251->43253 43254 17572c8 4 API calls 43251->43254 43255 1751a28 4 API calls 43251->43255 43256 1751a1a 4 API calls 43251->43256 43257 17517ff 4 API calls 43251->43257 43252->43251 43253->43251 43254->43251 43255->43251 43256->43251 43257->43251 43261 1751a2f 43258->43261 43259 1751b3a 43259->43242 43260 1751440 4 API calls 43260->43261 43261->43259 43261->43260 43285 1751b42 43261->43285 43265 1751a2f 43263->43265 43264 1751b3a 43264->43242 43265->43264 43266 1751440 4 API calls 43265->43266 43267 1751b42 4 API calls 43265->43267 43266->43265 43267->43265 43270 17572f0 43268->43270 43269 1757334 43269->43242 43270->43269 43314 1757d10 43270->43314 43320 1757d00 43270->43320 43274 175748a 43273->43274 43275 1751440 4 API calls 43274->43275 43277 17574aa 43274->43277 43276 175749a 43275->43276 43443 175f2b0 43276->43443 43452 175f2c0 43276->43452 43277->43242 43282 17572f0 43280->43282 43281 1757334 43281->43242 43282->43281 43283 1757d10 4 API calls 43282->43283 43284 1757d00 4 API calls 43282->43284 43283->43282 43284->43282 43286 1751b69 43285->43286 43302 1751c20 43286->43302 43308 1751c12 43286->43308 43287 1751b85 43298 1755340 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43287->43298 43299 1755330 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43287->43299 43288 1751b8d 43300 1755468 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43288->43300 43301 1755458 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43288->43301 43289 1751b95 43290 1751440 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43289->43290 43291 1751bb5 43290->43291 43292 1751440 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43291->43292 43295 1751be1 43291->43295 43293 1751bd5 43292->43293 43294 1751440 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43293->43294 43294->43295 43295->43261 43298->43288 43299->43288 43300->43289 43301->43289 43303 1751c36 43302->43303 43304 1751440 4 API calls 43303->43304 43305 1751c5a 43304->43305 43306 1751440 4 API calls 43305->43306 43307 1751cea 43305->43307 43306->43305 43307->43307 43309 1751c36 43308->43309 43310 1751440 4 API calls 43309->43310 43312 1751c5a 43310->43312 43311 1751cea 43312->43311 43313 1751440 4 API calls 43312->43313 43313->43312 43315 1757d28 43314->43315 43316 1751440 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43315->43316 43317 1758616 43315->43317 43326 175a100 43315->43326 43335 175a1b3 43315->43335 43316->43315 43317->43270 43322 1757d28 43320->43322 43321 1751440 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43321->43322 43322->43321 43323 1758616 43322->43323 43324 175a100 4 API calls 43322->43324 43325 175a1b3 4 API calls 43322->43325 43323->43270 43324->43322 43325->43322 43328 175a12d 43326->43328 43327 175a1c9 43328->43327 43344 175a671 43328->43344 43358 175a200 43328->43358 43372 175a210 43328->43372 43386 175a448 43328->43386 43400 175a361 43328->43400 43414 175a2fa 43328->43414 43337 175a188 43335->43337 43336 175a1c9 43337->43336 43338 175a671 4 API calls 43337->43338 43339 175a2fa 4 API calls 43337->43339 43340 175a361 4 API calls 43337->43340 43341 175a448 4 API calls 43337->43341 43342 175a210 4 API calls 43337->43342 43343 175a200 4 API calls 43337->43343 43338->43337 43339->43337 43340->43337 43341->43337 43342->43337 43343->43337 43348 175a22a 43344->43348 43345 175a6a0 43345->43328 43346 1751440 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43346->43348 43347 175a2fa GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43347->43348 43348->43345 43348->43346 43348->43347 43349 175a6c4 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43348->43349 43350 175a6c8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43348->43350 43353 175a361 4 API calls 43348->43353 43354 175a671 4 API calls 43348->43354 43355 175a210 4 API calls 43348->43355 43356 175a200 4 API calls 43348->43356 43357 175a448 4 API calls 43348->43357 43429 175de80 43348->43429 43436 175de90 43348->43436 43349->43348 43350->43348 43353->43348 43354->43348 43355->43348 43356->43348 43357->43348 43361 175a215 43358->43361 43359 175a6a0 43359->43328 43360 1751440 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43360->43361 43361->43359 43361->43360 43362 175a6c8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43361->43362 43363 175a361 4 API calls 43361->43363 43364 175a671 4 API calls 43361->43364 43365 175a210 4 API calls 43361->43365 43366 175a200 4 API calls 43361->43366 43367 175a448 4 API calls 43361->43367 43368 175a2fa GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43361->43368 43369 175de90 4 API calls 43361->43369 43370 175de80 4 API calls 43361->43370 43371 175a6c4 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43361->43371 43362->43361 43363->43361 43364->43361 43365->43361 43366->43361 43367->43361 43368->43361 43369->43361 43370->43361 43371->43361 43374 175a22a 43372->43374 43373 1751440 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43373->43374 43374->43373 43375 175a6a0 43374->43375 43376 175a6c4 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43374->43376 43377 175a6c8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43374->43377 43378 175a361 4 API calls 43374->43378 43379 175a671 4 API calls 43374->43379 43380 175a210 4 API calls 43374->43380 43381 175a200 4 API calls 43374->43381 43382 175a448 4 API calls 43374->43382 43383 175a2fa GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43374->43383 43384 175de90 4 API calls 43374->43384 43385 175de80 4 API calls 43374->43385 43375->43328 43376->43374 43377->43374 43378->43374 43379->43374 43380->43374 43381->43374 43382->43374 43383->43374 43384->43374 43385->43374 43389 175a22a 43386->43389 43387 175a6a0 43387->43328 43388 175a2fa GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43388->43389 43389->43387 43389->43388 43390 1751440 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43389->43390 43391 175a361 4 API calls 43389->43391 43392 175a671 4 API calls 43389->43392 43393 175a210 4 API calls 43389->43393 43394 175a200 4 API calls 43389->43394 43395 175a448 4 API calls 43389->43395 43396 175a6c4 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43389->43396 43397 175a6c8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43389->43397 43398 175de90 4 API calls 43389->43398 43399 175de80 4 API calls 43389->43399 43390->43389 43391->43389 43392->43389 43393->43389 43394->43389 43395->43389 43396->43389 43397->43389 43398->43389 43399->43389 43403 175a22a 43400->43403 43401 175a6a0 43401->43328 43402 1751440 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43402->43403 43403->43400 43403->43401 43403->43402 43404 175a6c4 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43403->43404 43405 175a6c8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43403->43405 43406 175de90 4 API calls 43403->43406 43407 175de80 4 API calls 43403->43407 43408 175a361 4 API calls 43403->43408 43409 175a671 4 API calls 43403->43409 43410 175a210 4 API calls 43403->43410 43411 175a200 4 API calls 43403->43411 43412 175a448 4 API calls 43403->43412 43413 175a2fa GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43403->43413 43404->43403 43405->43403 43406->43403 43407->43403 43408->43403 43409->43403 43410->43403 43411->43403 43412->43403 43413->43403 43417 175a22a 43414->43417 43415 175a2fa 4 API calls 43415->43414 43416 175a6a0 43416->43328 43417->43415 43417->43416 43418 1751440 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43417->43418 43419 175a361 4 API calls 43417->43419 43420 175a671 4 API calls 43417->43420 43421 175a210 4 API calls 43417->43421 43422 175a200 4 API calls 43417->43422 43423 175a448 4 API calls 43417->43423 43424 175a2fa 4 API calls 43417->43424 43425 175a6c4 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43417->43425 43426 175a6c8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43417->43426 43427 175de90 4 API calls 43417->43427 43428 175de80 4 API calls 43417->43428 43418->43417 43419->43417 43420->43417 43421->43417 43422->43417 43423->43417 43424->43417 43425->43417 43426->43417 43427->43417 43428->43417 43430 175de9f 43429->43430 43431 175deff 43429->43431 43430->43348 43432 1751440 4 API calls 43431->43432 43433 175e03b 43431->43433 43435 175e0b8 43432->43435 43433->43348 43434 1751440 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43434->43435 43435->43433 43435->43434 43437 175de9f 43436->43437 43438 175deff 43436->43438 43437->43348 43439 1751440 4 API calls 43438->43439 43440 175e03b 43438->43440 43442 175e0b8 43439->43442 43440->43348 43441 1751440 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43441->43442 43442->43440 43442->43441 43448 175f2c0 43443->43448 43444 175f520 43445 1751440 4 API calls 43444->43445 43446 175f52a 43445->43446 43446->43277 43447 1751440 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43447->43448 43448->43444 43448->43447 43449 17572d8 4 API calls 43448->43449 43450 175f541 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43448->43450 43451 175f550 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43448->43451 43449->43448 43450->43448 43451->43448 43456 175f2d5 43452->43456 43453 175f520 43454 1751440 4 API calls 43453->43454 43455 175f52a 43454->43455 43455->43277 43456->43453 43457 1751440 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43456->43457 43458 17572d8 4 API calls 43456->43458 43459 175f541 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43456->43459 43460 175f550 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 43456->43460 43457->43456 43458->43456 43459->43456 43460->43456 43461 61cf250 43462 61cf2b8 CreateWindowExW 43461->43462 43464 61cf374 43462->43464 43465 61c4aa0 DuplicateHandle 43466 61c4b36 43465->43466 43467 61cd0c0 43468 61cd108 LoadLibraryExW 43467->43468 43469 61cd102 43467->43469 43470 61cd139 43468->43470 43469->43468 43471 1750848 43473 175084e 43471->43473 43472 175091b 43473->43472 43476 1751440 4 API calls 43473->43476 43478 17517ff 4 API calls 43473->43478 43479 1751430 43473->43479 43488 61c3750 43473->43488 43492 61c3740 43473->43492 43476->43473 43478->43473 43480 1751433 43479->43480 43481 17513c5 43479->43481 43480->43481 43482 1751a28 4 API calls 43480->43482 43483 1751a1a 4 API calls 43480->43483 43484 17517ff 4 API calls 43480->43484 43485 1757480 4 API calls 43480->43485 43486 17572d8 4 API calls 43480->43486 43487 17572c8 4 API calls 43480->43487 43481->43473 43482->43480 43483->43480 43484->43480 43485->43480 43486->43480 43487->43480 43489 61c375f 43488->43489 43496 61c2f24 43489->43496 43493 61c375f 43492->43493 43494 61c2f24 3 API calls 43493->43494 43495 61c3780 43494->43495 43495->43473 43497 61c2f2f 43496->43497 43500 61c467c 43497->43500 43499 61c5106 43499->43499 43501 61c4687 43500->43501 43502 61c582c 43501->43502 43505 61c74a6 43501->43505 43509 61c74a8 43501->43509 43502->43499 43506 61c74c9 43505->43506 43507 61c74ed 43506->43507 43513 61c7658 43506->43513 43507->43502 43510 61c74c9 43509->43510 43511 61c74ed 43510->43511 43512 61c7658 3 API calls 43510->43512 43511->43502 43512->43511 43514 61c7665 43513->43514 43515 61c769e 43514->43515 43517 61c63ac 43514->43517 43515->43507 43518 61c63b7 43517->43518 43520 61c7710 43518->43520 43521 61c63e0 43518->43521 43520->43520 43522 61c63eb 43521->43522 43528 61c63f0 43522->43528 43524 61c777f 43532 61cc9a0 43524->43532 43541 61cc988 43524->43541 43525 61c77b9 43525->43520 43529 61c63fb 43528->43529 43530 61c8920 43529->43530 43531 61c74a8 3 API calls 43529->43531 43530->43524 43531->43530 43534 61cc9d1 43532->43534 43536 61ccad1 43532->43536 43533 61cc9dd 43533->43525 43534->43533 43549 61ccc18 43534->43549 43553 61ccc08 43534->43553 43535 61cca1d 43557 61cdf18 43535->43557 43563 61cdf09 43535->43563 43536->43525 43542 61cc9a5 43541->43542 43544 61cc9dd 43542->43544 43547 61ccc18 3 API calls 43542->43547 43548 61ccc08 3 API calls 43542->43548 43543 61cca1d 43545 61cdf18 GetModuleHandleW 43543->43545 43546 61cdf09 GetModuleHandleW 43543->43546 43544->43525 43545->43544 43546->43544 43547->43543 43548->43543 43569 61ccc68 43549->43569 43578 61ccc58 43549->43578 43550 61ccc22 43550->43535 43554 61ccc22 43553->43554 43555 61ccc58 2 API calls 43553->43555 43556 61ccc68 2 API calls 43553->43556 43554->43535 43555->43554 43556->43554 43558 61cdf43 43557->43558 43587 61ce470 43558->43587 43559 61cdfc6 43560 61cbbbc GetModuleHandleW 43559->43560 43561 61cdff2 43559->43561 43560->43561 43564 61cdf18 43563->43564 43568 61ce470 GetModuleHandleW 43564->43568 43565 61cdfc6 43567 61cdff2 43565->43567 43592 61cbbbc 43565->43592 43568->43565 43570 61ccc79 43569->43570 43573 61ccc9c 43569->43573 43571 61cbbbc GetModuleHandleW 43570->43571 43572 61ccc84 43571->43572 43572->43573 43577 61ccef2 GetModuleHandleW 43572->43577 43573->43550 43574 61ccc94 43574->43573 43575 61ccea0 GetModuleHandleW 43574->43575 43576 61ccecd 43575->43576 43576->43550 43577->43574 43579 61ccc5d 43578->43579 43580 61cbbbc GetModuleHandleW 43579->43580 43582 61ccc9c 43579->43582 43581 61ccc84 43580->43581 43581->43582 43586 61ccef2 GetModuleHandleW 43581->43586 43582->43550 43583 61ccc94 43583->43582 43584 61ccea0 GetModuleHandleW 43583->43584 43585 61ccecd 43584->43585 43585->43550 43586->43583 43588 61ce4ad 43587->43588 43589 61ce52e 43588->43589 43590 61ce9f8 GetModuleHandleW 43588->43590 43591 61ce9e8 GetModuleHandleW 43588->43591 43590->43589 43591->43589 43593 61cce58 GetModuleHandleW 43592->43593 43595 61ccecd 43593->43595 43595->43567
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7b8b681df4c87c7a01aa39e2d5461de2c537b0833ba9049126cb2d7805a07a91
                                                                  • Instruction ID: ceedb49ed37b4663ac5afbda4b0fa8af7d092ecc71bafdc3a8dca2a8402813cf
                                                                  • Opcode Fuzzy Hash: 7b8b681df4c87c7a01aa39e2d5461de2c537b0833ba9049126cb2d7805a07a91
                                                                  • Instruction Fuzzy Hash: DF630831D10B1A8ADB51EF68C8806A9F7B1FF99310F15C79AE45877121EB70AAC5CF81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 813 6205948-6205965 814 6205967-620596a 813->814 815 6205986-6205989 814->815 816 620596c-6205981 814->816 817 62059a0-62059a3 815->817 818 620598b-620599b 815->818 816->815 820 62059b2-62059b5 817->820 821 62059a5-62059ab 817->821 818->817 825 62059b7-62059ba 820->825 826 62059bf-62059c2 820->826 823 62059c4-62059d2 821->823 824 62059ad 821->824 828 62059d9-62059dc 823->828 824->820 825->826 826->823 827 62059e1-62059e4 826->827 829 62059e6-62059e9 827->829 830 62059ee-62059f1 827->830 828->827 829->830 831 62059f3-62059f6 830->831 832 6205a26-6205a29 830->832 833 6205b21-6205b4b 831->833 834 62059fc-6205a07 831->834 835 6205a38-6205a3b 832->835 836 6205a2b-6205a31 832->836 847 6205b55-6205b58 833->847 834->833 837 6205a0d-6205a17 834->837 839 6205a49-6205a4c 835->839 840 6205a3d-6205a44 835->840 836->825 838 6205a33 836->838 837->833 843 6205a1d-6205a21 837->843 838->835 841 6205a54-6205a57 839->841 842 6205a4e-6205a4f 839->842 840->839 845 6205a66-6205a69 841->845 846 6205a59-6205a5f 841->846 842->841 843->832 845->846 849 6205a6b-6205a6e 845->849 846->831 848 6205a61 846->848 850 6205b62-6205b65 847->850 851 6205b5a-6205b61 847->851 848->845 852 6205a70-6205a79 849->852 853 6205a7a-6205a7d 849->853 854 6205b67-6205b6e 850->854 855 6205b79-6205b7c 850->855 853->821 856 6205a83-6205a86 853->856 857 6205b74 854->857 858 6205c3e-6205c45 854->858 859 6205b9e-6205ba1 855->859 860 6205b7e-6205b82 855->860 861 6205a97-6205a9a 856->861 862 6205a88-6205a8c 856->862 857->855 869 6205bc3-6205bc6 859->869 870 6205ba3-6205ba7 859->870 863 6205c46-6205c84 860->863 864 6205b88-6205b90 860->864 867 6205ab7-6205aba 861->867 868 6205a9c-6205ab2 861->868 865 6205a92 862->865 866 6205b14-6205b20 862->866 887 6205c86-6205c89 863->887 864->863 871 6205b96-6205b99 864->871 865->861 873 6205ac1-6205ac4 867->873 874 6205abc-6205abe 867->874 868->867 875 6205bc8-6205bd9 869->875 876 6205bde-6205be1 869->876 870->863 872 6205bad-6205bb5 870->872 871->859 872->863 883 6205bbb-6205bbe 872->883 877 6205ac6-6205ad6 873->877 878 6205adb-6205ade 873->878 874->873 875->876 879 6205bf2-6205bf5 876->879 880 6205be3-6205bed 876->880 877->878 885 6205ae0-6205afd 878->885 886 6205b02-6205b04 878->886 888 6205bf7-6205bfb 879->888 889 6205c0f-6205c12 879->889 880->879 883->869 885->886 895 6205b06 886->895 896 6205b0b-6205b0e 886->896 892 6205c8b-6205ca2 887->892 893 6205cad-6205cb0 887->893 888->863 894 6205bfd-6205c05 888->894 897 6205c14-6205c18 889->897 898 6205c2c-6205c2e 889->898 920 6206094-620609b 892->920 921 6205ca8 892->921 902 6205cb2-6205cc5 893->902 903 6205cc8-6205ccb 893->903 894->863 900 6205c07-6205c0a 894->900 895->896 896->814 896->866 897->863 901 6205c1a-6205c22 897->901 904 6205c30 898->904 905 6205c35-6205c38 898->905 900->889 901->863 909 6205c24-6205c27 901->909 906 6205cd1-6205cd4 903->906 907 6205d72-6205f16 903->907 904->905 905->847 905->858 910 6205cd6-6205cdb 906->910 911 6205cde-6205ce1 906->911 968 6206052-6206065 907->968 969 6205f1c-6205f23 907->969 909->898 910->911 914 6205ce3-6205cfa 911->914 915 6205d05-6205d08 911->915 914->920 936 6205d00 914->936 918 6205d16-6205d19 915->918 919 6205d0a-6205d11 915->919 918->907 925 6205d1b-6205d1e 918->925 919->918 923 62060a0-62060a2 920->923 921->893 926 62060a4 923->926 927 62060a9-62060ac 923->927 928 6205d20-6205d37 925->928 929 6205d42-6205d45 925->929 926->927 927->887 933 62060b2-62060bb 927->933 928->902 943 6205d3d 928->943 931 6205d47-6205d5e 929->931 932 6205d69-6205d6c 929->932 931->920 947 6205d64 931->947 932->907 937 6206068-620606b 932->937 936->915 940 620606d-6206084 937->940 941 620608f-6206092 937->941 940->914 950 620608a 940->950 941->920 941->923 943->929 947->932 950->941 970 6205f29-6205f5c 969->970 971 6205fdd-6205fe4 969->971 982 6205f61-6205fa8 970->982 983 6205f5e 970->983 971->968 973 6205fe6-6206019 971->973 984 620601b 973->984 985 620601e-620604b 973->985 994 6205fc0-6205fc7 982->994 995 6205faa-6205fbb 982->995 983->982 984->985 985->933 985->968 997 6205fcf-6205fd1 994->997 995->933 997->933
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $
                                                                  • API String ID: 0-3993045852
                                                                  • Opcode ID: 9b168c46783942bfb488f90478514aef1711b3186c10f9b5639fc90507e26033
                                                                  • Instruction ID: 2923ae483509bd27d373d90ff4df64b438931b713e5e368d6932aec8dae4c7c9
                                                                  • Opcode Fuzzy Hash: 9b168c46783942bfb488f90478514aef1711b3186c10f9b5639fc90507e26033
                                                                  • Instruction Fuzzy Hash: 2422B231F1025A8FEF64DBA4C5806AEBBB2FF85310F248469D855EB386DA35DC41CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 921151bd54b130c79915f1f3c749e6ca65ac485633e5ab56f68c30ac5f8f2aff
                                                                  • Instruction ID: 221a4283f73f103aafdb0ace8b5ce359556b4c58ab838d607e650f18a88f9baf
                                                                  • Opcode Fuzzy Hash: 921151bd54b130c79915f1f3c749e6ca65ac485633e5ab56f68c30ac5f8f2aff
                                                                  • Instruction Fuzzy Hash: C5E22A34E1021ACFDB64DB68C488A9DB7F2EF89344F5485AAD809AB395DB70DD81CF41
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6b196b138808162120d2f4bbf9f2ab65a5b2c2cdfedf5c75db2c1304e8152ecc
                                                                  • Instruction ID: 3fbc8b19f4aace5c9fba9cce52626329f4f0cd678c034fcb423d3995f6be14ac
                                                                  • Opcode Fuzzy Hash: 6b196b138808162120d2f4bbf9f2ab65a5b2c2cdfedf5c75db2c1304e8152ecc
                                                                  • Instruction Fuzzy Hash: B5628E30B202069FEB54DB68C554BADBBF2EF84350F148429E806EB386DB75EC41CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 196a88f5e83b90987cad76077981cab361a282d4e0434af3399730501dddcee1
                                                                  • Instruction ID: 630ac76281bc6781a4bb59266e87029494bdd1321074a693729a86e859140c75
                                                                  • Opcode Fuzzy Hash: 196a88f5e83b90987cad76077981cab361a282d4e0434af3399730501dddcee1
                                                                  • Instruction Fuzzy Hash: DA52B370F2010A8FEF64DBA8D4907ADB7F6EB85350F208529E805EB396DB75DC418B91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b54e0f562055c6f5316f1c54643fc01df9503fae2a45cd6d9b6844516f34bc21
                                                                  • Instruction ID: 22aed15a2ad101decfdb5b032ed87fa53075be557f35ae6142a6960d98f7c731
                                                                  • Opcode Fuzzy Hash: b54e0f562055c6f5316f1c54643fc01df9503fae2a45cd6d9b6844516f34bc21
                                                                  • Instruction Fuzzy Hash: B7426430F1120A8FEB54DBA8D4947ADBBF6EF88350F108529E905EB395DE74DC418B91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e5230389ad8155bf98c6583a9e089bcb37b543f36a48ce7e68db0588031de859
                                                                  • Instruction ID: a7eda58c96ff928219e767ccb45a8dbecee71671ccfb554bea14d54fe3a0e653
                                                                  • Opcode Fuzzy Hash: e5230389ad8155bf98c6583a9e089bcb37b543f36a48ce7e68db0588031de859
                                                                  • Instruction Fuzzy Hash: CD028F30F1021A8FEF54EB74D4547AEB7F2AF84250F158469D806EB38AEE78DC458B91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5b7ceda16a2106daa9ad58f455760e013d966a336031d3e661ba2029e0b43875
                                                                  • Instruction ID: 731f9701bbb5f5a1db05561c54aaea4dae4b1f04880411d6efdfec72d76839a5
                                                                  • Opcode Fuzzy Hash: 5b7ceda16a2106daa9ad58f455760e013d966a336031d3e661ba2029e0b43875
                                                                  • Instruction Fuzzy Hash: B2B14D70E00209CFDF54CFA9D88579DFBF2AF88754F188529E815E7294EBB49885CB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c99ff547e77e8aeb916c7be6144f6ff40ee20df4c85e9e0ca0511864433c96e6
                                                                  • Instruction ID: c074ba46df2105d5ad1ddec5098045042566d452e9c796833e0243f3bd36ec2d
                                                                  • Opcode Fuzzy Hash: c99ff547e77e8aeb916c7be6144f6ff40ee20df4c85e9e0ca0511864433c96e6
                                                                  • Instruction Fuzzy Hash: 4F917C70E002198FDF54CFA9C9857DDFBF2BF88714F148129E806A7294EBB49985CB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 620dc28-620dc49 1 620dc4b-620dc4e 0->1 2 620dc50-620dc62 1->2 3 620dca3-620dca6 1->3 4 620dc71-620dc80 2->4 5 620dc64-620dc69 2->5 6 620dca8-620dcf8 3->6 7 620dcfd-620dd00 3->7 8 620e884-620e8be 4->8 9 620dc86-620dc9e 4->9 5->4 6->7 10 620dd02-620dd04 7->10 11 620dd0f-620dd12 7->11 27 620e8c0-620e8c3 8->27 9->3 12 620e063-620e06f 10->12 13 620dd0a 10->13 14 620dd14-620dd64 11->14 15 620dd69-620dd6c 11->15 21 620e071-620e076 12->21 22 620e07e-620e08d 12->22 13->11 14->15 19 620ddc3-620ddc6 15->19 20 620dd6e-620ddbe 15->20 28 620ddc8-620de18 19->28 29 620de1d-620de20 19->29 20->19 21->22 25 620e093-620e0ad 22->25 26 620e1b6-620e1bb 22->26 59 620e1c6 25->59 67 620e0b3-620e0c5 25->67 26->59 30 620e8d2-620e8d5 27->30 31 620e8c5 27->31 28->29 32 620de40-620de43 29->32 33 620de22-620de3b 29->33 40 620e8d7-620e903 30->40 41 620e908-620e90b 30->41 294 620e8c5 call 620e9e5 31->294 295 620e8c5 call 620e9f8 31->295 43 620de45-620de4a 32->43 44 620de4d-620de50 32->44 33->32 40->41 50 620e90d-620e929 41->50 51 620e92e-620e930 41->51 43->44 45 620de52-620de71 44->45 46 620de76-620de79 44->46 45->46 56 620ded0-620ded3 46->56 57 620de7b-620decb 46->57 48 620e8cb-620e8cd 48->30 50->51 52 620e932 51->52 53 620e937-620e93a 51->53 52->53 53->27 63 620e93c-620e94b 53->63 65 620dee2-620dee5 56->65 66 620ded5-620ded7 56->66 57->56 64 620e1c9-620e1d8 59->64 85 620e9ba-620e9cf 63->85 86 620e94d-620e9b8 call 6206998 63->86 64->2 72 620e1de-620e5f0 64->72 76 620dee7-620df37 65->76 77 620df3c-620df3f 65->77 66->59 74 620dedd 66->74 95 620e0c7-620e0cd 67->95 96 620e0e9-620e0eb 67->96 242 620e876-620e883 72->242 243 620e5f6-620e5ff 72->243 74->65 76->77 81 620df41-620df91 77->81 82 620df96-620df99 77->82 81->82 91 620df9b-620dfad 82->91 92 620dfee-620dff1 82->92 86->85 99 620dfbc-620dfcb 91->99 100 620dfaf-620dfb4 91->100 92->64 104 620dff7-620dffa 92->104 101 620e0d1-620e0dd 95->101 102 620e0cf 95->102 105 620e0f5-620e108 96->105 99->8 110 620dfd1-620dfe9 99->110 100->99 113 620e0df-620e0e7 101->113 102->113 114 620e051-620e053 104->114 115 620dffc-620e04c 104->115 105->59 139 620e10e-620e130 call 6206998 105->139 110->92 113->105 119 620e055 114->119 120 620e05a-620e05d 114->120 115->114 119->120 120->1 120->12 156 620e132-620e137 139->156 157 620e13f-620e14e 139->157 156->157 157->26 160 620e150-620e1b4 157->160 160->59 244 620e601-620e606 243->244 245 620e60e-620e61a 243->245 244->245 245->8 246 620e620-620e634 245->246 249 620e863-620e870 246->249 250 620e63a-620e643 246->250 249->242 249->243 251 620e652-620e65e 250->251 252 620e645-620e64a 250->252 251->8 253 620e664-620e693 251->253 252->251 257 620e6a2-620e6ae 253->257 258 620e695-620e69a 253->258 257->8 259 620e6b4-620e6dd 257->259 258->257 259->249 262 620e6e3-620e6ec 259->262 262->8 263 620e6f2-620e70e 262->263 265 620e853-620e85d 263->265 266 620e714-620e743 263->266 265->249 265->262 266->8 270 620e749-620e753 266->270 270->8 271 620e759-620e770 270->271 273 620e772-620e77d 271->273 274 620e77f-620e7a0 271->274 273->274 274->265 279 620e7a6-620e7c2 call 6206998 274->279 283 620e7d1-620e7dd 279->283 284 620e7c4-620e7c9 279->284 283->8 285 620e7e3-620e84c 283->285 284->283 285->265 294->48 295->48
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4L$4L
                                                                  • API String ID: 0-2971967029
                                                                  • Opcode ID: 3820009f91b4f26b8c18c8a91ec6d1b762d6ab582b771a1598e8d4722f2af99d
                                                                  • Instruction ID: 1ed64294f63c387b0984f5f64810d577cc818d1adc47107d956308e08a1592b4
                                                                  • Opcode Fuzzy Hash: 3820009f91b4f26b8c18c8a91ec6d1b762d6ab582b771a1598e8d4722f2af99d
                                                                  • Instruction Fuzzy Hash: 17727230F1121A8FDB94EB74C490B6DB7F6AF84340F5085A9D809EB389DE759D81CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 998 61ccc68-61ccc77 999 61ccc79-61ccc86 call 61cbbbc 998->999 1000 61ccca3-61ccca7 998->1000 1007 61ccc9c 999->1007 1008 61ccc88-61ccc96 call 61ccef2 999->1008 1002 61ccca9-61cccb3 1000->1002 1003 61cccbb-61cccfc 1000->1003 1002->1003 1009 61cccfe-61ccd06 1003->1009 1010 61ccd09-61ccd17 1003->1010 1007->1000 1008->1007 1017 61ccdd8-61cce98 1008->1017 1009->1010 1011 61ccd19-61ccd1e 1010->1011 1012 61ccd3b-61ccd3d 1010->1012 1015 61ccd29 1011->1015 1016 61ccd20-61ccd27 call 61cbbc8 1011->1016 1014 61ccd40-61ccd47 1012->1014 1020 61ccd49-61ccd51 1014->1020 1021 61ccd54-61ccd5b 1014->1021 1018 61ccd2b-61ccd39 1015->1018 1016->1018 1049 61cce9a-61cce9d 1017->1049 1050 61ccea0-61ccecb GetModuleHandleW 1017->1050 1018->1014 1020->1021 1024 61ccd5d-61ccd65 1021->1024 1025 61ccd68-61ccd71 call 61c53ec 1021->1025 1024->1025 1029 61ccd7e-61ccd83 1025->1029 1030 61ccd73-61ccd7b 1025->1030 1031 61ccd85-61ccd8c 1029->1031 1032 61ccda1-61ccdae 1029->1032 1030->1029 1031->1032 1034 61ccd8e-61ccd9e call 61cba38 call 61cbbd8 1031->1034 1039 61ccdb0-61ccdce 1032->1039 1040 61ccdd1-61ccdd7 1032->1040 1034->1032 1039->1040 1049->1050 1051 61ccecd-61cced3 1050->1051 1052 61cced4-61ccee8 1050->1052 1051->1052
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326833075.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_61c0000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: a04404240d620882131ac879a95b05cdc548d4faffdb1fae81ac12ecc1aa7d47
                                                                  • Instruction ID: 8445811eddafaaf931b39da8cfab04f649e6cb67b698ed5c692a2af5995a5812
                                                                  • Opcode Fuzzy Hash: a04404240d620882131ac879a95b05cdc548d4faffdb1fae81ac12ecc1aa7d47
                                                                  • Instruction Fuzzy Hash: 8A712370A00B058FD7A4DF2AD49576ABBF1FF88320F008A2DD45AD7A50DB74E845CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1055 61c0400-61c040b 1056 61c040d-61c0434 1055->1056 1057 61c0435-61c043f 1055->1057 1059 61c0448-61c044b 1057->1059 1082 61c044d call 61c0400 1059->1082 1083 61c044d call 61c0492 1059->1083 1084 61c044d call 61c04d2 1059->1084 1085 61c044d call 61c03f2 1059->1085 1060 61c0452-61c0454 1061 61c045a-61c045f 1060->1061 1062 61c0456-61c0459 1060->1062 1063 61c0460 1061->1063 1064 61c03f7-61c03fb 1063->1064 1065 61c0462-61c0498 1063->1065 1064->1055 1065->1063 1071 61c049a-61c04b9 1065->1071 1074 61c04bf-61c0516 1071->1074 1075 61c04bb-61c04be 1071->1075 1077 61c051e-61c054c GlobalMemoryStatusEx 1074->1077 1078 61c054e-61c0554 1077->1078 1079 61c0555-61c057d 1077->1079 1078->1079 1082->1060 1083->1060 1084->1060 1085->1060
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326833075.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_61c0000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2940fa5bdc9cad314f46497e50296cd35a6a8439fdfce718f5f102ca80f87386
                                                                  • Instruction ID: ad83bc8c9f572377d70c47c7d1a4e2ea4bc09164443a8074cc0b24780341d3ca
                                                                  • Opcode Fuzzy Hash: 2940fa5bdc9cad314f46497e50296cd35a6a8439fdfce718f5f102ca80f87386
                                                                  • Instruction Fuzzy Hash: F241F272E047558FCB14DBB9D8443AEBBF5EF99220F14866AD809E7240DB749845CBE0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1572 61cf244-61cf2b6 1574 61cf2b8-61cf2be 1572->1574 1575 61cf2c1-61cf2c8 1572->1575 1574->1575 1576 61cf2ca-61cf2d0 1575->1576 1577 61cf2d3-61cf30b 1575->1577 1576->1577 1578 61cf313-61cf372 CreateWindowExW 1577->1578 1579 61cf37b-61cf3b3 1578->1579 1580 61cf374-61cf37a 1578->1580 1584 61cf3b5-61cf3b8 1579->1584 1585 61cf3c0 1579->1585 1580->1579 1584->1585 1586 61cf3c1 1585->1586 1586->1586
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 061CF362
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326833075.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_61c0000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: 6fc5d8efc522c7ca04fd565d2cf26a26dab030b85408e56c7ea59c36f185aba4
                                                                  • Instruction ID: c5bc23eb35cdaf1d9ecd1d3e32337024f8a2aa37997d479ccda009c338b6bb51
                                                                  • Opcode Fuzzy Hash: 6fc5d8efc522c7ca04fd565d2cf26a26dab030b85408e56c7ea59c36f185aba4
                                                                  • Instruction Fuzzy Hash: 2351D3B1D00349EFDB14CFA9C984ADEFBB5BF48310F24852AE819AB210D7719845CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1587 61cf250-61cf2b6 1588 61cf2b8-61cf2be 1587->1588 1589 61cf2c1-61cf2c8 1587->1589 1588->1589 1590 61cf2ca-61cf2d0 1589->1590 1591 61cf2d3-61cf372 CreateWindowExW 1589->1591 1590->1591 1593 61cf37b-61cf3b3 1591->1593 1594 61cf374-61cf37a 1591->1594 1598 61cf3b5-61cf3b8 1593->1598 1599 61cf3c0 1593->1599 1594->1593 1598->1599 1600 61cf3c1 1599->1600 1600->1600
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 061CF362
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326833075.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_61c0000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: 3d3a6ddf13f1a56ba4a008b3af18b72375b1d53daed9d8c838c6d863bcade2cd
                                                                  • Instruction ID: e2d8fca20f94889758ec0f4cfc432375ff6e887dd0d1c3b81028145d8f39559f
                                                                  • Opcode Fuzzy Hash: 3d3a6ddf13f1a56ba4a008b3af18b72375b1d53daed9d8c838c6d863bcade2cd
                                                                  • Instruction Fuzzy Hash: D841C2B1D00349DFDB14CF9AC984ADEFBB5BF48310F24952AE819AB210D7759845CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1601 61c4a98-61c4b34 DuplicateHandle 1602 61c4b3d-61c4b5a 1601->1602 1603 61c4b36-61c4b3c 1601->1603 1603->1602
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 061C4B27
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326833075.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_61c0000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: 987c5ea621e2079c7cf42b62cf0853e4c1d1e14a9e633d17ec728c9843099d28
                                                                  • Instruction ID: 6724876dada1ba34d747f633c4803fc7b2f798301176483bd0b472395d008868
                                                                  • Opcode Fuzzy Hash: 987c5ea621e2079c7cf42b62cf0853e4c1d1e14a9e633d17ec728c9843099d28
                                                                  • Instruction Fuzzy Hash: B621D2B5D00209DFDB10CFAAD984BDEBBF4EB48320F14841AE919A7210D374A954CF61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1606 61c4aa0-61c4b34 DuplicateHandle 1607 61c4b3d-61c4b5a 1606->1607 1608 61c4b36-61c4b3c 1606->1608 1608->1607
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 061C4B27
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326833075.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_61c0000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: aa539c52019a14f6271597eb9e277bda43d0382ad835cfaf9c11736fd1398f09
                                                                  • Instruction ID: 59b75e6db8149577c5bbe355d6007ee0114690411603d0a8a2e057b101cc3223
                                                                  • Opcode Fuzzy Hash: aa539c52019a14f6271597eb9e277bda43d0382ad835cfaf9c11736fd1398f09
                                                                  • Instruction Fuzzy Hash: 3021B3B5900249DFDB10CF9AD984ADEBBF8EB48320F14841AE918A7250D374A954CF65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1611 61c04d2-61c054c GlobalMemoryStatusEx 1613 61c054e-61c0554 1611->1613 1614 61c0555-61c057d 1611->1614 1613->1614
                                                                  APIs
                                                                  • GlobalMemoryStatusEx.KERNELBASE ref: 061C053F
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326833075.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_61c0000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: GlobalMemoryStatus
                                                                  • String ID:
                                                                  • API String ID: 1890195054-0
                                                                  • Opcode ID: 40445b4827d80312bd26f18982f20346d9dcd43deaecdaa39b11e3345c849105
                                                                  • Instruction ID: fdebfc9e7d93036ff8ff34ae73fbbcdbca749cd2cba5589958c8a54352a44a75
                                                                  • Opcode Fuzzy Hash: 40445b4827d80312bd26f18982f20346d9dcd43deaecdaa39b11e3345c849105
                                                                  • Instruction Fuzzy Hash: 8E1114B2C0065ADBCB10CF9AC9447DEFBF4AF48720F14816AE918B7240D778A954CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1617 61cd0ba-61cd100 1619 61cd108-61cd137 LoadLibraryExW 1617->1619 1620 61cd102-61cd105 1617->1620 1621 61cd139-61cd13f 1619->1621 1622 61cd140-61cd15d 1619->1622 1620->1619 1621->1622
                                                                  APIs
                                                                  • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 061CD12A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326833075.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_61c0000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad
                                                                  • String ID:
                                                                  • API String ID: 1029625771-0
                                                                  • Opcode ID: 28d99d47be99f3a7b4bdb6182751b16940853ce67835afe45e107b7476dbe975
                                                                  • Instruction ID: a1205aba8cfcf444980036cd06f2d7dc809f54a0f79a8548f30bcae4bd586d50
                                                                  • Opcode Fuzzy Hash: 28d99d47be99f3a7b4bdb6182751b16940853ce67835afe45e107b7476dbe975
                                                                  • Instruction Fuzzy Hash: 901123B6D003099FDB10CFAAD984ADEFBF4AF88320F10852EE519A7200C775A545CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1625 61cd0c0-61cd100 1626 61cd108-61cd137 LoadLibraryExW 1625->1626 1627 61cd102-61cd105 1625->1627 1628 61cd139-61cd13f 1626->1628 1629 61cd140-61cd15d 1626->1629 1627->1626 1628->1629
                                                                  APIs
                                                                  • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 061CD12A
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326833075.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_61c0000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad
                                                                  • String ID:
                                                                  • API String ID: 1029625771-0
                                                                  • Opcode ID: 814b18ec9bd7ef412b0c70c52685f6dc6e1a13f10eef348621dbda46de767d80
                                                                  • Instruction ID: e969815004e18c0706a00dbf44c8d1088f8257b2687722c8c67a259fb54c55c5
                                                                  • Opcode Fuzzy Hash: 814b18ec9bd7ef412b0c70c52685f6dc6e1a13f10eef348621dbda46de767d80
                                                                  • Instruction Fuzzy Hash: 9211F3B6D003098FDB10CF9AD984ADEFBF4AF88320F10842EE519A7200C775A545CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1632 61cbbbc-61cce98 1634 61cce9a-61cce9d 1632->1634 1635 61ccea0-61ccecb GetModuleHandleW 1632->1635 1634->1635 1636 61ccecd-61cced3 1635->1636 1637 61cced4-61ccee8 1635->1637 1636->1637
                                                                  APIs
                                                                  • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,061CCC84), ref: 061CCEBE
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326833075.00000000061C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_61c0000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: 28865361b7356e4151f88709a36c81eb0efb5d198cf24502e674e56070ad818d
                                                                  • Instruction ID: f6d25bc96011718ed464055c6fffc82ef73d3501be4133ce5310c1a720802895
                                                                  • Opcode Fuzzy Hash: 28865361b7356e4151f88709a36c81eb0efb5d198cf24502e674e56070ad818d
                                                                  • Instruction Fuzzy Hash: 571132B6C007498FCB10CF9AC444B9EFBF4EF88220F10881AD419A7200D374A945CFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1662 175f7ab-175f7e6 1677 175f7e9 call 175fc90 1662->1677 1678 175f7e9 call 175fc80 1662->1678 1664 175f7ef-175f80e 1668 175f816-175f840 call 1750350 1664->1668 1672 175f861 1668->1672 1673 175f842-175f85f 1668->1673 1674 175f873-175f87a 1672->1674 1673->1674 1677->1664 1678->1664
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: |
                                                                  • API String ID: 0-2343686810
                                                                  • Opcode ID: 5ab29eb1bb2eb88093b26deb88546a11bfb4aca5a28de7305535aad8fea703f7
                                                                  • Instruction ID: e84308f83d23003b5acff121854aa4fe40ce1061e2df0a0c67b1173792ff5959
                                                                  • Opcode Fuzzy Hash: 5ab29eb1bb2eb88093b26deb88546a11bfb4aca5a28de7305535aad8fea703f7
                                                                  • Instruction Fuzzy Hash: FA21AE70B042509FDB54DB78C808B5EBBF1AF49700F0184AEE94AE73A1EB75A900CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1679 175f7c8-175f7e6 1693 175f7e9 call 175fc90 1679->1693 1694 175f7e9 call 175fc80 1679->1694 1680 175f7ef-175f80e 1684 175f816-175f840 call 1750350 1680->1684 1688 175f861 1684->1688 1689 175f842-175f85f 1684->1689 1690 175f873-175f87a 1688->1690 1689->1690 1693->1680 1694->1680
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: |
                                                                  • API String ID: 0-2343686810
                                                                  • Opcode ID: 1badb7297029a3fad5e61335b7ac115d356f2aef8449db15b9ab8e03a63b8cbe
                                                                  • Instruction ID: a32156874c6a9f52e1cf4c7b86f3209489add8913d6102bbe99683461e3ad23d
                                                                  • Opcode Fuzzy Hash: 1badb7297029a3fad5e61335b7ac115d356f2aef8449db15b9ab8e03a63b8cbe
                                                                  • Instruction Fuzzy Hash: 49116074F402259FDB44DB78C804B6EBBF1AF4C710F104469E90AD7394DB75AD008B94
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cc069f82057e7bdd68b33f1ab8bbe39ba27388739947753c332a99b9804d55ec
                                                                  • Instruction ID: 2265950107ea8227c766bd6348f410ff233dc365905f103358e46fefb3fc30cf
                                                                  • Opcode Fuzzy Hash: cc069f82057e7bdd68b33f1ab8bbe39ba27388739947753c332a99b9804d55ec
                                                                  • Instruction Fuzzy Hash: 47328430B002058BDB6A6778945827DB6F3FBC9381B60583DE906DB389DEB5DC468792
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4e33461109b448f71d54b84ddfad8aef7473ea64a0797d7a4236f7743bda391d
                                                                  • Instruction ID: 4853ae945915211da8eae97b7cddf41ee151f90549c473fbd1d98e47580693bb
                                                                  • Opcode Fuzzy Hash: 4e33461109b448f71d54b84ddfad8aef7473ea64a0797d7a4236f7743bda391d
                                                                  • Instruction Fuzzy Hash: 8D328530B002058BCB6A6778D45827DB6F3FBC9381B60583DE906DB389DEB5DC468792
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 964aaa76e7e6b69040955ebfb4aab1f658c7e9697719e1b12bbc42d727f515f6
                                                                  • Instruction ID: 56eb4e96c09ec37286057c3978457220c7891d55df34e87f28c9651eabf190c0
                                                                  • Opcode Fuzzy Hash: 964aaa76e7e6b69040955ebfb4aab1f658c7e9697719e1b12bbc42d727f515f6
                                                                  • Instruction Fuzzy Hash: 39E18130E2020A8FEB64DB79D4946AEB7F2FF88341F208529D805EB395DF759845CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d7ad002feb40b781c5dca3bb317368b0a7e7fa3ecb97bb60ff7a62c4375e816b
                                                                  • Instruction ID: 35b828b63f8b8776df6ac71a3539e6f8f4f09ec3137d9f67cc20b9150efed010
                                                                  • Opcode Fuzzy Hash: d7ad002feb40b781c5dca3bb317368b0a7e7fa3ecb97bb60ff7a62c4375e816b
                                                                  • Instruction Fuzzy Hash: 70D19E34B002058FDB55DB68D9807AEFBB2EF88310F108679E909DB295EBB4D945CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 783a133fa34df47add30574068711d22b561c03b4b5e1f06c580a8b56cb00f8a
                                                                  • Instruction ID: b6529e0c268a592863d934e90a773a3d994cee2242cfd09bd508ad9073904c06
                                                                  • Opcode Fuzzy Hash: 783a133fa34df47add30574068711d22b561c03b4b5e1f06c580a8b56cb00f8a
                                                                  • Instruction Fuzzy Hash: 27D17130B102199FDB54DBB8C854BAEBBF6BF88740F208469E905EB395CE749C458F91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4810fa322addc4d0075158462e926c417f2ea295e34e26ff4bb6177d10d24ea8
                                                                  • Instruction ID: 7827dc07ace5e06985b3d8e7475e3744297daed65bb0cf33ccd2e83c854aec5d
                                                                  • Opcode Fuzzy Hash: 4810fa322addc4d0075158462e926c417f2ea295e34e26ff4bb6177d10d24ea8
                                                                  • Instruction Fuzzy Hash: 2AC1C170B002169FDB55DB68C880A7EFBA6EFC8310F248565D919DB39ADA70EC42C7D1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ae76191d27ca021f55b76b073be43bdcbe9c7b2796c61835d2d682e367ac1b2c
                                                                  • Instruction ID: 8ee725c1032a502ddc3c66832353d4cda2c3b3030deaa6a6067bc5871ccc21c7
                                                                  • Opcode Fuzzy Hash: ae76191d27ca021f55b76b073be43bdcbe9c7b2796c61835d2d682e367ac1b2c
                                                                  • Instruction Fuzzy Hash: D7C16C34A041058FDB45DB68D498AADFBF2EF88350F248569E906E7395DFB4DC42CBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 71b996fcd5a792eae0f27970f9fcd5fd14bc471e87f44575110b198a3b1f3154
                                                                  • Instruction ID: 37716da88084896188874a00b4d5c64a031418ff1f382ed72f4ad73cfe243af5
                                                                  • Opcode Fuzzy Hash: 71b996fcd5a792eae0f27970f9fcd5fd14bc471e87f44575110b198a3b1f3154
                                                                  • Instruction Fuzzy Hash: 65B1B234F2010A8BFFA4DAA8C4947AEB6F6EB89341F604425E905E73C6DE75DC418B51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cf8d1cdfb07154205494366d043cba3a986575bb54e04a00f45cc58dbad27c3d
                                                                  • Instruction ID: 2e5552b224f93d1b26815db3725a96d1ee3c4e5cac3b2e6ef4179c8790a15e28
                                                                  • Opcode Fuzzy Hash: cf8d1cdfb07154205494366d043cba3a986575bb54e04a00f45cc58dbad27c3d
                                                                  • Instruction Fuzzy Hash: DDB1A330A001098FDFA6CB6CC4807ADFBF1EB46316FA88966E845DB257D674DD81CB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 878b652b4f937d3ffb191906cf6c918c43b578eea77ad7f5b97eeeb0b0878b45
                                                                  • Instruction ID: 921c8bd64e63a8621f83862bb3a6e1a71e314e817aa196f7ef2a56730d3db39e
                                                                  • Opcode Fuzzy Hash: 878b652b4f937d3ffb191906cf6c918c43b578eea77ad7f5b97eeeb0b0878b45
                                                                  • Instruction Fuzzy Hash: 73A1B430B1124A8FEB55EBB8C4547AEB7F2AFC5300F158429D90ADB385EF749C468791
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 46b2c2beb77d936d437f09e5b0bc91db78a398602fef84a87386ff8252205c40
                                                                  • Instruction ID: 53df810cec0e09703fdf569e82c6da166f4f5695d9c915f66d1f3d5f9dfb5710
                                                                  • Opcode Fuzzy Hash: 46b2c2beb77d936d437f09e5b0bc91db78a398602fef84a87386ff8252205c40
                                                                  • Instruction Fuzzy Hash: EBC1FD30E1125A8FEB64DB65D890BDEB7F2BF89340F1045A9D80AA7385DB709D81CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 538ed47290fbbc092179ded8ac78bf8ce9a1f4e7f870f7d4784248b1fc6ed5b6
                                                                  • Instruction ID: cfcd7d23aaa9e9b27c4dd75dabc6f67625f852fb06e51c013f0752ce10182bc0
                                                                  • Opcode Fuzzy Hash: 538ed47290fbbc092179ded8ac78bf8ce9a1f4e7f870f7d4784248b1fc6ed5b6
                                                                  • Instruction Fuzzy Hash: 6CB13B70E00209CFDB50CFA9D98579DFBF2BF48754F188129E819A7294EBB49885CB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e5c8e072cea8f56718ef9429bf3f19ae3fa89b2c7f53c661abd694101fa97504
                                                                  • Instruction ID: 1392ce593c4fc83552bc1ece8cb7bf06eb7e708e4a090406f5e755a350033812
                                                                  • Opcode Fuzzy Hash: e5c8e072cea8f56718ef9429bf3f19ae3fa89b2c7f53c661abd694101fa97504
                                                                  • Instruction Fuzzy Hash: 8A815030F1124A8BEB54EBB8C55476EB7F6AFC9340F108529D90AEB385EE74DC428791
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b1bfeb7dee60e35bfdbd4db94ed045eed76c3e9f9e14ef3b163aafc658cbd185
                                                                  • Instruction ID: bb2622d492da6e073bfea781238aa9ff1d488162a61ff2cd46b959b59bebccf9
                                                                  • Opcode Fuzzy Hash: b1bfeb7dee60e35bfdbd4db94ed045eed76c3e9f9e14ef3b163aafc658cbd185
                                                                  • Instruction Fuzzy Hash: D161E472F101224BDF549A7DC88466FBADBAFC4210B15447AE80EDB365DEA9DC0287D1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8c2e3a0784ccc3acf25505f9c409dacbc682e37ae7e7c6c2c4a5d8442f32a370
                                                                  • Instruction ID: 96bb1e8e8f2fb53eae15ebd5a811071b7ae0f7d71c2ac1c1f086139d827162f0
                                                                  • Opcode Fuzzy Hash: 8c2e3a0784ccc3acf25505f9c409dacbc682e37ae7e7c6c2c4a5d8442f32a370
                                                                  • Instruction Fuzzy Hash: 58915C70E00219DFDF54CFA9C98579DFBF1BF48714F148129E806A7254EBB49985CB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7bff6c5a16f8e28903d734cbc62f00236e9923fceb4d5ecd29f1cc540fc38ad7
                                                                  • Instruction ID: 68697e0cb846c5123bc32623696e19be8c904badc8dd477a9a545c9c4a28b20f
                                                                  • Opcode Fuzzy Hash: 7bff6c5a16f8e28903d734cbc62f00236e9923fceb4d5ecd29f1cc540fc38ad7
                                                                  • Instruction Fuzzy Hash: FE815030B102599FDB54DFB8C854BAEBBF6BF88740F204469E805EB395DE749C458B81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 836242dd74b772ef4ba99f81aafa21ab51aa1125136d4f9f5501552ca6eb2830
                                                                  • Instruction ID: fb02d129ea18a4abae829dfe0f244af0171e86232da62bcc1e797b095f881b10
                                                                  • Opcode Fuzzy Hash: 836242dd74b772ef4ba99f81aafa21ab51aa1125136d4f9f5501552ca6eb2830
                                                                  • Instruction Fuzzy Hash: DF913D30E1061ACBDB60DF68C890B9DB7B1FF85310F20C599D949BB295DB70AA85CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5036f80bc1f0679443eff3621815ac274179e9cd7a782c60f6c96ed1d939795d
                                                                  • Instruction ID: 9d902e7cb3443dbfea6feb4e966071fb18aec8c88cac1656d6c90427a89fcb20
                                                                  • Opcode Fuzzy Hash: 5036f80bc1f0679443eff3621815ac274179e9cd7a782c60f6c96ed1d939795d
                                                                  • Instruction Fuzzy Hash: 5B712030B102099FDB54EBA8D594AADBBF6FF88300F148429E905EB395DB70ED46CB51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0dd7eb1e9354772053d924a9be26411a6e4a1f049dc5173a83fb54da102cc591
                                                                  • Instruction ID: 61296a931848f3331429cf665c2b0a512897136679ac3eba2cfdfc126e72e18f
                                                                  • Opcode Fuzzy Hash: 0dd7eb1e9354772053d924a9be26411a6e4a1f049dc5173a83fb54da102cc591
                                                                  • Instruction Fuzzy Hash: BF714E30B102098FDB54EBA8C694AADB7F6FF88300F148529D805EB395DB70ED46CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ab5db7ecbdd6576036eb8ac5aefb21075943b27b0f982526a12bc46e71608fac
                                                                  • Instruction ID: 292d824789212216d4ac5b9bbbf19e29d9515cb7ded7c0a22ad01e36bc0276b2
                                                                  • Opcode Fuzzy Hash: ab5db7ecbdd6576036eb8ac5aefb21075943b27b0f982526a12bc46e71608fac
                                                                  • Instruction Fuzzy Hash: DF913E34E1061ACBDB60DF64C890B9DB7B1FF85300F20C599D949BB295DB70AA85CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 699f6b1acfc1c699da936b0fd28afd0a0cbdae4f48c2a0ff3a08ed08d3ed3d74
                                                                  • Instruction ID: 2ee4423dcb747f9d2ad29be56b25106821366165d244cb351fdbbff7115be492
                                                                  • Opcode Fuzzy Hash: 699f6b1acfc1c699da936b0fd28afd0a0cbdae4f48c2a0ff3a08ed08d3ed3d74
                                                                  • Instruction Fuzzy Hash: EB91FD74E1125A8FEBA4DB64D890BEDB7F2BF89340F1044A9D809A7389DB705D81CF91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5b288a848893a9aa9b83222a5f1ada293691419a61c4e6c71fdb3d1abcd63ea6
                                                                  • Instruction ID: 4f97c399d5f8ba8a53151c736ef9bcebba6c2b730ebd6c65320c9beb60a323cf
                                                                  • Opcode Fuzzy Hash: 5b288a848893a9aa9b83222a5f1ada293691419a61c4e6c71fdb3d1abcd63ea6
                                                                  • Instruction Fuzzy Hash: 3A516360B041155BEBA562FCC85477FAAAADBC9390F605439E90AC73C7CDF8CC4143A2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2378ba58f57839f15ebb4b22853bdc48c55e3d67603bab712e5269a656e35507
                                                                  • Instruction ID: 175e461592aad7100c6d64448f0d79d00662296632ed12ee7276fef7bde34bf7
                                                                  • Opcode Fuzzy Hash: 2378ba58f57839f15ebb4b22853bdc48c55e3d67603bab712e5269a656e35507
                                                                  • Instruction Fuzzy Hash: EC515060B041155BEBA562FCC894B7FA9AADBC9390F605439E90AC73C7CDF8CC4143A2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8ab8dab5714d02e185291c0b97f5bedd8e34f3635bfb7a1d0a5e11f8a4f50634
                                                                  • Instruction ID: a6d712e48af9259c48287279ec501fc821f81f953ff452a509b86b63c796b100
                                                                  • Opcode Fuzzy Hash: 8ab8dab5714d02e185291c0b97f5bedd8e34f3635bfb7a1d0a5e11f8a4f50634
                                                                  • Instruction Fuzzy Hash: 33512131A012098FDB64AFB8E4446ADFBB2EF88315F208879E906D7255DF758C45CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6325d148deb6d2cc058b7079fb817d204bb83bc8538eee9b51040ac4d08959af
                                                                  • Instruction ID: 1a015d63c686ccf0562481aadc8e50f9fee2659289ff02ca73dc75478e677959
                                                                  • Opcode Fuzzy Hash: 6325d148deb6d2cc058b7079fb817d204bb83bc8538eee9b51040ac4d08959af
                                                                  • Instruction Fuzzy Hash: 0C714B70E00259DFDF54CFA9C88479EFBF2BF88714F148129E916A7254EBB49881CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 56077ec446b8bbdc2db286821aef5c0471254bc484c5e314e44c1a3ee5596219
                                                                  • Instruction ID: 3516fadadbd306b1fc5a476f014cbd9330f69c103927ee1f5dbd0b7514dab3d6
                                                                  • Opcode Fuzzy Hash: 56077ec446b8bbdc2db286821aef5c0471254bc484c5e314e44c1a3ee5596219
                                                                  • Instruction Fuzzy Hash: F5714A70E00259DFDF54CFA9C88479DFBF1BF88714F148129E916AB254EBB49881CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 299ebddd2e70f1feef3f951693b9f13d1fce48b66422e08ca8a53417e8486415
                                                                  • Instruction ID: e9ea9d43aee1a1515153443173249f30bb95eb28d040c8b2dab9347f2afefd05
                                                                  • Opcode Fuzzy Hash: 299ebddd2e70f1feef3f951693b9f13d1fce48b66422e08ca8a53417e8486415
                                                                  • Instruction Fuzzy Hash: 93518130F102199FEB549BB5C8557AEBAF6EF88340F208429E906EB3D5DEB44D058F91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7ee06d17a8a619b8102e8126768d7c63db1133c76e10929d7a52877b10488a28
                                                                  • Instruction ID: c133d36304ce7fa2156e38a7e2384e7303df7eea3089645678fea6f0aca2148a
                                                                  • Opcode Fuzzy Hash: 7ee06d17a8a619b8102e8126768d7c63db1133c76e10929d7a52877b10488a28
                                                                  • Instruction Fuzzy Hash: 8861A534609342DFCB29AB78E47C41C7FB2BBC5345305582EE516973AAEE780845DB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 977a6191746dbfb9e562c3ede6120175327cd5a25cdd8985e2dac822f9f43931
                                                                  • Instruction ID: 198e969f83e9b66131c734dedb7d63b0b910c227a04087adb7df4d472cd807b8
                                                                  • Opcode Fuzzy Hash: 977a6191746dbfb9e562c3ede6120175327cd5a25cdd8985e2dac822f9f43931
                                                                  • Instruction Fuzzy Hash: 23619534609346DBCB29ABB4E47C41C7FB2BBC4345305592EE516973A9EE780841DB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1ece88b52fe4cd9906ac8b3fe7a7e9ea8e60ca6470e0ca48bcb0de2f0e1e3264
                                                                  • Instruction ID: 4b3f19fd6c2b38217136e1eecbb5b91acd5ea4590de68356b17dd4e9d3e1a6af
                                                                  • Opcode Fuzzy Hash: 1ece88b52fe4cd9906ac8b3fe7a7e9ea8e60ca6470e0ca48bcb0de2f0e1e3264
                                                                  • Instruction Fuzzy Hash: C751D130F002598FDB59DBA8D4506AEFBB2FF85310F50842AE805EB291DBB09C46CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 36a4f543691a49022454963f545919e0f61f0e16b265a5916890d836fc0230e0
                                                                  • Instruction ID: 614b490b0e171cc15251a3dd1fae2dcc9ecba481243228351f846960758c192b
                                                                  • Opcode Fuzzy Hash: 36a4f543691a49022454963f545919e0f61f0e16b265a5916890d836fc0230e0
                                                                  • Instruction Fuzzy Hash: B6511770E002198FDB58CFA9C884B9DFBB2BF88310F548529E815BB351DBB49845CF54
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6cfe84e6da44cf9210627da0ac5e148d9c77811c4e39c74dfab28371c4243d40
                                                                  • Instruction ID: 1381ff87c480a3af931019e3f78487f5488755c337e5237b3a87018be06f5479
                                                                  • Opcode Fuzzy Hash: 6cfe84e6da44cf9210627da0ac5e148d9c77811c4e39c74dfab28371c4243d40
                                                                  • Instruction Fuzzy Hash: 89510674D002598FDB58CFA9C884B9DFBB2BF88310F548519E815BB351DBB4A844CF95
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b2e215234bb633f95899944b066a0fc4183fc7c1774b24b05fe9c3a534a176bc
                                                                  • Instruction ID: ed66263a6bcd9fa16b34fdf536f67399b245c105cd5be11e6e4bd0b53b167c5f
                                                                  • Opcode Fuzzy Hash: b2e215234bb633f95899944b066a0fc4183fc7c1774b24b05fe9c3a534a176bc
                                                                  • Instruction Fuzzy Hash: 4E417471E2060A9FEF70CE99D980AAFFBF1FB44310F104929D555E7651D730A9458F90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 441270e248cd7e5a7e76e56541474dca126050e1a4cf5e44a08ffdd04347465a
                                                                  • Instruction ID: c613dcc3292884c665381e8e7e66ec2b0a0a8cd7de1ca75a100b4138dfdad95c
                                                                  • Opcode Fuzzy Hash: 441270e248cd7e5a7e76e56541474dca126050e1a4cf5e44a08ffdd04347465a
                                                                  • Instruction Fuzzy Hash: F0416270B102598BEB549BB484557AEBAF7AF88340F208429E906EB3D5DEB44C058B91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c4f03c730433ac692d3ab3dce38a6574c754b0d9694c64caa05b631af85efc85
                                                                  • Instruction ID: 7aa5a86c69959b1b721cdec557073dbc2d5963329df2e2ae523ca6fb59543b3d
                                                                  • Opcode Fuzzy Hash: c4f03c730433ac692d3ab3dce38a6574c754b0d9694c64caa05b631af85efc85
                                                                  • Instruction Fuzzy Hash: 6C419970E2020ADFEB64DF75C45465EBBB2FF89340F214929E816EB285DF709985CB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f3a7b9b1f84d705c279139aef07080959e12cf07cd9149c58c8a17d79383f39d
                                                                  • Instruction ID: c827ba3b81e12d42fa4018481e5763a8d8bb63b75c11761bfd6daae58462bcd6
                                                                  • Opcode Fuzzy Hash: f3a7b9b1f84d705c279139aef07080959e12cf07cd9149c58c8a17d79383f39d
                                                                  • Instruction Fuzzy Hash: 4141F330B212068FEB999B7484586AE7BF7AF89240B14447DD806DB386DF74CE46C791
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d396e4d3e51f74497f4d692907745b6c63febeef9257cb008f5c87ea3d424fbf
                                                                  • Instruction ID: 95347f4fea7b225f5d8cdb73a311b0294517f8cb877c3d2b6b221d286128be2a
                                                                  • Opcode Fuzzy Hash: d396e4d3e51f74497f4d692907745b6c63febeef9257cb008f5c87ea3d424fbf
                                                                  • Instruction Fuzzy Hash: AE41EA30E2030A8FEB65DF75C44065EBBB2BF89300F254929D856E7281DB70D886CB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0e545eb86ada028fde374160b98755d4ae4d730f1ed5afdcc6efa49fe6f75f65
                                                                  • Instruction ID: 4ab1b55df775a04570f99832ae2500db4dd2e8765a469db4c0c8ef8f4555539f
                                                                  • Opcode Fuzzy Hash: 0e545eb86ada028fde374160b98755d4ae4d730f1ed5afdcc6efa49fe6f75f65
                                                                  • Instruction Fuzzy Hash: 6031F230B202068FEB99AB78805866F7BF7AFC9684B24447DD806DB386DE70CD45C791
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4b62e5c27caac96e6bdc9b52d13a6c4a567a8b4ee7365a15222da319f9a7d314
                                                                  • Instruction ID: 855c5049be7c364838e452ccda363e08f1b0d59f4d9971b0e37c797a2588ac2b
                                                                  • Opcode Fuzzy Hash: 4b62e5c27caac96e6bdc9b52d13a6c4a567a8b4ee7365a15222da319f9a7d314
                                                                  • Instruction Fuzzy Hash: 6E315471E2011A8FEF608AA9C6C076EFBB1EB45310F648925E855EB286C234D941DFA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8a6515c188217348603cb3416bba1819f041057a16cfa20d657e8db8ac55bb64
                                                                  • Instruction ID: ddf3813b0bbd0122e2fbb51e4004885e8c3067c30f0d37028aee507bbb09c892
                                                                  • Opcode Fuzzy Hash: 8a6515c188217348603cb3416bba1819f041057a16cfa20d657e8db8ac55bb64
                                                                  • Instruction Fuzzy Hash: 0631B234F001068BDFA69ABCD59077EE7B2EB89640F204D39D907DB395DAB4DC428782
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9862ba88097661e521f6cb40eda1e3e9897f7bdb0d5c5b8cc0f66ec4a72933f4
                                                                  • Instruction ID: 34a6a5dcc08b1f2601f08ce8d0de77f33ce4d53c8b521b5d3618e69bc35072da
                                                                  • Opcode Fuzzy Hash: 9862ba88097661e521f6cb40eda1e3e9897f7bdb0d5c5b8cc0f66ec4a72933f4
                                                                  • Instruction Fuzzy Hash: 58310D30B042558FDB99EB78C5546ADB7F2AF88245B500478D906EB398DFB98C42CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: eb0ad0ae6216d415558c9d02d18c283673c54e844e5c668396deb8791db3872f
                                                                  • Instruction ID: b53bd824bc05f037a4af6464fed6c38cbc9a861251436c5f700e91353335ce03
                                                                  • Opcode Fuzzy Hash: eb0ad0ae6216d415558c9d02d18c283673c54e844e5c668396deb8791db3872f
                                                                  • Instruction Fuzzy Hash: 51315230B00155CBDB99EB78C5546AEB7F2AF88245B500478D906EB398DFB5CC41C791
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 068afafe3074aeb2117ec61097dcb2649c8b3d69ee4045997d76272bf52dd6fa
                                                                  • Instruction ID: fc836761562e0c34e50c44f1b9708d6d137e0e0a5aa8ab55980bba1a18489119
                                                                  • Opcode Fuzzy Hash: 068afafe3074aeb2117ec61097dcb2649c8b3d69ee4045997d76272bf52dd6fa
                                                                  • Instruction Fuzzy Hash: A1318130E2061ADFDB59CF64D89469EF7F2BF89300F10851AE906E7742DB71A942CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 477f30a82dca2249cce1c7ac200b297753564e41d243d98c0a8592bab6a04676
                                                                  • Instruction ID: f9dd9ca319ecdc6d694e3cfcb44f856e58d859a4945aef3f0f7749b2b6534294
                                                                  • Opcode Fuzzy Hash: 477f30a82dca2249cce1c7ac200b297753564e41d243d98c0a8592bab6a04676
                                                                  • Instruction Fuzzy Hash: 5841F0B0D00349DFDB14CFA9C580ADEBFB1BF48310F20806AE809AB254DBB59946CF90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 39536c863c9e33d1b0980bb6099c388d310ae0365a4e89efe23d771971eecaa5
                                                                  • Instruction ID: d95e55770c94a537af549f77e103999361c40e0014ae2f9bb003a47b53e6d60f
                                                                  • Opcode Fuzzy Hash: 39536c863c9e33d1b0980bb6099c388d310ae0365a4e89efe23d771971eecaa5
                                                                  • Instruction Fuzzy Hash: 32319471F102164FEB80EBB984447EEBAF59B88660F158029ED05E7385EE74DD4187A1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9be19d50e87a527c84fbb162b2033332637f823c1588837005b818de1e7f197d
                                                                  • Instruction ID: 81d8d04c171c1ab859e7758f97c440e70cbe6ab9a3cbfe0e9cdff07ed33b3fc6
                                                                  • Opcode Fuzzy Hash: 9be19d50e87a527c84fbb162b2033332637f823c1588837005b818de1e7f197d
                                                                  • Instruction Fuzzy Hash: B421F8303083044FC31AAB3DA86062EB6D7EFC9251719453DE54ACB385DE75DC078792
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6f3bad3266c3255ba8467a1c4af81748df59cd0b0f88eccf7c57f26755eed635
                                                                  • Instruction ID: e1247c4d26abc1b910aa53d582cc934a57a14c2d61809986b4429419e78f4b9c
                                                                  • Opcode Fuzzy Hash: 6f3bad3266c3255ba8467a1c4af81748df59cd0b0f88eccf7c57f26755eed635
                                                                  • Instruction Fuzzy Hash: 87317234E1161ADBDB59CF64D85469EF7F2AF89300F10851AE906E7341DB71AD41CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f133b49fe8afed52533cff9103b938a958fe51e7036a07850b37981928088dcd
                                                                  • Instruction ID: cf16475aed589e200cfdbd0c3645f1acff4e7a7d717350b63103321ee97f815f
                                                                  • Opcode Fuzzy Hash: f133b49fe8afed52533cff9103b938a958fe51e7036a07850b37981928088dcd
                                                                  • Instruction Fuzzy Hash: 5131A571F102168FEB80DBB984407EEBBF5AF48650F158029ED05E7385EAB4DD4187A1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 80d9f73ebb166d49970e904204dd89db34e1ffe7113da30d332e12e149df6bc6
                                                                  • Instruction ID: 89f30d7fae4fad54f3cefb0d37f3c5adfcd7a02f2e48da7ae0a5cdde5e261248
                                                                  • Opcode Fuzzy Hash: 80d9f73ebb166d49970e904204dd89db34e1ffe7113da30d332e12e149df6bc6
                                                                  • Instruction Fuzzy Hash: F541DFB0D0034DDFDB14DF99C984ADEBBB5BF48310F208429E909AB254EBB5A945CB94
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e480c4d99ccd9f9562bcb41a2eb5abdfadd6925dd91420c7395f511d990a73f7
                                                                  • Instruction ID: d69f1a89e48211bd321abf8937062a164a0f476a00ff0961fa0c954649bec08b
                                                                  • Opcode Fuzzy Hash: e480c4d99ccd9f9562bcb41a2eb5abdfadd6925dd91420c7395f511d990a73f7
                                                                  • Instruction Fuzzy Hash: D631A235E002568BDFB6EB7C84443ADBBA0EB44325F9408BADC05DB341E7B19981CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3104d4ebeb9c3a8bc74e1315cacef3251d496dd4df9bc26af9eda4f9e42c4c57
                                                                  • Instruction ID: 93e075c71fdf11cec581d51b2dff243697f79136ba14aa1e25659bc633088b42
                                                                  • Opcode Fuzzy Hash: 3104d4ebeb9c3a8bc74e1315cacef3251d496dd4df9bc26af9eda4f9e42c4c57
                                                                  • Instruction Fuzzy Hash: F6319331E1421A8BDB49CFA8C55169DF7B2BFC8350F148629E805FB341DBB19C41CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cc5bf50ed2e0f124a5405ea278dfe5edee5c96225e8469ff06ee6d55eb25f926
                                                                  • Instruction ID: 7532e7b617e2cc177170b07f074d4cb038e699dc17b029aba98417bdb047c6eb
                                                                  • Opcode Fuzzy Hash: cc5bf50ed2e0f124a5405ea278dfe5edee5c96225e8469ff06ee6d55eb25f926
                                                                  • Instruction Fuzzy Hash: B6212432B092958FC356DB3C8854599BFB2AF86314B0440AFD145CB7A2EAB58889C791
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323159043.000000000117D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0117D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_117d000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8c9b0fec18cc3460b1ed9c694ce235d1c66586805fe4a670f2c41516b5b1bb4f
                                                                  • Instruction ID: 65b4c547b490116ef757223e0222aab5685c983c6655a9c747282d46dfddcd59
                                                                  • Opcode Fuzzy Hash: 8c9b0fec18cc3460b1ed9c694ce235d1c66586805fe4a670f2c41516b5b1bb4f
                                                                  • Instruction Fuzzy Hash: C73178755093C48FCB078B64D890715BF71AF46214F2985DAD8898B2A3C33A980ACB62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7d73b083992643bbf91bc5eeadf80e82d04dd0b455e38bf0c178b7c6dfa77164
                                                                  • Instruction ID: d64e256df6209451301d4bd98389fc625460b2f94e08015527cbd691e5ace05b
                                                                  • Opcode Fuzzy Hash: 7d73b083992643bbf91bc5eeadf80e82d04dd0b455e38bf0c178b7c6dfa77164
                                                                  • Instruction Fuzzy Hash: A9217431E0421A9BDB4ACFA9C45169EF7B6BFC9340F148629ED05EB341DBB1AC45CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 72d46c2a11ba52e16f68a02b0a1f5e2644c9b953434342c18680d31a7837cc36
                                                                  • Instruction ID: a4bf39dc639ba7b6d852d8ab5a470dd264453a78f92e4d86f137cdd5eacaa44b
                                                                  • Opcode Fuzzy Hash: 72d46c2a11ba52e16f68a02b0a1f5e2644c9b953434342c18680d31a7837cc36
                                                                  • Instruction Fuzzy Hash: B5210434600107AFEB67E72CE89475D7BA6EB81351F40592AD406CB25AEFB8CC85CBD1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 798a0ab5c867873ef8e99964ccd23e2a8454545f67b5411ca2849aa9335ad9f9
                                                                  • Instruction ID: 32df18adfde58ac5f6995aa5850180454ef1fc50714e9dd63eabf8073e8188bd
                                                                  • Opcode Fuzzy Hash: 798a0ab5c867873ef8e99964ccd23e2a8454545f67b5411ca2849aa9335ad9f9
                                                                  • Instruction Fuzzy Hash: B9214D30B001198FDB98EB78C558AADBBF1AF4C245F1044B8E50AEB3A5DBB59D41CB51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 10dab9171fa0c8f3a0fb2b1b552e5e5005bbe11e72aa6a2337a2040672ecfec8
                                                                  • Instruction ID: 36c047c8d54e4b84d230f27381674be8841c40076f2bdbac36147ac1b2c60997
                                                                  • Opcode Fuzzy Hash: 10dab9171fa0c8f3a0fb2b1b552e5e5005bbe11e72aa6a2337a2040672ecfec8
                                                                  • Instruction Fuzzy Hash: 78213D30B002198FDBA5EB78C5147AEB7F2AF89246F500478D906EB354DFB68D41C791
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fe7444ebc4765e9db820eb6342c9e43b89da10a6b6a071af6f9c400fe84222d3
                                                                  • Instruction ID: 8f81efa5f96c409b5dc7ca45a751cd1156730bf1b646df04857227306c979639
                                                                  • Opcode Fuzzy Hash: fe7444ebc4765e9db820eb6342c9e43b89da10a6b6a071af6f9c400fe84222d3
                                                                  • Instruction Fuzzy Hash: 47215E30B00219CFDBA5EB78C5547ADB7F1AF89246B900478C906EB254DFB68C41CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3322579850.0000000000E5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E5D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_e5d000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e75eebc4634d1d75430c59ceeeda797d423e50cefde7f474eee61c5c096d9bad
                                                                  • Instruction ID: 2ffbd74822ade40398aa5b5c9a92f70e27346eb533e6bbdfe303e8046f676627
                                                                  • Opcode Fuzzy Hash: e75eebc4634d1d75430c59ceeeda797d423e50cefde7f474eee61c5c096d9bad
                                                                  • Instruction Fuzzy Hash: 04214872508304DFDB25DF04DDC0B26BF65FB88329F20896CDD091B256D336D85ACAA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 831e4c50cacb183c0a82b96c71445e83ef807848f90d6d06a6cbb45d6720de25
                                                                  • Instruction ID: 25bda42b66e2aadaec3d21db596f86e9ef012429ab804a2f8e41bd7ab1b5736f
                                                                  • Opcode Fuzzy Hash: 831e4c50cacb183c0a82b96c71445e83ef807848f90d6d06a6cbb45d6720de25
                                                                  • Instruction Fuzzy Hash: 3721A431E00216DBDB59CF64D85059EF7B2BF89350F50C62AEC12FB681DBB09842CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e3bb626b419fa015fb02fb135be2526bb4b670de519fe9df77c631963ea89f04
                                                                  • Instruction ID: 607e824b1cfcd326fdebd196a6b49cbdb79b1f023ced53a25f4b06b7d10cee37
                                                                  • Opcode Fuzzy Hash: e3bb626b419fa015fb02fb135be2526bb4b670de519fe9df77c631963ea89f04
                                                                  • Instruction Fuzzy Hash: 3E21F334600107AFEB63E72CE854B1D7BAAEB80351F50592AD506CB25AEEB8DC418BD1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 56aece379681c07fb9c4e47dcb00b3eab4d6cd8312f7193b74d112015e4dcf56
                                                                  • Instruction ID: 50e5f736558b735841ffd3ae30db03a7e1b1ab5c3bbbb6454a7efc976f7b5625
                                                                  • Opcode Fuzzy Hash: 56aece379681c07fb9c4e47dcb00b3eab4d6cd8312f7193b74d112015e4dcf56
                                                                  • Instruction Fuzzy Hash: C6212C30B001188FDB98EB78C558AADBBF1AF4C245F104478E90AEB3A5DFB59D41CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323159043.000000000117D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0117D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_117d000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 30cb64a255fa9eeed1af7cbc8a7f16cb99d44e9a9bee9bfb6fb5470a4819e8e5
                                                                  • Instruction ID: 37535645ac4a63a17c302d18957f359f79ddd8e0af432cf6fbfac0b719ee4e82
                                                                  • Opcode Fuzzy Hash: 30cb64a255fa9eeed1af7cbc8a7f16cb99d44e9a9bee9bfb6fb5470a4819e8e5
                                                                  • Instruction Fuzzy Hash: 99210071604208EFDF1ADF54E980B26BBB1FF84314F24C56DD90A0A352C37AD446CA62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6a2514969d1cec6bdd15c40c377c014f1abd42d04ea7fb440c47e732aef556f5
                                                                  • Instruction ID: 552b5cc10428ef192bdc7cc185c4bfbef3cbd88dde013709a7970eec8fcde323
                                                                  • Opcode Fuzzy Hash: 6a2514969d1cec6bdd15c40c377c014f1abd42d04ea7fb440c47e732aef556f5
                                                                  • Instruction Fuzzy Hash: 6521BE31A1070A9FDB20CFA9CDC4AAFFBF2FB84200F148929D615E7691D330A8458F90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f61789e59bc92a04dd614c5344bc6159965458466ae64c9ef47221ff2f79e4b8
                                                                  • Instruction ID: e6ae5f924e2e684d1e172cdeba6f044bb59bf51fb7cadece993afff2cd542afc
                                                                  • Opcode Fuzzy Hash: f61789e59bc92a04dd614c5344bc6159965458466ae64c9ef47221ff2f79e4b8
                                                                  • Instruction Fuzzy Hash: 932124307042998FC716EB38D4206AEBBF6EFC5350F00856AE504CB689EE759C45C791
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6b67d7da772d019437f5473ed3f5dc549fa0dee6b1db88d5804c6a2e310cbf42
                                                                  • Instruction ID: 90fed0990890d5960c4059ae41e1ed433fe0aa12fa9680b8a3cac36f966c184e
                                                                  • Opcode Fuzzy Hash: 6b67d7da772d019437f5473ed3f5dc549fa0dee6b1db88d5804c6a2e310cbf42
                                                                  • Instruction Fuzzy Hash: 7111C232F240164FEB84E6788958ABFB7FB9BC8251B104479E806E7384EE71DC0647E1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 953db044d23083794f08576c7d52dfef8a8be170c918596ac0a9d0199af9802d
                                                                  • Instruction ID: dc86cb86ac0bc5887641ad7589c0fb3b8cf5b3c6f62da0c503365e256738d715
                                                                  • Opcode Fuzzy Hash: 953db044d23083794f08576c7d52dfef8a8be170c918596ac0a9d0199af9802d
                                                                  • Instruction Fuzzy Hash: 15216034E1021A9FDF54DB68D9856DEFBF5EB49314F1044AAD90AE7341DA329D40CF90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 26a354a14f7b1d85e849676ba7481e0118c881900182b3467c786d0e404bc82d
                                                                  • Instruction ID: 9f809e2defd8a5c6ca729291cfa381abc15bfe66c1fbb3fd9d0e17e3d500c7ad
                                                                  • Opcode Fuzzy Hash: 26a354a14f7b1d85e849676ba7481e0118c881900182b3467c786d0e404bc82d
                                                                  • Instruction Fuzzy Hash: C7110830E443099FEFA65A799410B6DB660EB81314F10447EF946CF286DAB4DC818BD1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8e1cae1b7fa15d0e49068fa7e3ad6ea2ca35f6480c60f1eab33f4355f2656240
                                                                  • Instruction ID: 4d0dbe7c192cf3e6303067fdbb15760c477fe96fa8e8b7fdbfa2b8cb8c44ee81
                                                                  • Opcode Fuzzy Hash: 8e1cae1b7fa15d0e49068fa7e3ad6ea2ca35f6480c60f1eab33f4355f2656240
                                                                  • Instruction Fuzzy Hash: 9F11A371F002525FCB90AB7858083AEBBEAABD82A1B540439E906D7345FE758851C791
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: aaae911e14a83ba599ce9a5b34164312c0516bdfdf7afae5d7d520d9e223f243
                                                                  • Instruction ID: 0b28efdcd0c41d7687a9459020d7f49377022503cc9196370a5e497c7a25a2b5
                                                                  • Opcode Fuzzy Hash: aaae911e14a83ba599ce9a5b34164312c0516bdfdf7afae5d7d520d9e223f243
                                                                  • Instruction Fuzzy Hash: A8211A74A61105AFDB54DF64DA88D9E7BB6BF48200F114458FD019B2A2CB70D944CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e53abb38728d58fce1c0ec6631f3d4bcd6c8ac382c47f9cc503b1342b243dc6f
                                                                  • Instruction ID: 2b7c00d87352c73818ae7101cfcd90f1ff4665b12deebb2389f8296704777ca7
                                                                  • Opcode Fuzzy Hash: e53abb38728d58fce1c0ec6631f3d4bcd6c8ac382c47f9cc503b1342b243dc6f
                                                                  • Instruction Fuzzy Hash: 3D11C430B402098BEFA65B7DC410B2AB651FB85314F20483AF906CF246DAB4EC818BC1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a6f75698a2e950792d999795798b7610d1418620490dc7ca6ef81787e2e478d1
                                                                  • Instruction ID: c53d8f64351e541cfeb817f5e4a9ad332b32b8cb23d6764dabbfaf8a747b5fd1
                                                                  • Opcode Fuzzy Hash: a6f75698a2e950792d999795798b7610d1418620490dc7ca6ef81787e2e478d1
                                                                  • Instruction Fuzzy Hash: 02016833F342165FBFA81562888537BA6ED97801A0F054035CC02E7286EDB8D80083E2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 26876b30b376d7a1a328aa4984952a4b35f15848519c447e29599145b59bfcdc
                                                                  • Instruction ID: ffec3de1ccdb8210d6768b96c514ea3b1d842dd0bd8847cba68955037ad5ea27
                                                                  • Opcode Fuzzy Hash: 26876b30b376d7a1a328aa4984952a4b35f15848519c447e29599145b59bfcdc
                                                                  • Instruction Fuzzy Hash: 0001FC31B20111ABEB61A17DC85171FE7DACBC9720F20883AEA0EC7382DD26CC4243D4
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9aedc56afece4750726013daaf92bc59ea2662c2d240ab4b5ec70cb9f0c6eda0
                                                                  • Instruction ID: 03d9ac0e799f9578b99879afd3f6fd58544fb7aee78c5a85c12a10e78d1cf275
                                                                  • Opcode Fuzzy Hash: 9aedc56afece4750726013daaf92bc59ea2662c2d240ab4b5ec70cb9f0c6eda0
                                                                  • Instruction Fuzzy Hash: 831112312017008FD3B95734D494B2AB3A6EFCA315F20547DE95647B95CB76E842CB81
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 800dd706a25e45df3c77b5fb6fa5c041179f6b7e13b266792d8ab9d8dfff75f6
                                                                  • Instruction ID: 3b6719e9b28a720f1cf8e44c5bd6e12568d22d1262323feb777193c4b2c8fb53
                                                                  • Opcode Fuzzy Hash: 800dd706a25e45df3c77b5fb6fa5c041179f6b7e13b266792d8ab9d8dfff75f6
                                                                  • Instruction Fuzzy Hash: F021F734A61209EFEB54DF64EA88D9D7BB2BF88300F114458ED019B3A2CB70ED44CB90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 969514a7ad21112581119f3b7dfe5d3aa3219f5a14620b0b8da88db77bd10f9f
                                                                  • Instruction ID: ba8353ed2dfc2bdebb6008539d686805d34e498bcd84130d7158ae3ab97e2beb
                                                                  • Opcode Fuzzy Hash: 969514a7ad21112581119f3b7dfe5d3aa3219f5a14620b0b8da88db77bd10f9f
                                                                  • Instruction Fuzzy Hash: 7801B532F201074FEB94E57C88946BFB6FBDBC8254F10407AE806D7389EDA18C114791
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3322579850.0000000000E5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E5D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_e5d000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                                  • Instruction ID: 71c80f0f0d871cda2a85b25203585911c2c91b3c0b3b5154142346d88eca70d6
                                                                  • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                                  • Instruction Fuzzy Hash: 6D11E676504280CFCB16CF10D9C4B16BF71FB94329F24C6A9DC090B256C33AD85ACBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 12501280a42967374e948b9448afb57a926e232f7b22830e35a50bef74c7a2bb
                                                                  • Instruction ID: cb7556f8de45fd6b844273a61b627e8dc4e14a64501b514cfd88e11c14286fda
                                                                  • Opcode Fuzzy Hash: 12501280a42967374e948b9448afb57a926e232f7b22830e35a50bef74c7a2bb
                                                                  • Instruction Fuzzy Hash: 8501F232B205090BEB75963CD994B2FB3D6EBC9710F14882EE90EC7386DE15DC024384
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a5bc3f8ea65e02999fd2e0a04a4c8453085b23abd4834344da47155d6daa29d2
                                                                  • Instruction ID: abf514e529ef54cfd9cb620e2b2eda1f4ae039f0f090cf18380b47aa69300562
                                                                  • Opcode Fuzzy Hash: a5bc3f8ea65e02999fd2e0a04a4c8453085b23abd4834344da47155d6daa29d2
                                                                  • Instruction Fuzzy Hash: D7018C31E002168FCFA1EFB888842AEFBF5EB58225B54047ADC09E7340E771E941CB91
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b0f5c6e9631cb393f605bd675881c5f64bee3ae6332a37be696d925e326ec1af
                                                                  • Instruction ID: 75e3467d49f1ac7cc29a92c5570c49941179ef46141dc4e383294014b4c3c1a4
                                                                  • Opcode Fuzzy Hash: b0f5c6e9631cb393f605bd675881c5f64bee3ae6332a37be696d925e326ec1af
                                                                  • Instruction Fuzzy Hash: A101D631F1021A1BEB65A679945472FB3E5EB89751F104838E90FC73CADD65DC0243C5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8e45d60cdd321bc35ff428f348e024de47ad27d3e4c150fcc0b412b7071ad6a0
                                                                  • Instruction ID: e7fecc46838cb12d8b9712930d22c94bc9732782332eba0fee56c9759ad4abbb
                                                                  • Opcode Fuzzy Hash: 8e45d60cdd321bc35ff428f348e024de47ad27d3e4c150fcc0b412b7071ad6a0
                                                                  • Instruction Fuzzy Hash: 6411D3B5D016599FDB00CF9AD984ACEFBB4FF48324F10812AE918A7241D3746554CFA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b9e80c016cbbba49d4b17293e0800b29eb321e66b65790da3e5880cfc0b0d187
                                                                  • Instruction ID: b7acd44989aa2b0607fcab7f40724d0ba14a0ae53a47f506da028495d55e10d3
                                                                  • Opcode Fuzzy Hash: b9e80c016cbbba49d4b17293e0800b29eb321e66b65790da3e5880cfc0b0d187
                                                                  • Instruction Fuzzy Hash: D001AD31B201169BEB65A57D981472FF6DADBC9720F10883AEA0EC7382ED65DC4243D5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dea3d9731129c910bf2ce160fd5fd9fdc92ce0b273404668689ed92b8cf7c73b
                                                                  • Instruction ID: dbd24e4bbf981b62d7bc65aaa561147cca6de821aa7ca8785dd0c2a885ee9e8d
                                                                  • Opcode Fuzzy Hash: dea3d9731129c910bf2ce160fd5fd9fdc92ce0b273404668689ed92b8cf7c73b
                                                                  • Instruction Fuzzy Hash: 0F21EEB5D0021A9FCB00CF9AD985ACEFBB4FF48320F10812AE918B7240C378A554CFA4
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 08b188e660c460139436ed15441ba2541dfbfd0670f1df338d645cc531396ece
                                                                  • Instruction ID: cfd4aef45b1545612a1398a3e6c12df4e3d84f773b4d73b35e2ae196a76391fe
                                                                  • Opcode Fuzzy Hash: 08b188e660c460139436ed15441ba2541dfbfd0670f1df338d645cc531396ece
                                                                  • Instruction Fuzzy Hash: F801A2313053004BC765A639A8A076EB6DBEBC9255B49443DD506D7349DFB5DC078392
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c30bd50b68e1ccdfd2624e0b2e72b869ce2f11deb9df699a382c27d20c75583a
                                                                  • Instruction ID: d28d16b77ea4ccd6b5cb709c109e409236d9669ca4651b1994299bb34ea671b4
                                                                  • Opcode Fuzzy Hash: c30bd50b68e1ccdfd2624e0b2e72b869ce2f11deb9df699a382c27d20c75583a
                                                                  • Instruction Fuzzy Hash: 07018130F1021A1BEB65A6799454B2FB3E6EB89751F504839E90ECB3CAED65DC0243C5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 561efc2c2881ec0b0b269f11cce5724ad84ddf3b2daea0597ebc1fa5e600ac94
                                                                  • Instruction ID: 3574390250e99a000e6eef5c287b432b268cc2782c0840c160f3b8ba89ae386b
                                                                  • Opcode Fuzzy Hash: 561efc2c2881ec0b0b269f11cce5724ad84ddf3b2daea0597ebc1fa5e600ac94
                                                                  • Instruction Fuzzy Hash: D101AF31B2011A4BEB79953D9550B2FB3DAEBC9B10F208839E90EC7386DE65DC024385
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 91e2f3eec26f55bf2b5bf956f11a8879683c002a58f1b6de5a4c0a443d51cf44
                                                                  • Instruction ID: 1095bd4d556417f41f546cdb3a54845df8a1fb0616fe00ee2cff2080ee0e1b2a
                                                                  • Opcode Fuzzy Hash: 91e2f3eec26f55bf2b5bf956f11a8879683c002a58f1b6de5a4c0a443d51cf44
                                                                  • Instruction Fuzzy Hash: 87F0AF36B000144BCB659A7898942AEE7A7D7C4256F20483AE906EB344CE718D1283E2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 422ec2cf5edc436f45c577fb2ae20bd49d3cfb710fb047e3bee2576ffb2968c7
                                                                  • Instruction ID: 98c26db0a86a5931a7b8f521ba949a68b5dbbd6fd4b495a70ed3c4cf5c7e6b2e
                                                                  • Opcode Fuzzy Hash: 422ec2cf5edc436f45c577fb2ae20bd49d3cfb710fb047e3bee2576ffb2968c7
                                                                  • Instruction Fuzzy Hash: 5001B130A0128BEFDB0AFBB4E95059DBBB1EF80340F0056AEC001EB295EE785E0597D1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 673ed5d830b0d79ab2489b6cd6ec387725b1e0828acd05b0b84410c41ec62f14
                                                                  • Instruction ID: ae4ca3ac9708d09bb1258e646cb926ddf7530e3dd511a7e77165678652e0d004
                                                                  • Opcode Fuzzy Hash: 673ed5d830b0d79ab2489b6cd6ec387725b1e0828acd05b0b84410c41ec62f14
                                                                  • Instruction Fuzzy Hash: FAF0A732F2123957DB5425B5A804AAEB779EF84754F00443DED01E7385DE716C0587D1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0e0e6ee6484835802ea2ae5142ac1d5b842aed44dfedfd9b3da546fb1fbbca9a
                                                                  • Instruction ID: 083fa5190de77adec6f5d0994ed6538e457a40ff4335765ce7a5938abaf488d0
                                                                  • Opcode Fuzzy Hash: 0e0e6ee6484835802ea2ae5142ac1d5b842aed44dfedfd9b3da546fb1fbbca9a
                                                                  • Instruction Fuzzy Hash: 8BF01439B01108CFCB18DBB4D598B6CB7B2EF88211F5044A8E9068B3A4CF34AD82CB40
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 476d6650153458bb03b9734160ff88bd6da7c5d0fd5fd94e70d47d9e7c6d3a67
                                                                  • Instruction ID: 6f21bd0f3d785ed230b6d60af0cbc17dda6934f3f7b670898a817977c54b0dbc
                                                                  • Opcode Fuzzy Hash: 476d6650153458bb03b9734160ff88bd6da7c5d0fd5fd94e70d47d9e7c6d3a67
                                                                  • Instruction Fuzzy Hash: 35F02B33A04250DBDB618BA888902ACFFB0EE6432279900D7DC05DB351D3B5F942C751
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 84480e5ea6ff251bcc5c5b65af28d75d3a9a15fe6c001b10b233ff3ef720abc1
                                                                  • Instruction ID: c444e94d2120d518e01ef1201d0bfa3b3c09d949a3beec345c78d877eff0032c
                                                                  • Opcode Fuzzy Hash: 84480e5ea6ff251bcc5c5b65af28d75d3a9a15fe6c001b10b233ff3ef720abc1
                                                                  • Instruction Fuzzy Hash: 02F03130A0024EEFDB06FBB8F99059DBBB1EB80344F50566DC505AB294EE755E04A7D1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3323509060.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_1750000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b9e547ba03e1908cbfd50d11a820497d72541e2edba8963e13638a7b9ef92312
                                                                  • Instruction ID: c72f2302b935fea92fd1e045579b34b616ac458efc90afa1b371230d34dcc8d3
                                                                  • Opcode Fuzzy Hash: b9e547ba03e1908cbfd50d11a820497d72541e2edba8963e13638a7b9ef92312
                                                                  • Instruction Fuzzy Hash: 1EF027312063005BD376462DD884C6BFF6AEBCA3207144466F559C3992CB34D805C3A2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8155255095e84e84164e20b929ffe0cd94314a6e0a771afd1cb13f2556402fc5
                                                                  • Instruction ID: d7e5e1c928943343ce56867ca75609ff57c65779dc6f1f5e27f5631ef829600a
                                                                  • Opcode Fuzzy Hash: 8155255095e84e84164e20b929ffe0cd94314a6e0a771afd1cb13f2556402fc5
                                                                  • Instruction Fuzzy Hash: A5E0DF71E24246DFFF90CEF0C98875A7BB9DB02205F2088E1D808CB582E236DA56C760
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a70c9caab1dac25143d0acc0e0c86a0abca502a45109b956603217507e4038f8
                                                                  • Instruction ID: d6e56ba7c06426a5f4247c89f9f82fa811e634a5180a5bd80c25897a5961f21a
                                                                  • Opcode Fuzzy Hash: a70c9caab1dac25143d0acc0e0c86a0abca502a45109b956603217507e4038f8
                                                                  • Instruction Fuzzy Hash: 73F0FE30A20119DFDB64EF90E8A9BADBBB6FF48705F208519E902A7285CB741C45CBC0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3faa0f76d12cba4129e9c0d003b7cd12084f8d18d66b59c68df13f30bfb1c52d
                                                                  • Instruction ID: 8a1f16fe300c365d6b857b8c968011085d32b200688e46bfa6b7b100f0dcf124
                                                                  • Opcode Fuzzy Hash: 3faa0f76d12cba4129e9c0d003b7cd12084f8d18d66b59c68df13f30bfb1c52d
                                                                  • Instruction Fuzzy Hash: 35E01271E24109ABEF50DEF5C94975A77EDDB02254F2088A5DC08C7282E176DA158794
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ea07f6309e69e6354990001e6d9c35066cd4362a44fa73c2fabbdfc713593051
                                                                  • Instruction ID: f19676e8ab4eceb2c420ed1b8c3d09e4ef1db05ea49106f298ba2ead9bcc799d
                                                                  • Opcode Fuzzy Hash: ea07f6309e69e6354990001e6d9c35066cd4362a44fa73c2fabbdfc713593051
                                                                  • Instruction Fuzzy Hash: 17D022751281048FC340CF38E840E503B99DB08F09F2045F8F0098F6A3CA23E813CA11
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.3326971986.0000000006200000.00000040.00000800.00020000.00000000.sdmp, Offset: 06200000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_6200000_SecuriteInfo.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4055f8bebb1f09e3430c6095b42012c1cc66e4952e1761faa242fe6affef8bb3
                                                                  • Instruction ID: 3bbf454b5b9fc03ef957e261e241749e4bd707ce72a56f356b2931b7ea99cff3
                                                                  • Opcode Fuzzy Hash: 4055f8bebb1f09e3430c6095b42012c1cc66e4952e1761faa242fe6affef8bb3
                                                                  • Instruction Fuzzy Hash: 3DC04834260208CFC244DB68E488D60B3E9AB48A18B2180E9E90D8B723CB32F8128A50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%